Exam | CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals |
Number | 210-250 |
File Name | CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals.braindumps.210-250.2018-10-04.1e.634q.vcex |
Size | 4.33 Mb |
Posted | October 04, 2018 |
Downloads | 179 |
Download | CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals.braindumps.210-250.2018-10-04.1e.634q.vcex |
Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.
Coupon: MASTEREXAM
With discount: 20%
What best describes an attack surface?
Correct Answer: B
What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?
Correct Answer: C
Which two are software vulnerability scanners? (Choose two.)
Correct Answer: BD
What best describes an amplification attack?
Correct Answer: B
What best describes a DoS attack?
Correct Answer: A
What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim's IP address?
Correct Answer: B
What type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets, such that each packet has the IP address of the intended target rather than the IP address of the attacker as its source address?
Correct Answer: A
What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?
Correct Answer: B
Which two attacks can be caused by a rogue DHCP server? (Choose two.)
Correct Answer: CE
A ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack?
Correct Answer: C