aiotestking uk

210-250 Exam Questions - Online Test


210-250 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which concern is important when monitoring NTP servers for abnormal levels of traffic?

A. Being the cause of a distributed reflection denial of service attack.

B. Users changing the time settings on their systems.

C. A critical server may not have the correct time synchronized.

D. Watching for rogue devices that have been added to the network.

Answer: C

Q2. If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

A. input validation

B. hash collision

C. command injection

D. integer overflow

Answer: B

Q3. Which network device is used to separate broadcast domains?

A. router

B. repeater

C. switch

D. bridge

Answer: A

Q4. Which definition of a process in Windows is true?

A. running program

B. unit of execution that must be manually scheduled by the application

C. database that stores low-level settings for the OS and for certain applications

D. basic unit to which the operating system allocates processor time

Answer: C

Q5. Which two features must a next generation firewall include? (Choose two.)

A. data mining

B. host-based antivirus

C. application visibility and control

D. Security Information and Event Management

E. intrusion detection system

Answer: D,E

Q6. One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

A. Confidentiality, Integrity, and Availability

B. Confidentiality, Identity, and Availability

C. Confidentiality, Integrity, and Authorization

D. Confidentiality, Identity, and Authorization

Answer: A

Q7. Refer to the exhibit. 

During an analysis this list of email attachments is found. Which files contain the same content?

A. 1 and 4

B. 3 and 4

C. 1 and 3

D. 1 and 2

Answer: B

Q8. Which security monitoring data type is associated with application server logs?

A. alert data

B. statistical data

C. session data

D. transaction data

Answer: A

Q9. Which two protocols are used for email (Choose two )

A. NTP

B. DNS

C. HTTP

D. IMAP

E. SMTP

Answer: C,E

Q10. Which directory is commonly used on Linux systems to store log files, including syslog and

apache access logs?

A. /etc/log

B. /root/log

C. /lib/log

D. /var/log

Answer: A