210-250
Free trial
Verified
Question 1
Which definition of a fork in Linux is true?
- A: daemon to execute scheduled commands
- B: parentdirectory name of a file path name
- C: macros for manipulating CPU sets
- D: new process created by a parent process
Question 2
Which two terms are types of cross site scripting attacks? (Choose two.)
- A: directed
- B: encoded
- C: stored
- D: reflected
- E: cascaded
Question 3
Which of the following is a TCP-injection attack?
- A: Forging a TCP packet over an HTTPS session
- B: Replacing legitimate TCP traffic with forged TCP packets
- C: The addition of a forged TCP packet to an existing TCP session
- D: Modifying the TCP/IP in a way that is unexpected by security detection
Question 4
What determines the class of an IP address?
- A: the number of bits in the host field
- B: the subnet mask
- C: the most significant bit (MSB) pattern
- D: the third octet
Question 5
Which one of the following options is the Class C private IP range?
- A: 192.168.0.0 – 192.168.255.255
- B: 172.16.0.0 – 172.31.255.255
- C: 10.0.0.0 – 10.255.255.255
- D: 192.168.1.0 – 192.168.1.255
Question 6
A host using an IP address from the private IP range needs to connect to a website on the Internet. What function must be performed in order for the device to connect to the web service?
- A: ACL
- B: NAT
- C: PBR
- D: PfR
Question 7
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?
- A: exploit kit
- B: root kit
- C: vulnerability kit
- D: script kiddie kit
Question 8
Which one of these source ports does a client dynamically use when it connects to a server that is listening on a well-known port?
- A: ephemeral
- B: registered
- C: well-known
- D: first available port on the client system
Question 9
How many messages are exchanged in a DHCP transaction?
- A: one
- B: two
- C: three
- D: four
Question 10
Which one of the following options describes the protocol and port that is used by DNS?
- A: TCP 53
- B: UDP 53
- C: UDP 53 and TCP 53
- D: any registered port
Question 11
Which term represents a potential danger that could take advantage of a weakness in a system?
- A: vulnerability
- B: risk
- C: threat
- D: exploit
Question 12
In which one of the following layers of the OSI model does the router primarily operate?
- A: Layer 2
- B: Layer 3
- C: Layer 4
- D: Layer 7
Question 13
Which three types of devices can do network address translation (NAT)? (Choose three.)
- A: routers
- B: Layer 3 switches
- C: bridges
- D: wireless access points
- E: proxy servers
- F: firewalls
Question 14
Which TCP flag(s) must be set in a packet in order for the packet to match an ACL entry that contains the established keyword?
- A: SYN only
- B: ACK only
- C: RST only
- D: SYN or ACK
- E: ACK or RST
Question 15
Which two of the following statements are true regarding the DHCP relay agent? (Choose two.)
- A: DHCP relay is required if the DHCP clients and the DHCP servers are located in the same broadcast domain
- B: The DHCP server uses the ciaddr IP address to select an IP address pool from which to assign the IP addresses to the DHCP client.
- C: The primary function of a DHCP relay agent is to relay the DHCP messages from the local DHCP clients to the remote DHCP servers.
- D: DHCP discovery messages are broadcasted from the DHCP relay agent to the DHCP servers.
- E: When the DHCP relay agent receives a broadcast packet from a connected client, it changes the giaddr field from zero to the relay agent IP address, and forwards the message to the DHCP server.
Question 16
Which International standard is for general risk management, including the principles and guidelines for managing risk?
- A: ISO 27001
- B: ISO 27005
- C: ISO 31000
- D: ISO 27002
Question 17
In computer security, which information is the term PHI used to describe?
- A: private host information
- B: protected health information
- C: personal health information
- D: protected host information
Question 18
When using the 802.1Q frame tagging protocol, how much additional overhead does the protocol add to the frame structure?
- A: 8 bytes
- B: 4 bytes
- C: 2 bytes
- D: 16 bytes
- E: no impact to frame overhead
Question 19
DRAG DROP -
Match the router preference to the correct routing sequence (most preferred is 1; least preferred is 3).
Select and Place:
Question 20
Which option is an advantage to using network-based anti-virus versus host-based anti- virus?
- A: Network-based has the ability to protect unmanaged devices and unsupported operating systems.
- B: There are no advantages compared to host-based antivirus.
- C: Host-based antivirus does not have the ability to collect newly created signatures.
- D: Network-based can protect against infection from malicious files at rest.
Question 21
Which three of the following statements are true regarding ACLs? (Choose three.)
- A: ACLs provide packet filtering for routers and firewalls to protect network segments that require more security.
- B: ACLs are used to perform stateful packets inspections and filtering on routers and firewalls.
- C: ACLs provide a basic level of security and control the packets that pass through the routers or firewalls, preventing them from getting to the different parts of the network.
- D: At a minimum, it is important to configure the ACLs on the network edge routers or firewalls.
- E: ACLs can be applied only at the inbound direction and not at the outbound direction.
That’s the end of your free questions
You’ve reached the preview limit for 210-250Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!