[Free] 2018(Aug) Ensurepass Cisco 210-260 Dumps with VCE and PDF 141-150

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 141

Which type of PVLAN port allows hosts in the same VLAN to communicate directly with each other?

  1. community for hosts in the PVLAN

  2. promiscuous for hosts in the PVLAN

  3. isolated for hosts in the PVLAN

  4. span for hosts in the PVLAN

Answer: A

Question No: 142

Which type of secure connectivity does an extranet provide?

  1. other company networks to your company network

  2. remote branch offices to your company network

  3. your company network to the Internet

  4. new networks to your company network

Answer: A

Question No: 143

A proxy firewall protects against which type of attack?

  1. cross-site scripting attack

  2. worm traffic

  3. port scanning

  4. DDoS attacks

Answer: A

Question No: 144

The stealing of confidential information of a company comes under the scope of

  1. Reconnaissance

  2. Spoofing attack

  3. Social Engineering

  4. Denial of Service

Answer: C

Question No: 145

Which Cisco product can help mitigate web-based attacks within a network?

  1. Adaptive Security Appliance

  2. Web Security Appliance

  3. Email Security Appliance

  4. Identity Services Engine

Answer: B

Question No: 146

What type of security support is provided by the Open Web Application Security Project?

  1. Education about common Web site vulnerabilities.

  2. A Web site security framework.

  3. A security discussion forum for Web site developers.

  4. Scoring of common vulnerabilities and exposures.

Answer: A

Question No: 147

Which of the following pairs of statements is true in terms of configuring MD authentication?

  1. Interface statements (OSPF, EIGRP) must be configured; use of key chain in OSPF

  2. Router process (OSPF, EIGRP) must be configured; key chain in EIGRP

  3. Router process (only for OSPF) must be configured; key chain in EIGRP

  4. Router process (only for OSPF) must be configured; key chain in OSPF

Answer: C

Question No: 148

Which statement correctly describes the function of a private VLAN?

  1. A private VLAN partitions the Layer 2 broadcast domain of a VLAN into subdomains

  2. A private VLAN partitions the Layer 3 broadcast domain of a VLAN into subdomains

  3. A private VLAN enables the creation of multiple VLANs using one broadcast domain

  4. A private VLAN combines the Layer 2 broadcast domains of many VLANs into one major broadcast domain

Answer: A

Question No: 149

Which statement provides the best definition of malware?

  1. Malware is unwanted software that is harmful or destructive.

  2. Malware is software used by nation states to commit cyber crimes.

  3. Malware is a collection of worms, viruses, and Trojan horses that is distributed as a single package.

  4. Malware is tools and applications that remove unwanted programs.

Answer: A

Question No: 150

For what reason would you configure multiple security contexts on the ASA firewall?

  1. To separate different departments and business units.

  2. To enable the use of VRFs on routers that are adjacently connected.

  3. To provide redundancy and high availability within the organization.

  4. To enable the use of multicast routing and QoS through the firewall.

Answer: A

100% Ensurepass Free Download!
210-260 PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No
         

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com