210-250 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam
http://www.EnsurePass.com/210-250.html

Question No.31

How does NTP help with security monitoring?

A.

It synchronizes the time of day so that you can correlate events when you receive system logs.

B.

It enables you to look up the IP addresses a browser navigated to using the FQON.

C.

It allows you receive system-generated email traffic from log servers.

D.

It uses TCP, which allows you to see the HTTP conversations between servers and clients.

Correct Answer: A

Question No.32

Which option is a purpose of port scanning?

A.

Identify the Internet Protocol of the target system.

B.

Determine if the network is up or down

C.

Identify which ports and services are open on the target host.

D.

Identify legitimate users of a system.

Correct Answer: C

Question No.33

Refer to the exhibit. During an analysis this list of email attachments is found. Which files contain the same content?

image

A.

1 and 4

B.

3 and 4

C.

1 and 3

D.

1 and 2

Correct Answer: C

Question No.34

Which identifier is used to describe the application or process that submitted a log message?

A.

action

B.

selector

C.

priority

D.

facility

image

Correct Answer: D

Question No.35

Stateful and traditional firewalls can analyze packets and judge them against a set of predetermined rules called access control lists (ACLs). They inspect which of the following elements within a packet? (Choose two)

A.

Session headers

B.

NetFlow flow information

C.

Source and destination ports and source and destination IP addresses

D.

Protocol information

Correct Answer: CD

Question No.36

Which definition of permissions in Linux is true?

A.

rules that allow network traffic to go in and out

B.

table maintenance program

C.

written affidavit that you have to sign before using the system

D.

attributes of ownership and control of an object

Correct Answer: D

Question No.37

Which of the following are Cisco cloud security solutions?

A.

CloudDLP

B.

OpenDNS

C.

CloudLock

D.

CloudSLS

Correct Answer: BC

Question No.38

Which two protocols are used for email? (Choose two)

A.

NTP

B.

DNS

C.

HTTP

D.

IMAP

E.

SMTP

Correct Answer: DE

Question No.39

Where are configuration records stored?

A.

In a CMDB

B.

In a MySQL DB

C.

In a XLS file

D.

There is no need to store them

Correct Answer: A

Question No.40

Which action is an attacker taking when they attempt to gain root access on the victim#39;s system?

A.

command injections

B.

command and control

C.

root kit

D.

privilege escalation

Correct Answer: D

Get Full Version of 210-250 Dumps

Tagged

Leave a Reply

Your email address will not be published. Required fields are marked *