Free Cisco Exams Learning Center Blog

210-255 Exam Questions | A customer reports that they cannot access your organization’s….

Question 9:

Refer to the Exhibit.

A customer reports that they cannot access your organization’s website. Which option is a possible reason that
the customer cannot access the website?
A. The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.
B. The server at 10.67.10.5 has a virus.
C. A vulnerability scanner has shown that 10.67.10.5 has been compromised.
D. Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.
Answer: D
Explanation:
Every firewall has its own database where it maintains the website reputation on terms of security, ease of
access, performance etc and below certain score (generally 7 in case of Cisco), firewalls block access to the
sites. For example, you can visit www.senderbase.org and enter name of any website and you will see the
reputation of that website.

210-255 Dumps | Which CVSSv3 metric value increases when the attacker is….

Question 8:

Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable
component?
A. confidentiality
B. integrity
C. availability
D. complexity
Answer: B
Explanation:
Consider a vulnerability in an Internet service such as web, email, or DNS that allows an attacker to
modify or delete all web files in a directory would incur an impact to Integrity only, rather than
Availability. The reason is that the web service is still performing properly – it just happens to be
serving back altered content.

700-651 Real Exam Dumps | Which Cisco UCL plans support all Cisco….

Question 7:

Which Cisco UCL plans support all Cisco user devices?
A. Basic and Enhanced
B. Enhanced and Enhanced Plus
C. Essential and Enhanced Plus
D. Essential and Basic
Answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/admin/10_0_1/ccmfeat/CUCM_BK_F3AC1C0F_0

Cisco 210-255 Practice Questions | Which two components are included in a 5-tuple….

Question 7:

Which two components are included in a 5-tuple? (Choose two.)
A. port number
B. destination IP address
C. data packet
D. user name
E. host logs
Answer: A B
Explanation:
The source and destination addresses are primary 5-tuple components. The source address is the IP address of
the network that creates and sends a data packet, and the destination address is the recipient.

700-651 Pdf Dumps | For on-premises deployments, which option does Cisco recommend….

Question 6:

For on-premises deployments, which option does Cisco recommend for a consistent one meeting experience
and full interoperability’?
A. Cisco Telepresence Server
B. Cisco Meeting Server
C. Cisco Expressway
D. Cisco Conductor
Answer: B
Explanation:
Cisco Meeting Server provides a consistent one-meeting experience for every meeting attendee, as well as
open interoperability, all based on a highly scalable software architecture supporting business-quality meetings
from mobile through immersive via audio, video, and web. The software has two major elements: the server
software and an extension of the server in the form of an app/client that Knowledge Workers use to access and
control their meetings. Cisco Meeting Server supports standards-based video endpoints, including the Cisco
portfolio of telepresence endpoints as well as third-party solutions such as Skype for Business. It includes
Personal Multiparty (PMP) and Shared Multiparty (SMP) licenses, Multibrand license, and Recording port
licenses
https://www.cisco.com/c/en/us/products/collateral/unified-communications/spark-flex-plan/datasheet-c78-740394.

Free 210-255 Dumps | In Microsoft Windows, as files are deleted the space they were….

Question 6:

In Microsoft Windows, as files are deleted the space they were allocated eventually is considered available for
use by other files. This creates alternating used and unused areas of various sizes. What is this called?
A. network file storing
B. free space fragmentation
C. alternate data streaming
D. defragmentation
Answer: B
Explanation:
Free (unallocated) space fragmentation occurs when there are several unused areas of the file system
where new files or meta data can be written to. Unwanted free space fragmentation is generally caused
by deletion or truncation of files, but file systems may also intentionally insert fragments (“bubbles”) of
free space in order to facilitate extending nearby files

210-255 Dumps | Which process is being utilized when IPS events are removed….

Question 5:

Which process is being utilized when IPS events are removed to improve data integrity?
A. data normalization
B. data availability
C. data protection
D. data signature
Answer: A
Explanation
Data normalization is the process of intercepting and storing incoming data so it exists in one form only.
This eliminates redundant data and protects the data’s integrity.
Link: https://www.helpnetsecurity.com/2013/01/07/the-importance-of-data-normalization-in-ips/