Which of the following is an example of an encoding mechanism used by threat actors?
A. Base24 encoding
B. GRE tunnels
C. Hex tunnels
D. Base64 encoding
Why should NTP be enabled in infrastructure devices and for security monitoring?
A. Using NTP ensures that the correct time is set and that all devices within the network are synchronized. Also, it helps to reduce the amount of duplicate logs.
B. Using NTP ensures that the network tunneling protocol is implemented with the correct encryption algorithms.
C. Using NTP ensures that the network tunneling protocol is implemented with the correct hashing algorithms.
D. Using NTP ensures that the network tunneling protocol is implemented with the correct DNS names and NetFlow records
Which of the following are examples of vulnerability and port scanners? (Select all that apply.)
A. SuperScan
B. nmap
C. Nexpose
D. Nessus
How do UDP scans work?
A. By establishing a three-way handshake.
B. By sending SYN packets to see what ports are open.
C. UDP scans have to rely on ICMP "port unreachable" messages to determine whether a port is open. When the scanner sends a UDP packet and the port is not open on the victim's system, that system will respond with an ICMP "port unreachable" message.
D. By sending ICMP "port unreachable" messages to the victim.
What is a phishing attack?
A. A phishing attack is the act of incorporating malicious ads on trusted websites, which results in users' browsers being inadvertently redirected to sites hosting malware.
B. A phishing attack uses SQL injection vulnerabilities in order to execute malicious code.
C. This is a type of denial-of-service (DoS) attack where the attacker sends numerous phishing requests to the victim.
D. This is a type of attack where the attacker presents a link that looks like a valid, trusted resource to a user. When the user clicks it, he is prompted to disclose confidential information such as his username and password
What is a Tor exit node?
A. A Tor exit node is the first Tor node or the "gateway" where the Tor encrypted traffic "exits" to the Internet.
B. A Tor exit node is the last Tor node or the "gateway" where the Tor encrypted traffic "exits" to the Internet.
C. A Tor exit node is the Tor node or the "gateway" where the Tor browser connects first.
D. A Tor exit node is an Internet routing entity that can define how the Tor browser exits the common Internet and connects to the darknet.
What is a SQL injection vulnerability?
A. A type of vulnerability where an attacker can insert or "inject" a SQL query via the input data from the client to the application or database
B. A type of vulnerability where an attacker can "inject" a new password to a SQL server or the client
C. A type of DoS vulnerability that can cause a SQL server to crash
D. A type of privilege escalation vulnerability aimed at SQL servers
What are examples of peer-to-peer (P2P) tools?
A. LionShare
B. P2P NetFlow
C. Napster
D. Peercoin
What is Tor?
A. Tor is The Onion Router and is a free tool that enables its users to surf the Web anonymously.
B. Tor is The Onion Router and is a free tool that enables its users to send email in an encrypted way using PGP.
C. Tor is The Onion Router and is a free tool that enables its users to route packets anonymously by leveraging the EIGRP or OSPF routing protocol.
D. Tor is The Onion Router and is a free tool that enables its users to route packets anonymously by using BGP.
Why does NAT present a challenge to security monitoring?
A. NAT can present a challenge when performing security monitoring and analyzing logs because data can be encrypted as a result of the network address translation.
B. NAT can present a challenge when performing security monitoring and analyzing logs because data can be dropped as a result of the network address translation.
C. NAT can present a challenge when performing security monitoring and analyzing logs, NetFlow, and other data because device IP addresses can be seen in the logs as the "translated" IP address versus the "real" IP address.
D. NAT can present a challenge when performing security monitoring and analyzing logs because data can be fragmented as a result of the network address translation.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.