Download CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals.braindumps.210-250.2018-10-04.1e.634q.vcex

Download Dump

File Info

Exam CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals
Number 210-250
File Name CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals.braindumps.210-250.2018-10-04.1e.634q.vcex
Size 4.33 Mb
Posted October 04, 2018
Downloaded 5



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
What best describes an attack surface?

  • A: a way to classify which tools were used in an attack
  • B: the sum of the different points ("attack vectors") in a given computing device or network that are accessible to an unauthorized user ("attacker")
  • C: the people who are involved in protecting the network perimeter
  • D: only describes the data that is gathered about an attack



Question 2
What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?

  • A: Netuse
  • B: ipconfig
  • C: NMAP
  • D: show run



Question 3
Which two are software vulnerability scanners? (Choose two.)

  • A: VmStat
  • B: Nessus
  • C: fingerprint
  • D: open VAS



Question 4
What best describes an amplification attack?

  • A: A low volume of bad music is played progressively louder to the point that it becomes unbearable for people to listen to it.
  • B: A small forged packet elicits a large reply from the reflectors.
  • C: A small radio signal is initially weak and eventually increases the signal strength so that wireless devices will attach to it instead of the legitimate AP.
  • D: There is no such attack that is called an amplification attack.



Question 5
What best describes a DoS attack?

  • A: attempts to consume all of a critical computer or network resource in order to make it unavailable for valid use
  • B: poses as legitimate software or email attachment in order to launch a malicious attack when opened
  • C: can steal data such as user names and passwords without the user realizing that they have been compromised
  • D: rarely seen because DoS attacks are extremely difficult to engineer and almost impossible to deliver



Question 6
What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim's IP address?

  • A: reflection attack
  • B: amplification attack
  • C: MITM attack
  • D: Trojan virus



Question 7
What type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets, such that each packet has the IP address of the intended target rather than the IP address of the attacker as its source address?

  • A: reflection attack
  • B: amplification attack
  • C: MITM attack
  • D: Trojan virus ARP



Question 8
What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?

  • A: MAC spoofing
  • B: IP spoofing
  • C: application spoofing
  • D: name spoofing



Question 9
Which two attacks can be caused by a rogue DHCP server? (Choose two.)

  • A: Trojan virus
  • B: Compromised-Key
  • C: DoS
  • D: TCP SYN flood
  • E: MITM



Question 10
A ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack?

  • A: red rat
  • B: fraggle
  • C: smurf
  • D: SYN flood
  • E: firewalk









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset