What is the function of the exploit kit landing page?
A. redirect the user's browser to the CnC server
B. host malicious advertisements with iFrames
C. initiate CnC traffic for malware communications
D. deliver malware to victim machine
Why would an attacker use a proxy server in front of the exploit server?
A. to protect the identity of the exploit server and make it harder to track
B. to be able to infect more machines than a single server could
C. to reduce bandwidth used by the attack infrastructure and keep loaded pages cached
D. redundancy if there is a failure of the exploit server
What characteristic differentiates a server from a client?
A. runs many applications
B. has an operating system
C. provides services over open ports
D. has open network connections
In computer security, what is referred to as a weakness or flaw that allows an attacker to reduce the information assurance of a system?
A. system posture
B. risk
C. system surface area
D. vulnerability
Which term is a file that contains path information to another file or directory?
A. URL
B. file system
C. directory tree
D. symlinks
Which tool is commonly used in a Security Operations Center to aggregate logs sent by endpoint systems, firewalls, intrusion prevention systems, and NetFlow?
A. Cybersecurity Event Management
B. Security Information and Event Management system
C. Firepower Management Center
D. Security Information Management System
Which of these provides a recording of network traffic that can be replayed at a later time?
A. session data
B. full packet capture
C. NetFlow data
D. statistical data
Which option constitutes data loss for an analyst reviewing data from network sources?
A. PNG... .data stores
B. PMOCCMOC. .Z.User.Guide
C. PK..1. .client.data...
D. MS.Portal
Why would an attacker use Mimikatz once they gained access to a system?
A. to create a tunnel for covert communication channels back to the attacker network
B. to list the user accounts currently logged on to the machine
C. to create a new domain user account to log in to so regular users will not notice their activity
D. to extract passwords and hashes for user accounts that have logged on to the system
Which of these is the in-memory representation of a running Windows application?
A. log files
B. network port
C. registry keys
D. processes
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.