Which of the following are examples of cloud-based security solutions?
A. Cisco Cloud Threat Security (CTS)
B. Cisco Cloud Email Security (CES)
C. Cisco AMP Threat Grid
D. Cisco Threat Awareness Service (CTAS)
The Cisco CWS service uses web proxies in the Cisco cloud environment that scan traffic for malware and policy enforcement. Cisco customers can connect to the Cisco CWS service directly by using a proxy auto-configuration (PAC) file in the user endpoint or through connectors integrated into which of the following Cisco products?
A. Cisco ISR G2 routers
B. Cisco ASA
C. Cisco WSA
D. Cisco AnyConnect Secure Mobility Client
Depending on the version of NetFlow, a network infrastructure device can gather different types of information, including which of the following?
A. Differentiated services code point (DSCP)
B. The device's input interface
C. TCP flags
D. Type of service (ToS) byte
There are several differences between NetFlow and full-packet capture. Which of the following statements are true?
A. Full-packet capture provides the same information as NetFlow.
B. Full-packet capture is faster.
C. One of the major differences and disadvantages of full-packet capture is cost and the amount of data to be analyzed.
D. In many scenarios, full-packet captures are easier to collect and require pretty much the same analysis ecosystem as NetFlow.
Which of the following is an example of a data loss prevention solution?
A. Cisco Advanced DLP
B. Cisco CloudLock
C. Cisco Advanced Malware Protection (AMP)
D. Cisco Firepower 4100 appliances
Access control entries (ACE), which are part of an access control list (ACL), can classify packets by inspecting Layer 2 through Layer 4 headers for a number of parameters, including which of the following items?
A. Layer 2 protocol information such as EtherTypes
B. Layer 3 protocol information such as ICMP, TCP, or UDP
C. Layer 3 header information such as source and destination IP addresses
D. Layer 4 header information such as source and destination TCP or UDP ports
Which of the following statements are true about application proxies?
A. Application proxies, or proxy servers, are devices that operate as intermediary agents on behalf of clients that are on a private or protected network.
B. Clients on the protected network send connection requests to the application proxy to transfer data to the unprotected network or the Internet.
C. Application proxies can be classified as next-generation firewalls.
D. Application proxies always perform network address translation (NAT).
What would be the IPv6 address of a host using SLAAC with 2345::/64 as a network prefix and MAC address of 0300.1111.2222?
A. 2345::100:11FF:FE11:2222
B. 2345:0:0:0:0300:11FF:FE11:2222
C. 2345:0:0:0:FFFE:0300:1111:2222
D. 2345::0300:11FF:FE11:2222
What is a DNS iterative query used for?
A. It is sent from a DNS server to other servers to resolve a domain.
B. It is sent from a DNS resolver to the backup DNS server.
C. It is sent from a DNS server to the DNS client.
D. It is sent from a client machine to a DNS resolver.
Which TCP header flag is used by TCP to establish a connection?
A. URG
B. SYN
C. PSH
D. RST
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.