Braindump2go Free Cisco, Microsoft, CompTIA, VMware, Oracle Exam Questions ,PDF & VCE Dumps Download

[Dec-2018]210-250 VCE and 210-250 PDF Free Download in Braindump2go[Q77-87]

Dec/2018 Braindump2go 210-250 Exam Dumps with PDF and VCE New Updated Today! Following are some new 210-250 Real Exam Questions:

1.|2018 Latest 210-250 Exam Dumps (PDF & VCE) 152Q Download:

2.|2018 Latest 210-250 Exam Questions & Answers Download:

Stateful and traditional firewalls can analyze packets and judge them against a set of predetermined rules called access control lists (ACLs).
They inspect which of the following elements within a packet? (Choose Two)

A. Session headers
B. NetFlow flow information
C. Source and destination ports and source and destination IP addresses
D. Protocol information

Answer: CD

In which case should an employee return his laptop to the organization?

A. When moving to a different role
B. Upon termination of the employment
C. As described in the asset return policy
D. When the laptop is end of lease

Answer: C

Which of the following are metrics that can measure the effectiveness of a runbook?

A. Mean time to repair (MTTR)
B. Mean time between failures (MTBF)
C. Mean time to discover a security incident
D. All of the above

Answer: D

Which of the following access control models use security labels to make access decisions?

A. Mandatory access control (MAC)
B. Role-based access control (RBAC)
C. Identity-based access control (IBAC)
D. Discretionary access control (DAC)

Answer: A
MAC uses security labels for access decisions.

Where are configuration records stored?

A. In a CMDB
B. In a MySQL DB
C. In a XLS file
D. There is no need to store them

Answer: A

Which of the following is true about heuristic-based algorithms?

A. Heuristic-based algorithms may require fine tuning to adapt to network traffic and minimize
the possibility of false positives.
B. Heuristic-based algorithms do not require fine tuning.
C. Heuristic-based algorithms support advanced malware protection.
D. Heuristic-based algorithms provide capabilities for the automation of IPS signature creation and tuning.

Answer: A

How many broadcast domains are created if three hosts are connected to a Layer 2 switch in full-duplex mode?

A. 4
B. 3
C. None
D. 1

Answer: D

What is one of the advantages of the mandatory access control (MAC) model?

A. Stricter control over the information access.
B. Easy and scalable.
C. The owner can decide whom to grant access to.
D. Complex to administer.

Answer: A
Strict control over the access to resources is one of the main advantages of MAC.

According to the attribute-based access control (ABAC) model, what is the subject location considered?

A. Part of the environmental attributes
B. Part of the object attributes
C. Part of the access control attributes
D. None of the above

Answer: A

What type of algorithm uses the same key to encryp and decrypt data?

A. a symmetric algorithm
B. an asymetric algorithm
C. a Public Key infrastructure algorithm
D. an IP Security algorithm

Answer: A

Which actions can a promiscuous IPS take to mitigate an attack?

A. modifying packets
B. requesting connection blocking
C. denying packets
D. resetting the TCP connection
E. requesting host blocking
F. denying frames

Answer: BDE


1.|2018 Latest 210-250 Exam Dumps (PDF & VCE) 152Q Download:

2.|2018 Latest 210-250 Study Guide Video: