Get Full Version of the Exam
http://www.EnsurePass.com/210-250.html
Question No.11
Which definition of vulnerability is true?
A. |
an exploitable unpatched and unmitigated weakness in software |
B. |
an incompatible piece of software |
C. |
software that does not have the most current patch applied |
D. |
software that was not approved for installation |
Correct Answer: A
Question No.12
Which option is an advantage to using network-based anti-virus versus host-based anti-virus?
A. |
Network-based has the ability to protect unmanaged devices and unsupported operating systems. |
B. |
There are no advantages compared to host-based antivirus. |
C. |
Host-based antivirus does not have the ability to collect newly created signatures. |
D. |
Network-based can protect against infection from malicious files at rest. |
Correct Answer: A
Question No.13
Which definition of the virtual address space for a Windows process is true?
A. |
actual physical location of an object in memory |
B. |
set of virtual memory addresses that it can use |
C. |
set of pages that are currently resident in physical memory |
D. |
system-level memory protection feature that is built into the operating system |
Correct Answer: B
Question No.14
DRAG DROP
Drag the data source on the left to the left to the correct data type on the right.
Correct Answer:
Question No.15
Which statement about digitally signing a document is true?
A. |
The document is hashed and then the document is encrypted with the private key. |
B. |
The document is hashed and then the hash is encrypted with the private key. |
C. |
The document is encrypted and then the document is hashed with the public key |
D. |
The document is hashed and then the document is encrypted with the public key. |
Correct Answer: B
Question No.16
For which reason can HTTPS traffic make security monitoring difficult?
A. |
encryption |
B. |
large packet headers |
C. |
Signature detection takes longer. |
D. |
SSL interception |
Correct Answer: A
Question No.17
Which cryptographic key is contained in an X.509 certificate?
A. |
symmetric |
B. |
public |
C. |
private |
D. |
asymmetric |
Correct Answer: B
Question No.18
Which two features must a next generation firewall include? (Choose two.)
A. |
data mining |
B. |
host-based antivirus |
C. |
application visibility and control |
D. |
Security Information and Event Management |
E. |
intrusion detection system |
Correct Answer: CE
Question No.19
Which directory is commonly used on Linux systems to store log files, including syslog and apache access logs?
A. |
/etc/log |
B. |
/root/log |
C. |
/lib/log |
D. |
/var/log |
Correct Answer: D
Question No.20
Cisco pxGrid has a unified framework with an open API designed in a hub-and-spoke architecture. pxGrid is used to enable the sharing of contextual-based information from which devices?
A. |
From a Cisco ASA to the Cisco OpenDNS service |
B. |
From a Cisco ASA to the Cisco WSA |
C. |
From a Cisco ASA to the Cisco FMC |
D. |
From a Cisco ISE session directory to other policy network systems, such as Cisco IOS devices and the Cisco ASA |
Correct Answer: D
Get Full Version of 210-250 Dumps