[Free] 2018(Aug) Ensurepass Cisco 210-260 Dumps with VCE and PDF 161-170

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 161

What configure mode you used for the command ip ospf authentication-key c1$c0?

  1. global

  2. privileged

  3. in-line

Answer: A

Question No: 162

What is the Cisco preferred countermeasure to mitigate CAM overflows?

  1. Port security

  2. Dynamic port security

  3. IP source guard

  4. Root guard

Answer: B

Question No: 163

Which statement about personal firewalls is true?

  1. They can protect a system by denying probing requests.

  2. They are resilient against kernel attacks.

  3. They can protect email messages and private documents in a similar way to a VPN.

  4. They can protect the network against attacks.

Answer: A

Question No: 164

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?

  1. IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.

  2. ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.

  3. IKE version 2 security associations are established between 10.1.1.1 and 10.1.1.5.

  4. IPSec Phase 2 is down due to a mismatch between encrypted and decrypted packets.

Answer: A

Question No: 165

Which type of mirroring does SPAN technology perform?

  1. Remote mirroring over Layer 2

  2. Remote mirroring over Layer 3

  3. Local mirroring over Layer 2

  4. Local mirroring over Layer 3

Answer: C

Question No: 166

What are two default Cisco IOS privilege levels? (Choose two.)

  1. 0

  2. 1

  3. 5

  4. 7

  5. 10

  6. 15

Answer: B,F

Question No: 167

Which statement about extended access lists is true?

  1. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destination

  2. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the source

  3. Extended access lists perform filtering that is based on destination and are most

    effective when applied to the source

  4. Extended access lists perform filtering that is based on source and are most effective when applied to the destination

Answer: B

Question No: 168

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?

  1. The trunk port would go into an error-disabled state.

  2. A VLAN hopping attack would be successful.

  3. A VLAN hopping attack would be prevented.

  4. The attacked VLAN will be pruned.

Answer: C

Question No: 169

Which tasks is the session management path responsible for? (Choose three.)

  1. Verifying IP checksums

  2. Performing route lookup

  3. Performing session lookup

  4. Allocating NAT translations

  5. Checking TCP sequence numbers

  6. Checking packets against the access list

Answer: B,D,F

Question No: 170

Which statement about application blocking is true?

  1. It blocks access to specific programs.

  2. It blocks access to files with specific extensions.

  3. It blocks access to specific network addresses.

  4. It blocks access to specific network services.

Answer: A

100% Ensurepass Free Download!
210-260 PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No
         

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com