Where is the UNIX log located?
A. /var/log
B. /dev/console
C. /etc/log
D. /config/log
What is a Trojan horse?
A. A piece of malware that downloads and installs other malicious content from the Internet to perform additional exploitation on an affected system.
B. A type of malware that executes instructions determined by the nature of the Trojan to delete files, steal data, and compromise the integrity of the underlying operating system, typically by leveraging social engineering and convincing a user to install such software.
C. A virus that replicates itself over the network infecting numerous vulnerable systems.
D. A type of malicious code that is injected into a legitimate application. An attacker can program a logic bomb to delete itself from the disk after it performs the malicious tasks on the system.
What is ransomware?
A. A type of malware that compromises a system and then often demands a ransom from the victim to pay the attacker in order for the malicious activity to cease or for the malware to be removed from the affected system
B. A set of tools used by an attacker to elevate his privilege to obtain root-level access in order to completely take control of the affected system
C. A type of intrusion prevention system
D. A type of malware that doesn't affect mobile devices
Which of the following are examples of free antivirus software? (Select all that apply.)
A. McAfee Antivirus
B. Norton AntiVirus
C. ClamAV
D. Immunet
Which is a true statement about a symlink?
A. Deleting the symlink file deletes the file it references.
B. Moving a file referenced by a symlink will cause a system error.
C. Symlinks are the same as pointers.
D. A symlink is also known as a soft link.
Which log type would be used for recording changes in a SQL database?
A. Transaction logs
B. Alert logs
C. Session logs
D. Threat logs
Which process has a PID of 1?
A. Daemon
B. Parent
C. Child
D. Init
When issuing the command ls -l (filename), what is the correct order of user permissions?
A. file
B. owner
C. chown
D. chmod
Which of the following explains Linux daemon permissions?
A. Daemons get permissions from the init process.
B. Daemons get permissions from a parent process.
C. Daemons are always the highest level of permissions.
D. Daemons and the init are the same thing.
Apache will send diagnostic information and record any errors that it encounters to which of the following?
A. ErrorLog
B. Dump.txt
C. syslog
D. Accesslog
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.