Get Full Version of the Exam
http://www.EnsurePass.com/210-250.html
Question No.31
How does NTP help with security monitoring?
A. |
It synchronizes the time of day so that you can correlate events when you receive system logs. |
B. |
It enables you to look up the IP addresses a browser navigated to using the FQON. |
C. |
It allows you receive system-generated email traffic from log servers. |
D. |
It uses TCP, which allows you to see the HTTP conversations between servers and clients. |
Correct Answer: A
Question No.32
Which option is a purpose of port scanning?
A. |
Identify the Internet Protocol of the target system. |
B. |
Determine if the network is up or down |
C. |
Identify which ports and services are open on the target host. |
D. |
Identify legitimate users of a system. |
Correct Answer: C
Question No.33
Refer to the exhibit. During an analysis this list of email attachments is found. Which files contain the same content?
A. |
1 and 4 |
B. |
3 and 4 |
C. |
1 and 3 |
D. |
1 and 2 |
Correct Answer: C
Question No.34
Which identifier is used to describe the application or process that submitted a log message?
A. |
action |
B. |
selector |
C. |
priority |
D. |
facility |
Correct Answer: D
Question No.35
Stateful and traditional firewalls can analyze packets and judge them against a set of predetermined rules called access control lists (ACLs). They inspect which of the following elements within a packet? (Choose two)
A. |
Session headers |
B. |
NetFlow flow information |
C. |
Source and destination ports and source and destination IP addresses |
D. |
Protocol information |
Correct Answer: CD
Question No.36
Which definition of permissions in Linux is true?
A. |
rules that allow network traffic to go in and out |
B. |
table maintenance program |
C. |
written affidavit that you have to sign before using the system |
D. |
attributes of ownership and control of an object |
Correct Answer: D
Question No.37
Which of the following are Cisco cloud security solutions?
A. |
CloudDLP |
B. |
OpenDNS |
C. |
CloudLock |
D. |
CloudSLS |
Correct Answer: BC
Question No.38
Which two protocols are used for email? (Choose two)
A. |
NTP |
B. |
DNS |
C. |
HTTP |
D. |
IMAP |
E. |
SMTP |
Correct Answer: DE
Question No.39
Where are configuration records stored?
A. |
In a CMDB |
B. |
In a MySQL DB |
C. |
In a XLS file |
D. |
There is no need to store them |
Correct Answer: A
Question No.40
Which action is an attacker taking when they attempt to gain root access on the victim#39;s system?
A. |
command injections |
B. |
command and control |
C. |
root kit |
D. |
privilege escalation |
Correct Answer: D
Get Full Version of 210-250 Dumps