Get Full Version of the Exam
http://www.EnsurePass.com/210-255.html
Question No.1
Refer to the exhibit. We have performed a malware detection on the Cisco website. Which statement about the result is true?
-
The website has been marked benign on all 68 checks.
-
The threat detection needs to run again.
-
The website has 68 open threats.
-
The website has been marked benign on 0 checks.
Correct Answer: A
Question No.2
Which information must be left out of a final incident report?
-
server hardware configurations
-
exploit or vulnerability used
-
impact and/or the financial loss
-
how the incident was detected
Correct Answer: A
Question No.3
Refer to the exhibit. Which type of log is this an example of?
-
syslog
-
NetFlow log
-
proxy log
-
IDS log
Correct Answer: D
Question No.4
Refer to the Exhibit. A customer reports that they cannot access your organization#39;s website.
Which option is a possible reason that the customer cannot access the website?
-
The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.
-
The server at 10.67.10.5 has a virus.
-
A vulnerability scanner has shown that 10.67.10.5 has been compromised.
-
Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.
Correct Answer: D
Question No.5
DRAG DROP
Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the PCAP file on the right.
Correct Answer:
Question No.6
Which CVSSv3 metric captures the level of access that is required for a successful attack?
-
attack vector
-
attack complexity
-
privileges required
-
user interaction
Correct Answer: C
Question No.7
Refer to the exhibit. Which packet contains a file that is extractable within Wireshark?
A. 1986
B. 2318
C. 2542
D. 2317
Correct Answer: C
Question No.8
Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable component?
-
confidentiality
-
integrity
-
availability
-
complexity
Correct Answer: B
Question No.9
What mechanism does the Linux operating system provide to control access to files?
-
privileges required
-
user interaction
-
file permissions
-
access complexity
Correct Answer: C
Question No.10
DRAG DROP
Refer to the exhibit. Drag and drop the element name from the left onto the correct piece of the NetFlow v5 record from a security event on the right.
Correct Answer:
Get Full Version of the Exam
210-255 Dumps
210-255 VCE and PDF