This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Mon Nov 25 7:01:01 2024 / +0000 GMT ___________________________________________________ Title: [2017-New-Version]Official 210-250 Dumps VCE 70q Exam Files Free - Offered By Braindump2go[41-55] --------------------------------------------------- 2017 March New 210-250 Exam Dumps and Exam Questions Free Shared Here Today!Free Instant Download 210-250 Exam Dumps (PDF & VCE) 70Q&As from www.Braindump2go.com Today! 100% Real Exam Questions! 100% Exam Pass Guaranteed! 1.|NEW 210-250 Exam Dumps (PDF & VCE) 70Q&As Download:http://www.braindump2go.com/210-250.html2.|NEW 210-250 Exam Questions & Answers Download:https://1drv.ms/f/s!AvI7wzKf6QBjgnzFpAHsSmXP9zrJ   QUESTION 41Which protocol maps IP network addresses to MAC hardware addresses so that IP packets can be sent across networks? A.    Internet Control Message ProtocolB.    Address Resolution ProtocolC.    Session Initiation ProtocolD.    Transmission Control Protocol/Internet Protocol Answer: A QUESTION 42Which statement about digitally signing a document is true? A.    The document is hashed and then the document is encrypted with the private key.B.    The document is hashed and then the hash is encrypted with the private key.C.    The document is encrypted and then the document is hashed with the public keyD.    The document is hashed and then the document is encrypted with the public key. Answer: C QUESTION 43For which reason can HTTPS traffic make security monitoring difficult? A.    encryptionB.    large packet headersC.    Signature detection takes longer.D.    SSL interception Answer: D QUESTION 44Which directory is commonly used on Linux systems to store log files, including syslog and apache access logs? A.    /etc/logB.    /root/logC.    /lib/logD.    /var/log Answer: A QUESTION 45Which term represents a weakness in a system that could lead to the system being compromised? A.    vulnerabilityB.    threatC.    exploitD.    risk Answer: A QUESTION 46Which definition of Windows Registry is true? A.    set of pages that are currently resident m physical memoryB.    basic unit to which the operating system allocates processor timeC.    set of virtual memory addressesD.    database that stores low-level settings for the operating system Answer: C QUESTION 47Which definition of the IIS Log Parser tool is true? A.    a logging module for IIS that allows you to log to a databaseB.    a data source control to connect to your data sourceC.    a powerful, versatile tool that makes it possible to run SQL-like queries against log fliesD.    a powerful versatile tool that verifies the integrity of the log files Answer: A QUESTION 48Which two actions are valid uses of public key infrastructure? (Choose two ) A.    ensuring the privacy of a certificateB.    revoking the validation of a certificateC.    validating the authenticity of a certificateD.    creating duplicate copies of a certificateE.    changing ownership of a certificate Answer: AC QUESTION 49Which two terms are types of cross site scripting attacks? (Choose two ) A.    directedB.    encodedC.    storedD.    reflectedE.    cascaded Answer: CD QUESTION 50Which network device is used to separate broadcast domains? A.    routerB.    repeaterC.    switchD.    bridge Answer: A QUESTION 51Based on which statement does the discretionary access control security model grant or restrict access ? A.    discretion of the system administratorB.    security policy defined by the owner of an objectC.    security policy defined by the system administratorD.    role of a user within an organization Answer: A QUESTION 52Which cryptographic key is contained in an X.509 certificate? A.    symmetricB.    publicC.    privateD.    asymmetric Answer: D QUESTION 53Which two activities are examples of social engineering? (Choose two) A. receiving call from the IT department asking you to verify your username/password to maintain the accountB. receiving an invite to your department's weekly WebEx meetingC. sending a verbal request to an administrator to change the password to the account of a user the administrator does knowD. receiving an email from MR requesting that you visit the secure HR website and update your contract informationE. receiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company A.    B.    C.    D.    Answer: QUESTION 54Which hash algorithm is the weakest? A.    SHA-512B.    RSA 4096C.    SHA-1D.    SHA-256 Answer: D QUESTION 55A user reports difficulties accessing certain external web pages, When examining traffic to and from the external domain in full packet captures, you notice many SYNs that have the same sequence number, source, and destination IP address, but have different payloads. Which problem is a possible explanation of this situation? A.    insufficient network resourcesB.    failure of full packet capture solutionC.    misconfiguration of web filterD.    TCP injection Answer: A !!!RECOMMEND!!! 1.|NEW 210-250 Exam Dumps (PDF & VCE) 70Q&As Download:http://www.braindump2go.com/210-250.html 2.|NEW 210-250 Study Guide Video: YouTube Video: YouTube.com/watch?v=LMVKGDJtwow --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-03-13 06:52:03 Post date GMT: 2017-03-13 06:52:03 Post modified date: 2017-03-13 06:52:03 Post modified date GMT: 2017-03-13 06:52:03 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com