aiotestking uk

210-250 Exam Questions - Online Test


210-250 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Based on which statement does the discretionary access control security model grant or restrict access ?

A. discretion of the system administrator

B. security policy defined by the owner of an object

C. security policy defined by the system administrator

D. role of a user within an organization

Answer: A

Q2. Which definition describes the main purpose of a Security Information and Event Management solution ?

A. a database that collects and categorizes indicators of compromise to evaluate and search for potential security threats

B. a monitoring interface that manages firewall access control lists for duplicate firewall filtering

C. a relay server or device that collects then forwards event logs to another log collection device

D. a security product that collects, normalizes, and correlates event log data to provide holistic views of the security posture

Answer: D

Q3. Which definition of Windows Registry is true?

A. set of pages that are currently resident m physical memory

B. basic unit to which the operating system allocates processor time

C. set of virtual memory addresses

D. database that stores low-level settings for the operating system

Answer: C

Q4. Which hash algorithm is the weakest?

A. SHA-512

B. RSA 4096

C. SHA-1

D. SHA-256

Answer: D

Q5. Where is a host-based intrusion detection system located?

A. on a particular end-point as an agent or a desktop application

B. on a dedicated proxy server monitoring egress traffic

C. on a span switch port

D. on a tap switch port

Answer: D

Q6. Which directory is commonly used on Linux systems to store log files, including syslog and

apache access logs?

A. /etc/log

B. /root/log

C. /lib/log

D. /var/log

Answer: A

Q7. Which security monitoring data type is associated with application server logs?

A. alert data

B. statistical data

C. session data

D. transaction data

Answer: A

Q8. Which two protocols are used for email (Choose two )

A. NTP

B. DNS

C. HTTP

D. IMAP

E. SMTP

Answer: C,E

Q9. Which definition of a fork in Linux is true?

A. daemon to execute scheduled commands

B. parent directory name of a file pathname

C. macros for manipulating CPU sets

D. new process created by a parent process

Answer: C

Q10. Which term represents a weakness in a system that could lead to the system being compromised?

A. vulnerability

B. threat

C. exploit

D. risk

Answer: A