210-255 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/210-255.html

Question No.1

Refer to the exhibit. We have performed a malware detection on the Cisco website. Which statement about the result is true?

image

A.

The website has been marked benign on all 68 checks.

B.

The threat detection needs to run again.

C.

The website has 68 open threats.

D.

The website has been marked benign on 0 checks.

Correct Answer: A

Question No.2

Which information must be left out of a final incident report?

A.

server hardware configurations

B.

exploit or vulnerability used

C.

impact and/or the financial loss

D.

how the incident was detected

Correct Answer: A

Question No.3

Refer to the exhibit. Which type of log is this an example of?

image

A.

syslog

B.

NetFlow log

C.

proxy log

D.

IDS log

Correct Answer: D

Question No.4

Refer to the Exhibit. A customer reports that they cannot access your organization#39;s website. Which option is a possible reason that the customer cannot access the website?

image

A.

The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.

B.

The server at 10.67.10.5 has a virus.

C.

A vulnerability scanner has shown that 10.67.10.5 has been compromised.

D.

Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.

Correct Answer: D

Question No.5

DRAG DROP

Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.

image

Correct Answer:

image

Question No.6

Which CVSSv3 metric captures the level of access that is required for a successful attack?

A.

attack vector

B.

attack complexity

C.

privileges required

D.

user interaction

Correct Answer: C

Question No.7

Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?

image

A.

1986

B.

2318

C.

2542

D.

2317

Correct Answer: C

Question No.8

Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable component?

A.

confidentiality

B.

integrity

C.

availability

D.

complexity

Correct Answer: B

Question No.9

What mechanism does the Linux operating system provide to control access to files?

A.

privileges required

B.

user interaction

C.

file permissions

D.

access complexity

Correct Answer: C

Question No.10

DRAG DROP

Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the NetFlow v5 record from a security event on the right.

image

Correct Answer:

image

Get Full Version of 210-255 Dumps

Leave a Reply

Your email address will not be published. Required fields are marked *