Download CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals.braindumps.210-250.2018-10-04.1e.634q.vcex

Download Dump

File Info

Exam CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals
Number 210-250
File Name CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals.braindumps.210-250.2018-10-04.1e.634q.vcex
Size 4.33 Mb
Posted October 04, 2018
Downloaded 13



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%

 
 



Demo Questions

Question 1

What best describes an attack surface?

  • A: a way to classify which tools were used in an attack
  • B: the sum of the different points ("attack vectors") in a given computing device or network that are accessible to an unauthorized user ("attacker")
  • C: the people who are involved in protecting the network perimeter
  • D: only describes the data that is gathered about an attack

Correct Answer: B




Question 2

What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?

  • A: Netuse
  • B: ipconfig
  • C: NMAP
  • D: show run

Correct Answer: C




Question 3

Which two are software vulnerability scanners? (Choose two.)

  • A: VmStat
  • B: Nessus
  • C: fingerprint
  • D: open VAS

Correct Answer: BD




Question 4

What best describes an amplification attack?

  • A: A low volume of bad music is played progressively louder to the point that it becomes unbearable for people to listen to it.
  • B: A small forged packet elicits a large reply from the reflectors.
  • C: A small radio signal is initially weak and eventually increases the signal strength so that wireless devices will attach to it instead of the legitimate AP.
  • D: There is no such attack that is called an amplification attack.

Correct Answer: B




Question 5

What best describes a DoS attack?

  • A: attempts to consume all of a critical computer or network resource in order to make it unavailable for valid use
  • B: poses as legitimate software or email attachment in order to launch a malicious attack when opened
  • C: can steal data such as user names and passwords without the user realizing that they have been compromised
  • D: rarely seen because DoS attacks are extremely difficult to engineer and almost impossible to deliver

Correct Answer: A




Question 6

What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim's IP address?

  • A: reflection attack
  • B: amplification attack
  • C: MITM attack
  • D: Trojan virus

Correct Answer: B




Question 7

What type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets, such that each packet has the IP address of the intended target rather than the IP address of the attacker as its source address?

  • A: reflection attack
  • B: amplification attack
  • C: MITM attack
  • D: Trojan virus ARP

Correct Answer: A




Question 8

What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?

  • A: MAC spoofing
  • B: IP spoofing
  • C: application spoofing
  • D: name spoofing

Correct Answer: B




Question 9

Which two attacks can be caused by a rogue DHCP server? (Choose two.)

  • A: Trojan virus
  • B: Compromised-Key
  • C: DoS
  • D: TCP SYN flood
  • E: MITM

Correct Answer: CE




Question 10

A ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack?

  • A: red rat
  • B: fraggle
  • C: smurf
  • D: SYN flood
  • E: firewalk

Correct Answer: C










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files