210-260 Latest Exam (May 2018)

[Free] 2018(May) Dumps4cert Passguide Cisco 210-260 Dumps with VCE and PDF Download 41-50

May 22, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 41

Which sensor mode can deny attackers inline?

  1. IPS

  2. fail-close

  3. IDS

  4. fail-open

Answer: A

Question No: 42

Which two authentication types does OSPF support? (Choose two.)

  1. plaintext

  2. MD5

  3. HMAC

  4. AES 256

  5. SHA-1

  6. DES

Answer: A,B

Question No: 43

After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?

  1. The secure boot-image command is configured.

  2. The secure boot-comfit command is configured.

  3. The confreg 0x24 command is configured.

  4. The reload command was issued from ROMMON.

Answer: A

Question No: 44

When an administrator initiates a device wipe command from the ISE, what is the immediate effect?

  1. It requests the administrator to choose between erasing all device data or only managed corporate data.

  2. It requests the administrator to enter the device PIN or password before proceeding with the operation.

  3. It notifies the device user and proceeds with the erase operation.

  4. It immediately erases all data on the device.

Answer: A

Question No: 45

Which type of attack is directed against the network directly:

  1. Denial of Service

  2. phishing

  3. trojan horse

Answer: A

Question No: 46

Which option is the default value for the Diffie-Hellman group when configuring a site-to- site VPN on an ASA device?

  1. Group 1

  2. Group 2

  3. Group 5

  4. Group 7

Answer: B

Question No: 47

Which three statements describe DHCP spoofing attacks? (Choose three.)

  1. They can modify traffic in transit.

  2. They are used to perform man-in-the-middle attacks.

  3. They use ARP poisoning.

  4. They can access most network devices.

  5. They protect the identity of the attacker by masking the DHCP address.

  6. They are can physically modify the network gateway.

Answer: A,B,C

Question No: 48

What is a potential drawback to leaving VLAN 1 as the native VLAN?

  1. It may be susceptible to a VLAN hoping attack.

  2. Gratuitous ARPs might be able to conduct a man-in-the-middle attack.

  3. The CAM might be overloaded, effectively turning the switch into a hub.

  4. VLAN 1 might be vulnerable to IP address spoofing.

Answer: A

Question No: 49

Which two actions can a zone-based firewall take when looking at traffic? (Choose two)

  1. Filter

  2. Forward

  3. Drop

  4. Broadcast

  5. Inspect

Answer: C,E

Question No: 50

What information does the key length provide in an encryption algorithm?

  1. the packet size

  2. the number of permutations

  3. the hash block size

  4. the cipher block size

Answer: C

100% Dumps4cert Free Download!
Download Free Demo:210-260 Demo PDF
100% Dumps4cert Pass Guaranteed!
210-260 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No