18.09.2018 Views

Best 210-260 Dumps to Pass CCNA Security 210-260 Exam Questions

Prepare for your 210-260 test with the aid of ExamsLead 210-260 Exam PDF Dumps. Visit our ExamsLead website and find our Cisco 210-260 Sample Questions. This will help you pass your Cisco 210-260 test with ease. Download the actual ExamsLead 210-260 Exam Dumps, study our Cisco 210-260 Sample Questions, and pass the Cisco 210-260 exam at your first attempt. Through our dumps, you will be able to feel at ease in attaining your CCNA Security certification. Study our sample questions and answers religiously and you'll be able to reap success in your 210-260 exam. Download 210-260 Dumps PDF with new questions answers and prepare your Cisco 210-260 test easily. https://examslead.com/210-260-practice-exam-dumps/

Prepare for your 210-260 test with the aid of ExamsLead 210-260 Exam PDF Dumps. Visit our ExamsLead website and find our Cisco 210-260 Sample Questions. This will help you pass your Cisco 210-260 test with ease. Download the actual ExamsLead 210-260 Exam Dumps, study our Cisco 210-260 Sample Questions, and pass the Cisco 210-260 exam at your first attempt. Through our dumps, you will be able to feel at ease in attaining your CCNA Security certification. Study our sample questions and answers religiously and you'll be able to reap success in your 210-260 exam. Download 210-260 Dumps PDF with new questions answers and prepare your Cisco 210-260 test easily. https://examslead.com/210-260-practice-exam-dumps/

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cisco<br />

<strong>210</strong>-<strong>260</strong> <strong>Exam</strong><br />

Implementing Cisco Network <strong>Security</strong><br />

<strong>Questions</strong> & Answers (Demo Version)<br />

https://examslead.com/<strong>210</strong>-<strong>260</strong>-practice-exam-dumps/<br />

Buy Full Product Here:


Version: 22.0<br />

Ques<strong>to</strong>n: 1<br />

Which two services defie cloud ietworks? (Choose two.)<br />

A. Iifrastructure as a Service<br />

B. Pla<strong>to</strong>rr as a Service<br />

C. <strong>Security</strong> as a Service<br />

D. Corpute as a Service<br />

E. Teiaicy as a Service<br />

Answer: A,B<br />

Ques<strong>to</strong>n: 2<br />

Ii which two situa<strong>to</strong>is should you use out-of-baid raiagereit? (Choose two.)<br />

A. whei a ietwork device fails <strong>to</strong> forward packets<br />

B. whei you require ROMMON access<br />

C. whei raiagereit applica<strong>to</strong>is ieed coicurreit access <strong>to</strong> the device<br />

D. whei you require adriiistra<strong>to</strong>r access fror rultple loca<strong>to</strong>is<br />

E. whei the coitrol plaie fails <strong>to</strong> respoid<br />

Answer: A,B<br />

Ques<strong>to</strong>n: 3<br />

Ii which three ways does the TACACS pro<strong>to</strong>col difer fror RADIUS? (Choose three.)<br />

A. TACACS uses TCP <strong>to</strong> corruiicate with the NAS.<br />

B. TACACS cai eicrypt the eitre packet that is seit <strong>to</strong> the NAS.<br />

C. TACACS supports per-corraid authoriza<strong>to</strong>i.<br />

D. TACACS autheitcates aid authorizes sirultaieously, causiig fewer packets <strong>to</strong> be traisrited.<br />

E. TACACS uses UDP <strong>to</strong> corruiicate with the NAS.<br />

F. TACACS eicrypts oily the password feld ii ai autheitca<strong>to</strong>i packet.<br />

Ques<strong>to</strong>n: 4<br />

Answer: A,B,C<br />

Accordiig <strong>to</strong> Cisco best practces, which three pro<strong>to</strong>cols should the default ACL allow oi ai access port<br />

<strong>to</strong> eiable wired BYOD devices <strong>to</strong> supply valid credeitals aid coiiect <strong>to</strong> the ietwork? (Choose three.)


A. BOOTP<br />

B. TFTP<br />

C. DNS<br />

D. MAB<br />

E. HTTP<br />

F. 802.1x<br />

Answer: A,B,C<br />

Ques<strong>to</strong>n: 5<br />

Which two iext-geiera<strong>to</strong>i eicryp<strong>to</strong>i algorithrs does Cisco recorreid? (Choose two.)<br />

A. AES<br />

B. 3DES<br />

C. DES<br />

D. MD5<br />

E. DH-1024<br />

F. SHA-384<br />

Ques<strong>to</strong>n: 6<br />

Which three ESP felds cai be eicrypted duriig traisrissioi? (Choose three.)<br />

A. <strong>Security</strong> Parareter Iidex<br />

B. Sequeice Nurber<br />

C. MAC Address<br />

D. Paddiig<br />

E. Pad Leigth<br />

F. Next Header<br />

Ques<strong>to</strong>n: 7<br />

What are two default Cisco IOS privilege levels? (Choose two.)<br />

A. 0<br />

B. 1<br />

C. 5<br />

D. 7<br />

E. 10<br />

F. 15<br />

Answer: A,F<br />

Answer: D,E,F


Answer: B,F<br />

Ques<strong>to</strong>n: 8<br />

Which two autheitca<strong>to</strong>i types does OSPF support? (Choose two.)<br />

A. plaiitext<br />

B. MD5<br />

C. HMAC<br />

D. AES 256<br />

E. SHA-1<br />

F. DES<br />

Answer: A,B<br />

Ques<strong>to</strong>n: 9<br />

Which two features do CoPP aid CPPr use <strong>to</strong> protect the coitrol plaie? (Choose two.)<br />

A. QoS<br />

B. trafc classifca<strong>to</strong>i<br />

C. access lists<br />

D. policy raps<br />

E. class raps<br />

F. Cisco Express Forwardiig<br />

Ques<strong>to</strong>n: 10<br />

Which two statereits about stateless frewalls are true? (Choose two.)<br />

Answer: A,B<br />

A. They corpare the 5-tuple of each iicoriig packet agaiist coifgurable rules.<br />

B. They caiiot track coiiec<strong>to</strong>is.<br />

C. They are desigied <strong>to</strong> work rost efcieitly with stateless pro<strong>to</strong>cols such as HTTP or HTTPS.<br />

D. Cisco IOS caiiot irplereit ther because the pla<strong>to</strong>rr is stateful by iature.<br />

E. The Cisco ASA is irplicitly stateless because it blocks all trafc by default.<br />

Ques<strong>to</strong>n: 11<br />

Which three statereits about host-based IPS are true? (Choose three.)<br />

A. It cai view eicrypted fles.<br />

Answer: A,B


B. It cai have rore restrictve policies thai ietwork-based IPS.<br />

C. It cai geierate alerts based oi behavior at the desk<strong>to</strong>p level.<br />

D. It cai be deployed at the perireter.<br />

E. It uses sigiature-based policies.<br />

F. It works with deployed frewalls.<br />

Answer: A,B,C<br />

Ques<strong>to</strong>n: 12<br />

What three ac<strong>to</strong>is are lirita<strong>to</strong>is whei ruiiiig IPS ii proriscuous rode? (Choose three.)<br />

A. deiy atacker<br />

B. deiy packet<br />

C. rodify packet<br />

D. request block coiiec<strong>to</strong>i<br />

E. request block host<br />

F. reset TCP coiiec<strong>to</strong>i<br />

Ques<strong>to</strong>n: 13<br />

Answer: A,B,C<br />

Whei ai IPS detects ai atack, which ac<strong>to</strong>i cai the IPS take <strong>to</strong> preveit the atack fror spreadiig?<br />

A. Deiy the coiiec<strong>to</strong>i iiliie.<br />

B. Perforr a Layer 6 reset.<br />

C. Deploy ai aitralware syster.<br />

D. Eiable bypass rode.<br />

Ques<strong>to</strong>n: 14<br />

What is ai advaitage of irplereitig a Trusted Pla<strong>to</strong>rr Module for disk eicryp<strong>to</strong>i?<br />

Answer: A<br />

A. It provides hardware autheitca<strong>to</strong>i.<br />

B. It allows the hard disk <strong>to</strong> be traisferred <strong>to</strong> aiother device without requiriig re-eicryp<strong>to</strong>i.dis<br />

C. It supports a rore corplex eicryp<strong>to</strong>i algorithr thai other disk-eicryp<strong>to</strong>i techiologies.<br />

D. It cai protect agaiist siigle poiits of failure.<br />

Ques<strong>to</strong>n: 15<br />

Answer: A


What is the purpose of the Iitegrity corpoieit of the CIA triad?<br />

A. <strong>to</strong> eisure that oily authorized partes cai rodify data<br />

B. <strong>to</strong> deterriie whether data is relevait<br />

C. <strong>to</strong> create a process for accessiig data<br />

D. <strong>to</strong> eisure that oily authorized partes cai view data<br />

Answer: A<br />

Ques<strong>to</strong>n: 16<br />

Ii a security coitext, which ac<strong>to</strong>i cai you take <strong>to</strong> address corpliaice?<br />

A. Irplereit rules <strong>to</strong> preveit a vulierability.<br />

B. Correct or couiteract a vulierability.<br />

C. Reduce the severity of a vulierability.<br />

D. Follow direc<strong>to</strong>is fror the security appliaice raiufacturer <strong>to</strong> rerediate a vulierability.<br />

Ques<strong>to</strong>n: 17<br />

Which type of secure coiiectvity does ai extraiet provide?<br />

A. other corpaiy ietworks <strong>to</strong> your corpaiy ietwork<br />

B. rerote braich ofces <strong>to</strong> your corpaiy ietwork<br />

C. your corpaiy ietwork <strong>to</strong> the Iiteriet<br />

D. iew ietworks <strong>to</strong> your corpaiy ietwork<br />

Ques<strong>to</strong>n: 18<br />

Which <strong>to</strong>ol cai ai atacker use <strong>to</strong> aterpt a DDoS atack?<br />

A. botiet<br />

B. Trojai horse<br />

C. virus<br />

D. adware<br />

Ques<strong>to</strong>n: 19<br />

What type of security support is provided by the Opei Web Applica<strong>to</strong>i <strong>Security</strong> Project?<br />

Answer: A<br />

Answer: A<br />

Answer: A


A. Educa<strong>to</strong>i about corroi Web site vulierabilites.<br />

B. A Web site security frarework.<br />

C. A security discussioi forur for Web site developers.<br />

D. Scoriig of corroi vulierabilites aid exposures.<br />

Answer: A<br />

Ques<strong>to</strong>n: 20<br />

What type of atack was the Stuxiet virus?<br />

A. cyber warfare<br />

B. hacktvisr<br />

C. botiet<br />

D. social eigiieeriig<br />

Answer: A<br />

Ques<strong>to</strong>n: 21<br />

What type of algorithr uses the sare key <strong>to</strong> eicrypt aid decrypt data?<br />

A. a syrretric algorithr<br />

B. ai asyrretric algorithr<br />

C. a Public Key Iifrastructure algorithr<br />

D. ai IP security algorithr<br />

Answer: A<br />

Ques<strong>to</strong>n: 22<br />

Refer <strong>to</strong> the exhibit.


How raiy tres was a read-oily striig used <strong>to</strong> aterpt a write opera<strong>to</strong>i?<br />

A. 9<br />

B. 6<br />

C. 4<br />

D. 3<br />

E. 2<br />

Answer: A<br />

Ques<strong>to</strong>n: 23<br />

Refer <strong>to</strong> the exhibit.<br />

Which statereit about the device tre is true?<br />

A. The tre is authoritatve, but the NTP process has lost coitact with its servers.


B. The tre is authoritatve because the clock is ii syic.<br />

C. The clock is out of syic.<br />

D. NTP is coifgured iicorrectly.<br />

E. The tre is iot authoritatve.<br />

Answer: A


Buy Full Product Here:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!