Get Full Version of the Exam
http://www.EnsurePass.com/210-250.html
Question No.11
Which definition of vulnerability is true?
-
an exploitable unpatched and unmitigated weakness in software
-
an incompatible piece of software
-
software that does not have the most current patch applied
-
software that was not approved for installation
Correct Answer: A
Question No.12
Which option is an advantage to using network-based anti-virus versus host-based anti-virus?
-
Network-based has the ability to protect unmanaged devices and unsupported operating systems.
-
There are no advantages compared to host-based antivirus.
-
Host-based antivirus does not have the ability to collect newly created signatures.
-
Network-based can protect against infection from malicious files at rest.
Correct Answer: A
Question No.13
Which definition of the virtual address space for a Windows process is true?
-
actual physical location of an object in memory
-
set of virtual memory addresses that it can use
-
set of pages that are currently resident in physical memory
-
system-level memory protection feature that is built into the operating system
Correct Answer: B
Question No.14
DRAG DROP
Drag the data source on the left to the left to the correct data type on the right.
Correct Answer:
Question No.15
Which statement about digitally signing a document is true?
-
The document is hashed and then the document is encrypted with the private key.
-
The document is hashed and then the hash is encrypted with the private key.
-
The document is encrypted and then the document is hashed with the public key
-
The document is hashed and then the document is encrypted with the public key.
Correct Answer: B
Question No.16
For which reason can HTTPS traffic make security monitoring difficult?
-
encryption
-
large packet headers
-
Signature detection takes longer.
-
SSL interception
Correct Answer: A
Question No.17
Which cryptographic key is contained in an X.509 certificate?
-
symmetric
-
public
-
private
-
asymmetric
Correct Answer: B
Question No.18
Which two features must a next generation firewall include? (Choose two.)
-
data mining
-
host-based antivirus
-
application visibility and control
-
Security Information and Event Management
-
intrusion detection system
Correct Answer: CE
Question No.19
Which directory is commonly used on Linux systems to store log files, including syslog and apache access logs?
-
/etc/log
-
/root/log
-
/lib/log
-
/var/log
Correct Answer: D
Question No.20
Cisco pxGrid has a unified framework with an open API designed in a hub-and-spoke architecture. pxGrid is used to enable the sharing of contextual-based information from which devices?
-
From a Cisco ASA to the Cisco OpenDNS service
-
From a Cisco ASA to the Cisco WSA
-
From a Cisco ASA to the Cisco FMC
-
From a Cisco ISE session directory to other policy network systems, such as Cisco IOS devices and the Cisco ASA
Correct Answer: D
Get Full Version of the Exam
210-250 Dumps
210-250 VCE and PDF