Exam Details

  • Exam Code
    :210-250
  • Exam Name
    :Cisco Cybersecurity Fundamentals
  • Certification
    :Cisco Certifications
  • Vendor
    :Cisco
  • Total Questions
    :1157 Q&As
  • Last Updated
    :Nov 03, 2022

Cisco Cisco Certifications 210-250 Questions & Answers

  • Question 961:

    Cisco AMP for Endpoints takes advantage of which of the following?

    A. Telemetry from big data, continuous analysis, and advanced analytics provided by Cisco ESA and WSA in order to detect, analyze, and stop advanced malware across endpoints

    B. Advanced analytics provided by antivirus software in order to detect, analyze, and stop advanced malware across endpoints

    C. Telemetry from big data, continuous analysis, and advanced analytics provided by Cisco threat intelligence in order to detect, analyze, and stop advanced malware across endpoints

    D. Telemetry from big data, continuous analysis, and advanced analytics provided by Cisco next-generation firewalls in order to detect, analyze, and stop advanced malware across endpoints.

  • Question 962:

    Which of the following is an example of a host-based encryption technology that can help protect files as well as email?

    A. Cisco AMP

    B. Protected Guided Privacy (PGP)

    C. Pretty Good Privacy (PGP)

    D. Cisco WSA

  • Question 963:

    What are worms?

    A. A type of malware that compromises a system and then often demands a ransom from the victim to pay the attacker in order for the malicious activity to cease or for the malware to be removed from the affected system.

    B. Viruses that replicate themselves over the network, infecting numerous vulnerable systems. On most occasions, a worm will execute malicious instructions on a remote system without user interaction.

    C. An exploit of a network infrastructure device vulnerability that installs a backdoor on the affected system.

    D. An exploit of a firewall vulnerability that installs a backdoor on the affected system.

  • Question 964:

    Which of the following are benefits of system-based sandboxing?

    A. It limits the development of an application inside of a region of memory.

    B. It limits the impact of security vulnerabilities and bugs in code to only run inside the "sandbox."

    C. It prevents software bugs and exploits of vulnerabilities from affecting the rest of the system and from installing persistent malware in the system.

    D. It limits the communication of kernel modules within the system, controlling the flow of information and data exchange.

  • Question 965:

    What is a limitation of application whitelisting?

    A. The cost of application whitelisting technologies.

    B. The ability to interact with other systems.

    C. Scalability in low-power and low-resource IoT.

    D. The continuous management of what is and is not on the whitelist.

  • Question 966:

    Host-based firewalls are often referred to as which of the following?

    A. Next-generation firewalls

    B. Personal firewalls

    C. Host-based intrusion detection systems

    D. Antivirus software

  • Question 967:

    What is an example of a Cisco solution for endpoint protection?

    A. Cisco ASA

    B. Cisco ESA

    C. Cisco AMP for Endpoints

    D. Firepower Endpoint System

  • Question 968:

    What is a graylist?

    A. A list of separate things, such as hosts, applications, email addresses, and services, that are authorized to be installed or active on a system in accordance with a predetermined baseline.

    B. A list of different entities that have been determined to be malicious.

    C. A list of different objects that have not yet been established as not harmful or malicious. Once additional information is obtained, graylist items can be moved onto a whitelist or a blacklist.

    D. A list of different objects that have not yet been established as not harmful or malicious. Once additional information is obtained, graylist items cannot be moved onto a whitelist or a blacklist.

  • Question 969:

    Which of the following are examples of application file and folder attributes that can help with application whitelisting?

    A. Application store

    B. File path

    C. Filename

    D. File size

  • Question 970:

    Which of the following are examples of sandboxing implementations?

    A. Google Chromium sandboxing

    B. Java Virtual Machine (JVM) sandboxing

    C. HTML CSS and JavaScript sandboxing

    D. HTML5 "sandbox" attribute for use with iframes

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.