Get Full Version of the Exam
http://www.EnsurePass.com/210-255.html
Question No.1
Refer to the exhibit. We have performed a malware detection on the Cisco website. Which statement about the result is true?
A. |
The website has been marked benign on all 68 checks. |
B. |
The threat detection needs to run again. |
C. |
The website has 68 open threats. |
D. |
The website has been marked benign on 0 checks. |
Correct Answer: A
Question No.2
Which information must be left out of a final incident report?
A. |
server hardware configurations |
B. |
exploit or vulnerability used |
C. |
impact and/or the financial loss |
D. |
how the incident was detected |
Correct Answer: A
Question No.3
Refer to the exhibit. Which type of log is this an example of?
A. |
syslog |
B. |
NetFlow log |
C. |
proxy log |
D. |
IDS log |
Correct Answer: D
Question No.4
Refer to the Exhibit. A customer reports that they cannot access your organization#39;s website. Which option is a possible reason that the customer cannot access the website?
A. |
The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service. |
B. |
The server at 10.67.10.5 has a virus. |
C. |
A vulnerability scanner has shown that 10.67.10.5 has been compromised. |
D. |
Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors. |
Correct Answer: D
Question No.5
DRAG DROP
Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.
Correct Answer:
Question No.6
Which CVSSv3 metric captures the level of access that is required for a successful attack?
A. |
attack vector |
B. |
attack complexity |
C. |
privileges required |
D. |
user interaction |
Correct Answer: C
Question No.7
Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?
A. |
1986 |
B. |
2318 |
C. |
2542 |
D. |
2317 |
Correct Answer: C
Question No.8
Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable component?
A. |
confidentiality |
B. |
integrity |
C. |
availability |
D. |
complexity |
Correct Answer: B
Question No.9
What mechanism does the Linux operating system provide to control access to files?
A. |
privileges required |
B. |
user interaction |
C. |
file permissions |
D. |
access complexity |
Correct Answer: C
Question No.10
DRAG DROP
Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the NetFlow v5 record from a security event on the right.
Correct Answer:
Get Full Version of 210-255 Dumps