210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 61-70

By on February 7, 2017
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 61 A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.   A. Enable URL filtering on the perimeterrouter and add the URLs you want to block to the router's local URL list. B. Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router's local URL list. C. Enable URL Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 141-150

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 141 Which type of firewall can act on the behalf of the end device?   A. Stateful packet B. Application C. Packet D. Proxy   Correct Answer: D     QUESTION 142 In the router ospf 200 command, what does the value 200 stands for?   A. Administrative distance value B. process ID C. area ID D. ABR ID   Correct Answer: B Explanation: Recall that the area is defined in the following Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 131-140

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 131 What is the potential drawback to leaving VLAN 1 as the native VLAN?   A. Gratuitous ARPs might be able to conduct a man-in-the-middle attack. B. The CAM might be overloaded, effectively turning the switch into hub. C. VLAN 1 might be vulnerable to IP address spoofing. D. It may be susceptible to a VLAN hopping attack.   Correct Answer: D     QUESTION 132 Which alert protocol is used with Cisco Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 121-130

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 121 Which statement about extended access lists is true?   A. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destination. B. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the source. C. Extended access lists perform filtering that is based on destination and are most Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 111-120

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 111 Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?   A. no switchport nonnegotiate B. switchport C. no switchport mode dynamic auto D. no switchport   Correct Answer: D     QUESTION 112 Which network device does NTP authenticate?   A. Only the time source B. Only the client device C. The firewall and the client device D. The client device and Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 101-110

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 101 Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)   A. start-stop B. stop-record C. stop-only D. stop   Correct Answer: AC     QUESTION 102 What improvement does EAP-FASTv2 provide over EAP-FAST?   A. It support more secure encryption protocols. B. It allows multiple credentials to be passed in a single EAP exchange. Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 91-100

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 91 Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user?   A. Trust B. Block C. Allow without inspection D. Monitor E. Allow with inspection   Correct Answer: E Explanation: Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don’t exist. Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 81-90

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 81 You have been tasked with blocking user access to website that violate company policy, but the site use dynamic IP Addresses. What is the best practice URL filtering to solve the problem?   A. Enable URL filtering and create a blacklist to block the websites that violate company policy. B. Enable URL filtering and create a whitelist to allow only the websites the company policy allow users to access. C. Enable Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 71-80

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 71 What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?   A. 5 seconds B. 10 seconds C. 15 seconds D. 20 seconds   Correct Answer: A     QUESTION 72 How does PEAP protect the EAP exchange?   A. It encrypts the exchange using the client certificate. B. It validates the server-supplied certificate and Read more [...]

Continue Reading

210-260 Practice Test (February 2017)

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 31-40

By on
EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 31 Refer to the exhibit. What is the effect of the given command sequence?     A. It configures IKE Phase 1. B. It configures a site-to-site VPN tunnel. C. It configures a crypto policy with a key size of 14400. D. It configures IPSec Phase 2. Correct Answer: A     QUESTION 32 Refer to the exhibit. What is the effect of the given command sequence?     A. It defines IPSec policy Read more [...]

Continue Reading