CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals v1.0 (210-250)

Page:    1 / 76   
Total 1146 questions

Which data can be obtained using NetFlow?

  • A. session data
  • B. applicationlogs
  • C. network downtime report
  • D. full packet capture


Answer : A

Which situation indicates application-level whitelisting?

  • A. Allow everything and deny specific executable files.
  • B. Allow specific executable files and deny specific executable files.
  • C. Writing current application attacks on a whiteboard daily.
  • D. Allow specific files and deny everything else.


Answer : D

Which definition of an antivirus program is true?

  • A. program used to detect and remove unwanted malicious software from the system
  • B. program that provides real-time analysis of security alerts generated by network hardware and applications
  • C. program that scans a running application for vulnerabilities
  • D. rules that allow network traffic to go in and out


Answer : A


Refer to the exhibit. During an analysis, this list of email attachments is found. Which files contain the same content?

  • A. 1 and 4
  • B. 3 and 4
  • C. 1 and 3
  • D. 1 and 2


Answer : C

Which type of attack occurs when an attacker utilizes a botnet to reflect requests off an NTP server to overwhelm their target?

  • A. main in the middle
  • B. denial of service
  • C. distributed denial of service
  • D. replay


Answer : C

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?

  • A. NAT
  • B. NTP
  • C. RFC 1631
  • D. RFC 1918


Answer : A

Which NTP command configures the local device as an NTP reference clock source?

  • A. ntp peer
  • B. ntp broadcast
  • C. ntp master
  • D. ntp server


Answer : C

Which three options are types of Layer 2 network attack? (Choose three.)

  • A. ARP attacks
  • B. brute force attacks
  • C. spoofing attacks
  • D. DDOS attacks
  • E. VLAN hopping
  • F. botnet attacks


Answer : ACE

If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?

  • A. 1
  • B. 2
  • C. 4
  • D. 8


Answer : C

Where does routing occur within the DoD TCP/IP reference model?

  • A. application
  • B. internet
  • C. network
  • D. transport


Answer : B

What is PHI?

  • A. Protected HIPAA information
  • B. Protected health information
  • C. Personal health information
  • D. Personal human information


Answer : B

Which of the following are Cisco cloud security solutions?

  • A. CloudDLP
  • B. OpenDNS
  • C. CloudLock
  • D. CloudSLS


Answer : BC

What is a trunk link used for?

  • A. To pass multiple virtual LANs
  • B. To connect more than two switches
  • C. To enable Spanning Tree Protocol
  • D. To encapsulate Layer 2 frames


Answer : A

At which OSI layer does a router typically operate?

  • A. Transport
  • B. Network
  • C. Data link
  • D. Application


Answer : B

Cisco pxGrid has a unified framework with an open API designed in a hub-and-spoke architecture. pxGrid is used to enable the sharing of contextual-based information from which devices?

  • A. From a Cisco ASA to the Cisco OpenDNS service
  • B. From a Cisco ASA to the Cisco WSA
  • C. From a Cisco ASA to the Cisco FMC
  • D. From a Cisco ISE session directory to other policy network systems, such as Cisco IOS devices and the Cisco ASA


Answer : D

Page:    1 / 76   
Total 1146 questions