Pass Cisco 210-260 Exam With 100% Guarantee: Implementing Cisco Network Security
Pass Cisco 210-260 Exam With 100% Guarantee: Implementing Cisco Network Security
Pass Cisco 210-260 Exam With 100% Guarantee: Implementing Cisco Network Security
html
2019 Latest lead4pass 210-260 PDF and VCE dumps Download
210-260Q&As
Implementing Cisco Network Security
Free Download Real Questions & Answers PDF and VCE file from:
https://www.lead4pass.com/210-260.html
QUESTION 1
Which command should be used to enable AAA authentication to determine if a user can access the privilege command
level?
Correct Answer: B
QUESTION 2
What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?
A. It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January
1, 2014 and continue using the key indefinitely.
B. It configures the device to begin transmitting the authentication key to other devices at 23:59:00 local time on
December 31, 2013 and continue using the key indefinitely.
C. It configures the device to begin accepting the authentication key from other devices immediately and stop accepting
the key at 23:59:00 local time on December 31, 2013.
D. It configures the device to generate a new authentication key and transmit it to other devices at 23:59:00 local time
on December 31, 2013.
E. It configures the device to begin accepting the authentication key from other devices at 23:59:00 local time on
December 31, 2013 and continue accepting the key indefinitely.
F. It configures the device to begin accepting the authentication key from other devices at 00:00:00 local time on
January 1, 2014 and continue accepting the key indefinitely.
Correct Answer: B
QUESTION 3
Correct Answer: C
QUESTION 4
A. 0.0.0.31
B. 0.0.027
C. 0.0.0.224
D. 0.0.0.255
Correct Answer: A
QUESTION 5
What show command can see vpn tunnel establish with traffic passing through.
C. (config-if)#
Correct Answer: A
QUESTION 6
Correct Answer: A
QUESTION 7
Using a stateful packet firewall and given an inside ACL entry of permit ip 192.16.1.0 0.0.0.255 any, what would be the
resulting dynamically configured ACL for the return traffic on the outside ACL?
Correct Answer: A
QUESTION 8
In which stage of an attack does the attacker discover devices on a target network?
A. Reconnaissance
B. Covering tracks
C. Gaining access
D. Maintaining access
Correct Answer: A
QUESTION 9
Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)
A. FTP
B. SSH
C. Telnet
D. AAA
E. HTTPS
F. HTTP
Correct Answer: BE
QUESTION 10
Which option describes information that must be considered when you apply an access list to a physical interface?
Correct Answer: C
QUESTION 11
Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)
A. Smart tunnels can be used by clients that do not have administrator privileges
D. Smart tunnels require the client to have the application installed locally
Correct Answer: AC
QUESTION 12
Which two types of VLANs using PVLANs are valid? (Choose two.)
A. secondary
B. community
C. isolated
D. promiscuous
E. backup
Correct Answer: CD
Promiscuous (P) :- Usually connects to a router – a type of a port which is allowed to send and receive frames from any
other port on the VLAN. Isolated (I) : This type of port is only allowed to communicate with P ports – they are “stub”.
This type of ports usually connects to hosts.
https://learningnetwork.cisco.com/docs/DOC-16110
QUESTION 13
If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?
C. The switch with the higher native VLAN may shut down
D. The interface with the lower native VLAN may shut down
Correct Answer: B
QUESTION 14
Which three ESP fields can be encrypted during transmission? (Choose three.)
B. Sequence Number
C. MAC Address
D. Padding
E. Pad Length
F. Next Header
QUESTION 15
What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?
A. split tunneling
B. hairpinning
C. tunnel mode
D. transparent mode
Correct Answer: A
QUESTION 16
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
Correct Answer: A
QUESTION 17
A. plaintext
B. MD5
C. HMAC
D. AES 256
E. SHA-1
F. DES
Correct Answer: AB
QUESTION 18
B. class maps
C. policy maps
D. route maps
Correct Answer: A
QUESTION 19
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured
A. nat
B. peer
C. pfs
D. reverse-route
E. transform-set
Correct Answer: BE
QUESTION 20
Which two characteristics of the TACACS+ protocol are true? (Choose two.)
Correct Answer: BC
http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml
Packet Encryption RADIUS encrypts only the password in the access-request packet, from the client to the server. The
remainder of the packet is unencrypted. Other information, such as username, authorized services, and accounting, can
be captured by a third party. TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+ header.
Within the header is a field that indicates whether the body is encrypted or not. For debugging purposes, it is useful to
have the body of the packets unencrypted. However, during normal operation, the body of the packet is fully encrypted
for more secure communications. Authentication and Authorization RADIUS combines authentication and authorization.
The access-accept packets sent by the RADIUS server to the client contain authorization information. This makes it
difficult to decouple authentication and authorization.
TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication solutions that can still
use TACACS+ for authorization and accounting. For example, with TACACS+, it is possible to use Kerberos
authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests
authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+
server that it has successfully authenticated on a Kerberos server, and the server then provides authorization
information.
During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to
determine if the user is granted permission to use a particular command. This provides greater control over the
commands that can be executed on the access server while decoupling from the authentication mechanism.
QUESTION 21
Which type of attack can exploit design flaws in the implementation of an application without going noticed?
Correct Answer: D
QUESTION 22
Which two ESA services are available for incoming and outgoing mails? (Choose two.)
A. DLP
B. reputation filter
C. content filter
D. anti-Dos
E. antispam
Correct Answer: AC
QUESTION 23
A. Denial of Service
B. phishing
C. trojan horse
Correct Answer: A
QUESTION 24
What do you use when you have a network object or group and want to use an IP address?
A. Static NAT
B. Dynamic NAT
C. identity NAT
D. Static PAT
Correct Answer: B
QUESTION 25
Which three statements about Cisco host-based IPS solutions are true? (Choose three.)
QUESTION 26
A. IPS
B. fail-close
C. IDS
D. fail-open
Correct Answer: A
QUESTION 27
A. Warning
B. Informational
C. Notification
D. Debugging
Correct Answer: D
QUESTION 28
After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to
be missing. For what reason could the image file fail to appear in the dir output?
Correct Answer: A
QUESTION 29
On an ASA, the policy that indicates that traffic should not be translated is often referred to as which of the following?
A. NAT zero
B. NAT forward
C. NAT null
D. NAT allow
Correct Answer: A
QUESTION 30
A. Denial of Service
B. MAC-address spoofing
C. CAM-table overflow
D. VLAN hopping
Correct Answer: A
QUESTION 31
How does a zone pair handle traffic if the policy definition of the zone pair is missing?
Correct Answer: B
QUESTION 32
Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end user?
C. Block
D. Trust
E. Monitor
Correct Answer: A
QUESTION 33
D. To create a separate, non-persistent virtual environment that can be destroyed after a session.
Correct Answer: A
QUESTION 34
Which IPS detection method can you use to detect attacks that based on the attackers IP addresses?
A. Policy-based
B. Anomaly-based
C. Reputation-based
D. Signature-based
Correct Answer: C
QUESTION 35
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
Correct Answer: AB
QUESTION 36
A. Trusted root
B. Not trusted
Correct Answer: A
QUESTION 37
A. no switchport nonnegotiate
B. switchport
D. no switchport
Correct Answer: D
QUESTION 38
Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)
A. start-stop
B. stop-record
C. stop-only
D. stop
Correct Answer: AC
QUESTION 39
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class? (Choose
three.)
A. pass
B. police
C. inspect
D. drop
E. queue
F. shape
http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a0080 8bc994.shtml
ZFW provides three actions for traffic that traverses from one zone to another:
Drop -- This is the default action for all traffic, as applied by the andquot;class class-defaultandquot; that terminates
every inspect-type policy-map. Other class-maps within a policy-map can also be configured to drop unwanted traffic.
Traffic that is handled by the drop action is andquot;silentlyandquot; dropped (i.e., no notification of the drop is sent to
the relevant end-host) by the ZFW, as opposed to an ACL\\'s behavior of sending an ICMP andquot;host
unreachableandquot; message to the host that sent
the denied traffic. Currently, there is not an option to change the andquot;silent dropandquot; behavior. The log option
can be added with drop for syslog notification that traffic was dropped by the firewall.
Pass -- This action allows the router to forward traffic from one zone to another. The pass action does not track the state
of connections or sessions within the traffic. Pass only allows the traffic in one direction. A corresponding policy must
be
applied to allow return traffic to pass in the opposite direction. The pass action is useful for protocols such as IPSec
ESP, IPSec AH, ISAKMP, and other inherently secure protocols with predictable behavior. However, most application
traffic is
Inspect--The inspect action offers state-based traffic control. For example, if traffic from the private zone to the Internet
zone in the earlier example network is inspected, the router maintains connection or session information for TCP and
User
Datagram Protocol (UDP) traffic. Therefore, the router permits return traffic sent from Internet-zone hosts in reply to
private zone connection requests. Also, inspect can provide application inspection and control for certain service
protocols
Audit-trail can be applied with a parameter-map to record connection/session start, stop, duration, the data volume
transferred, and source and destination addresses.
QUESTION 40
A. dynamic NAT
B. dynamic PAT
C. static NAT
D. identity NAT
Correct Answer: AC
http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_co
nfig/nat_objects.html#18425
To Read the Whole Q&As, please purchase the Complete Version from Our website.
We provide exam PDF and VCE of Cisco, Microsoft, IBM, CompTIA, Oracle and other IT Certifications.
You can view Vendor list of All Certification Exams offered:
https://www.lead4pass.com/allproducts
Need Help
Please provide as much detail as possible so we can best assist you.
To update a previously submitted ticket:
Any charges made through this site will appear as Global Simulators Limited.
All trademarks are the property of their respective owners.
Copyright © lead4pass, All Rights Reserved.