[Dec-2018]210-250 PDF and VCE Dumps Free Download in Braindump2go[Q77-87]

Dec/2018 Braindump2go 210-250 Exam Dumps with PDF and VCE New Updated Today! Following are some new 210-250 Real Exam Questions:

1.|2018 Latest 210-250 Exam Dumps (PDF & VCE) 152Q Download:

https://www.braindump2go.com/210-250.html

2.|2018 Latest 210-250 Exam Questions & Answers Download:

https://drive.google.com/drive/folders/0B75b5xYLjSSNekdxX05OVnFXRXc?usp=sharing

QUESTION 77
Stateful and traditional firewalls can analyze packets and judge them against a set of predetermined rules called access control lists (ACLs).
They inspect which of the following elements within a packet? (Choose Two)

A. Session headers
B. NetFlow flow information
C. Source and destination ports and source and destination IP addresses
D. Protocol information

Answer: CD

QUESTION 78
In which case should an employee return his laptop to the organization?

A. When moving to a different role
B. Upon termination of the employment
C. As described in the asset return policy
D. When the laptop is end of lease

Answer: C

QUESTION 79
Which of the following are metrics that can measure the effectiveness of a runbook?

A. Mean time to repair (MTTR)
B. Mean time between failures (MTBF)
C. Mean time to discover a security incident
D. All of the above

Answer: D

QUESTION 80
Which of the following access control models use security labels to make access decisions?

A. Mandatory access control (MAC)
B. Role-based access control (RBAC)
C. Identity-based access control (IBAC)
D. Discretionary access control (DAC)

Answer: A
Explanation:
MAC uses security labels for access decisions.

QUESTION 81
Where are configuration records stored?

A. In a CMDB
B. In a MySQL DB
C. In a XLS file
D. There is no need to store them

Answer: A

QUESTION 82
Which of the following is true about heuristic-based algorithms?

A. Heuristic-based algorithms may require fine tuning to adapt to network traffic and minimize
the possibility of false positives.
B. Heuristic-based algorithms do not require fine tuning.
C. Heuristic-based algorithms support advanced malware protection.
D. Heuristic-based algorithms provide capabilities for the automation of IPS signature creation and tuning.

Answer: A

QUESTION 83
How many broadcast domains are created if three hosts are connected to a Layer 2 switch in full-duplex mode?

A. 4
B. 3
C. None
D. 1

Answer: D

QUESTION 84
What is one of the advantages of the mandatory access control (MAC) model?

A. Stricter control over the information access.
B. Easy and scalable.
C. The owner can decide whom to grant access to.
D. Complex to administer.

Answer: A
Explanation:
Strict control over the access to resources is one of the main advantages of MAC.

QUESTION 85
According to the attribute-based access control (ABAC) model, what is the subject location considered?

A. Part of the environmental attributes
B. Part of the object attributes
C. Part of the access control attributes
D. None of the above

Answer: A

QUESTION 86
What type of algorithm uses the same key to encryp and decrypt data?

A. a symmetric algorithm
B. an asymetric algorithm
C. a Public Key infrastructure algorithm
D. an IP Security algorithm

Answer: A

QUESTION 87
Which actions can a promiscuous IPS take to mitigate an attack?

A. modifying packets
B. requesting connection blocking
C. denying packets
D. resetting the TCP connection
E. requesting host blocking
F. denying frames

Answer: BDE


!!!RECOMMEND!!!

1.|2018 Latest 210-250 Exam Dumps (PDF & VCE) 152Q Download:

https://www.braindump2go.com/210-250.html

2.|2018 Latest 210-250 Study Guide Video:

https://youtu.be/GCdivGceqpY