[Free] 2019(Nov) EnsurePass Cisco 210-250 Dumps with VCE and PDF 11-20

Get Full Version of the Exam
http://www.EnsurePass.com/210-250.html

Question No.11

Which definition of vulnerability is true?

  1. an exploitable unpatched and unmitigated weakness in software

  2. an incompatible piece of software

  3. software that does not have the most current patch applied

  4. software that was not approved for installation

Correct Answer: A

Question No.12

Which option is an advantage to using network-based anti-virus versus host-based anti-virus?

  1. Network-based has the ability to protect unmanaged devices and unsupported operating systems.

  2. There are no advantages compared to host-based antivirus.

  3. Host-based antivirus does not have the ability to collect newly created signatures.

  4. Network-based can protect against infection from malicious files at rest.

Correct Answer: A

Question No.13

Which definition of the virtual address space for a Windows process is true?

  1. actual physical location of an object in memory

  2. set of virtual memory addresses that it can use

  3. set of pages that are currently resident in physical memory

  4. system-level memory protection feature that is built into the operating system

Correct Answer: B

Question No.14

DRAG DROP

Drag the data source on the left to the left to the correct data type on the right.

image

Correct Answer:

image

Question No.15

Which statement about digitally signing a document is true?

  1. The document is hashed and then the document is encrypted with the private key.

  2. The document is hashed and then the hash is encrypted with the private key.

  3. The document is encrypted and then the document is hashed with the public key

  4. The document is hashed and then the document is encrypted with the public key.

Correct Answer: B

Question No.16

For which reason can HTTPS traffic make security monitoring difficult?

  1. encryption

  2. large packet headers

  3. Signature detection takes longer.

  4. SSL interception

Correct Answer: A

Question No.17

Which cryptographic key is contained in an X.509 certificate?

  1. symmetric

  2. public

  3. private

  4. asymmetric

Correct Answer: B

Question No.18

Which two features must a next generation firewall include? (Choose two.)

  1. data mining

  2. host-based antivirus

  3. application visibility and control

  4. Security Information and Event Management

  5. intrusion detection system

Correct Answer: CE

Question No.19

Which directory is commonly used on Linux systems to store log files, including syslog and apache access logs?

  1. /etc/log

  2. /root/log

  3. /lib/log

  4. /var/log

Correct Answer: D

Question No.20

Cisco pxGrid has a unified framework with an open API designed in a hub-and-spoke architecture. pxGrid is used to enable the sharing of contextual-based information from which devices?

  1. From a Cisco ASA to the Cisco OpenDNS service

  2. From a Cisco ASA to the Cisco WSA

  3. From a Cisco ASA to the Cisco FMC

  4. From a Cisco ISE session directory to other policy network systems, such as Cisco IOS devices and the Cisco ASA

Correct Answer: D

Get Full Version of the Exam
210-250 Dumps
210-250 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.