210-250 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Exam
http://www.EnsurePass.com/210-250.html

Question No.51

Which process continues to be recorded in the process table after it has ended and the status is returned to the parent?

A.

orphan

B.

child

C.

daemon

D.

zombie

Correct Answer: D

Question No.52

In which case should an employee return his laptop to the organization?

A.

When moving to a different role

B.

Upon termination of the employment

C.

As described in the asset return policy

D.

When the laptop is end of lease

Correct Answer: C

Question No.53

Which international standard is for general risk management, including the principles and guidelines for managing risk?

A.

ISO 27002

B.

ISO 31000

C.

ISO 27005

D.

ISO 27001

Correct Answer: B

Explanation:

ISO 31000 is the general risk management standard that includes principles and guidelines for managing risk. It can be used by any organization, regardless of its size, activity, or sector. Using ISO 31000 can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats, and effectively allocate and use resources for risk treatment.

Question No.54

For which purpose can Windows Management Instrumentation be used?

A.

remote start of a computer

B.

remote reboot of a computer

C.

remote blocking of malware on a computer

D.

remote viewing of a computer

Correct Answer: D

Question No.55

DRAG DROP

Drag the technology on the left to the data type the technology provides on the right.

image

Correct Answer:

image

Question No.56

Which two actions are valid uses of public key infrastructure? (Choose two)

A.

ensuring the privacy of a certificate

B.

revoking the validation of a certificate

C.

validating the authenticity of a certificate

D.

creating duplicate copies of a certificate

E.

changing ownership of a certificate

Correct Answer: AC

Question No.57

What are the advantages of a full-duplex transmission mode compared to half-duplex mode? (Select all that apply.)

A.

Each station can transmit and receive at the same time.

B.

It avoids collisions.

C.

It makes use of backoff time.

D.

It uses a collision avoidance algorithm to transmit.

Correct Answer: AB

Question No.58

Based on which statement does the discretionary access control security model grant or restrict access?

A.

discretion of the system administrator

B.

security policy defined by the owner of an object

C.

security policy defined by the system administrator

D.

role of a user within an organization

Correct Answer: B

Question No.59

Which hash algorithm is the weakest?

A.

SHA-512

B.

RSA 4096

C.

SHA-1

D.

SHA-256

Correct Answer: C

Question No.60

Where is a host-based intrusion detection system located?

A.

on a particular end-point as an agent or a desktop application

B.

on a dedicated proxy server monitoring egress traffic

C.

on a span switch port

D.

on a tap switch port

Correct Answer: A

Get Full Version of 210-250 Dumps

Leave a Reply

Your email address will not be published. Required fields are marked *