Implementing Cisco Network Security 210-260 Questions Pool

Our pass rate is high to 98.9% and the similarity percentage between our 210-260 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco 210-260 exam in just one try? I am currently studying for the Cisco 210-260 exam. Latest Cisco 210-260 Test exam practice questions and answers, Try Cisco 210-260 Brain Dumps First.

Check 210-260 free dumps before getting the full version:

Page: 1 / 40
Total 481 questions Full Exam Access
Question 1
- (Exam Topic 3)
Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)
My answer: -
Reference answer: AD
Reference analysis:

Cisco IronPort Outbreak Filters provide a critical first layer of defense against new outbreaks. With this proven preventive solution, protection begins hours before signatures used by traditional antivirus solutions are in place. Real-world results show an average 14-hour lead time over reactive antivirus solutions.
SenderBase, the world\'s largest email and web traffic monitoring network, provides real-time protection. The Cisco IronPort SenderBase Network captures data from over 120,000 contributing organizations around the world.
Source: http://www.cisco.com/c/en/us/products/security/email-security-appliance/outbreak_filters_index.html

Question 2
- (Exam Topic 1)
What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?
My answer: -
Reference answer: A
Reference analysis:

To set the interval for which the server waits for a server host to reply, use the tacacs-server timeout command in global configuration mode. To restore the default, use the no form of this command.
If the command is not configured, the timeout interval is 5. Source: http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command

Question 3
- (Exam Topic 1)
Scenario
Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements.
New additional connectivity requirements:
Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram.
To access the Firefox Browser on the Outside PC, click the Outside PC icon in the topology diagram. To access the Command prompt on the Inside PC, click the Inside PC icon in the topology diagram. Note:
After you make the configuration changes in ASDM, remember to click Apply to apply the configuration changes.
Not all ASDM screens are enabled in this simulation, if some screen is not enabled, try to use different methods to configure the ASA to meet the requirements.
In this simulation, some of the ASDM screens may not look and function exactly like the real ASDM.
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
210-260 dumps exhibit
Solution:
First, for the HTTP access we need to creat a NAT object. Here I called it HTTP but it can be given any name.
210-260 dumps exhibit
Then, create the firewall rules to allow the HTTP access:
210-260 dumps exhibit
210-260 dumps exhibit
You can verify using the outside PC to HTTP into 209.165.201.30.
For step two, to be able to ping hosts on the outside, we edit the last service policy shown below:
210-260 dumps exhibit
And then check the ICMP box only as shown below, then hit Apply.
210-260 dumps exhibit
After that is done, we can pingwww.cisco.comagain to verify:
210-260 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
- (Exam Topic 3)
Which two characteristics of an application layer firewall are true? (Choose two)
My answer: -
Reference answer: AC
Reference analysis:

None

Question 5
- (Exam Topic 1)
By which kind of threat is the victim tricked into entering username and password information at a disguised website?
My answer: -
Reference answer: D
Reference analysis:

Phishing presents a link that looks like a valid trusted resource to a user. When the user clicks it, the user is prompted to disclose confidential information such as usernames/passwords.
Source: Cisco Official Certification Guide, Table 1-5 Attack Methods, p.13

Question 6
- (Exam Topic 1)
Which options are filtering options used to display SDEE message types? (Choose two.)
My answer: -
Reference answer: CD
Reference analysis:

SDEE Messages
+ All -- SDEE error, status, and alert messages are shown.
+ Error -- Only SDEE error messages are shown.
+ Status -- Only SDEE status messages are shown.
+ Alerts -- Only SDEE alert messages are shown.
Source:
http://www.cisco.com/c/en/us/td/docs/routers/access/cisco_router_and_security_device_manager/24/ software/user/guide/IPS.html#wp1083698

Question 7
- (Exam Topic 3)
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class? (Choose three.)
My answer: -
Reference answer: ACD
Reference analysis:

http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml Zone-Based Policy Firewall Actions
ZFW provides three actions for traffic that traverses from one zone to another:
Drop — This is the default action for all traffic, as applied by the "class class-default" that terminates every inspect-type policy-map. Other class-maps within a policy-map can also be configured to drop unwanted traffic.
Traffic that is handled by the drop action is "silently" dropped (i.e., no notification of the drop is sent to the relevant end-host) by the ZFW, as opposed to an ACL\'s behavior of sending an ICMP “host unreachable”
message to the host that sent the denied traffic. Currently, there is not an option to change the "silent drop" behavior. The log option can be added with drop for syslog notification that traffic was dropped by the firewall.
Pass — This action allows the router to forward traffic from one zone to another. The pass action does not track the state of connections or sessions within the traffic. Pass only allows the traffic in one direction. A corresponding policy must be applied to allow return traffic to pass in the opposite direction. The pass action is useful for protocols such as IPSec ESP, IPSec AH, ISAKMP, and other inherently secure protocols with predictable behavior. However, most application traffic is better handled in the ZFW with the inspect action.
Inspect—The inspect action offers state-based traffic control. For example, if traffic from the private zone to the Internet zone in the earlier example network is inspected, the router maintains connection or session information for TCP and User Datagram Protocol (UDP) traffic. Therefore, the router permits return traffic sent from Internet-zone hosts in reply to private zone connection requests. Also, inspect can provide application inspection and control for certain service protocols that might carry vulnerable or sensitive application traffic.
Audit-trail can be applied with a parameter-map to record connection/session start, stop, duration, the data volume transferred, and source and destination addresses.

Question 8
- (Exam Topic 1)
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.
My answer: -
Reference answer: A
Reference analysis:

URL filtering allows you to control access to Internet websites by permitting or denying access to specific websites based on information contained in an URL list. You can maintain a local URL list on the router. If the Cisco IOS image on the router supports URL filtering but does not support Zone-based Policy Firewall (ZPF), you can maintain one local URL list on the router to add or edit an URLs. Enter a full domain name or a partial domain name and choose whether to Permit or Deny requests for this URL.
Source:
http://www.cisco.com/c/en/us/td/docs/routers/access/cisco_router_and_security_device_manager/24/ software/user/guide/URLftr.html#wp999509

Question 9
- (Exam Topic 4)
Refer to the exhibit.
210-260 dumps exhibit
Which area represents the data center?
My answer: -
Reference answer: A
Reference analysis:

None

Question 10
- (Exam Topic 2)
What improvement does EAP-FASTv2 provide over EAP-FAST?
My answer: -
Reference answer: A
Reference analysis:

As an enhancement to EAP-FAST, a differentiation was made to have a User PAC and a Machine PAC. After a successful machine-authentication, ISE will issue a Machine-PAC to the client. Then, when processing a user- authentication, ISE will request the Machine-PAC to prove that the machine was successfully authenticated, too. This is the first time in 802.1X history that multiple credentials have been able to be authenticated within a single EAP transaction, and it is known as "EAP Chaining".
Source:
http://www.networkworld.com/article/2223672/access-control/which-eap-types-do-you-need-for-which- identity-projects.html

Question 11
- (Exam Topic 1)
Which command verifies phase 1 of an IPsec VPN on a Cisco router?
My answer: -
Reference answer: C
Reference analysis:

A show crypto isakmp sa command shows the ISAKMP SA to be in MM_NO_STATE. This also means that main mode has failed.
Dstsrc state conn-id slot
10.1.1.2 10.1.1.1 MM_NO_STATE 1 0
Verify that the phase 1 policy is on both peers, and ensure that all the attributes match.
Source:
http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec- debug-00.html#isakmp_sa

Question 12
- (Exam Topic 1)
What VPN feature allows traffic to exit the security appliance through the same interface it entered?
My answer: -
Reference answer: A
Reference analysis:

In network computing, hairpinning (or NAT loopback) describes a communication between two hosts behind the same NAT device using their mapped endpoint. Because not all NAT devices support this communication configuration, applications must be aware of it.
Hairpinning is where a machine on the LAN is able to access another machine on the LAN via the external IP address of the LAN/router (with port forwarding set up on the router to direct requests to the appropriate machine on the LAN).
Source: https://en.wikipedia.org/wiki/Hairpinning

Question 13
- (Exam Topic 3)
Which type of firewall can serve as the intermediary between a client and a server?
My answer: -
Reference answer: D
Reference analysis:

http://searchsecurity.techtarget.com/definition/proxy-firewall

Question 14
- (Exam Topic 4)
In which form of fraud does an attacker try to team information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels?
My answer: -
Reference answer: B
Reference analysis:

None

Question 15
- (Exam Topic 4)
Which two SNMPv3 services support its capabilities as a secure network management protocol?
My answer: -
Reference answer: AB
Reference analysis:

None

Question 16
- (Exam Topic 1)
What hash type does Cisco use to validate the integrity of downloaded images?
My answer: -
Reference answer: C
Reference analysis:

The MD5 File Validation feature, added in Cisco IOS Software Releases 12.2(4)T and 12.0(22)S, allows network administrators to calculate the MD5 hash of a Cisco IOS software image file that is loaded on a device.
It also allows administrators to verify the calculated MD5 hash against that provided by the user. Once the MD5 hash value of the installed Cisco IOS image is determined, it can also be compared with the MD5 hash provided by Cisco to verify the integrity of the image file.
verify /md5 filesystem:filename [md5-hash]
Source:
http://www.cisco.com/c/en/us/about/security-center/ios-image-verification.html#11

Question 17
- (Exam Topic 2)
Which type of encryption technology has the broadest platform support to protect operating systems?
My answer: -
Reference answer: A
Reference analysis:

Much commercial and free software enables you to encrypt files in an end-user workstation or mobile device. The following are a few examples of free solutions:
+ GPG: GPG also enables you to encrypt files and folders on a Windows, Mac, or Linux system. GPG is free.
+ The built-in MAC OS X Disk Utility: D isk Utility enables you to create secure disk images by encrypting files with AES 128-bit or AES 256-bit encryption.
+ TrueCrypt: A free encryption tool for Windows, Mac, and Linux systems.
+ AxCrypt: A f ree Windows-only file encryption tool.
+ BitLocker: Full disk encryption feature included in several Windows operating systems.
+ Many Linux distributions such as Ubuntu: A llow you to encrypt the home directory of a user with built-in utilities.
+ MAC OS X FileVault: Supports full disk encryption on Mac OS X systems. The following are a few examples of commercial file encryption software:
+ Symantec Endpoint Encryption
+ PGP Whole Disk Encryption
+ McAfee Endpoint Encryption (SafeBoot)
+ Trend Micro Endpoint Encryption
Source: Cisco Official Certification Guide, Encrypting Endpoint Data at Rest, p.501

Question 18
- (Exam Topic 1)
Which Cisco product can help mitigate web-based attacks within a network?
My answer: -
Reference answer: B
Reference analysis:

Web-based threats continue to rise. To protect your network you need a solution that prevents them. Cisco Advanced Malware Protection (AMP) for Web Security goes beyond the basics in threat detection, URL filtering, and application control. It provides continuous file analysis, retrospective security, and sandboxing to help your security team catch even the stealthiest threats.
Source:
http://www.cisco.com/c/en/us/products/security/advanced-malware-protection/amp-for-web- security.html

Question 19
- (Exam Topic 3)
Which statement is a benefit of using Cisco IOS IPS?
My answer: -
Reference answer: A
Reference analysis:

http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/product_data_sheet0900aecd80313 Product Overview
In today\'s business environment, network intruders and attackers can come from outside or inside the network.
They can launch distributed denial-of-service attacks, they can attack Internet connections, and they can exploit network and host vulnerabilities. At the same time, Internet worms and viruses can spread across the world in a matter of minutes. There is often no time to wait for human intervention-the network itself must possess the intelligence to recognize and mitigate these attacks, threats, exploits, worms and viruses.
Cisco IOS Intrusion Prevention System (IPS) is an inline, deep-packet inspection-based solution that enables Cisco IOS Software to effectively mitigate a wide range of network attacks. While it is common practice to defend against attacks by inspecting traffic at data centers and corporate headquarters, distributing the network level defense to stop malicious traffic close to its entry point at branch or telecommuter offices is also critical.
Cisco IOS IPS: Major Use Cases and Key Benefits IOS IPS helps to protect your network in 5 ways:
\"210-260
Key Benefits:
• Provides network-wide, distributed protection from many attacks, exploits, worms and viruses exploiting vulnerabilities in operating systems and applications.
• Eliminates the need for a standalone IPS device at branch and telecommuter offices as well as small and medium-sized business networks.
• Unique, risk rating based signature event action processor dramatically improves the ease of management of IPS policies.
• Offers field-customizable worm and attack signature set and event actions.
• Offers inline inspection of traffic passing through any combination of router LAN and WAN interfaces in both directions.
• Works with Cisco IOS® Firewall, control-plane policing, and other Cisco IOS Software security features to protect the router and networks behind the router.
• Supports more than 3700 signatures from the same signature database available for Cisco Intrusion Prevention System (IPS) appliances.

Question 20
- (Exam Topic 1)
Refer to the exhibit.
210-260 dumps exhibit
While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?
My answer: -
Reference answer: A
Reference analysis:

This command shows IPsec SAs built between peers - IPsec Phase2. The encrypted tunnel is build between 10.1.1.5 and 10.1.1.1 (the router from which we issued the command).

Question 21
- (Exam Topic 2)
How does a device on a network using ISE receive its digital certificate during the new-device registration process?
My answer: -
Reference answer: A
Reference analysis:

SCEP Profile Configuration on ISE
Within this design, ISE is acting as a Simple Certificate Enrollment Protocol (SCEP) proxy server, thereby allowing mobile clients to obtain their digital certificates from the CA server. This important feature of ISE allows all endpoints, such as iOS, Android, Windows, and MAC, to obtain digital certificates through the ISE. This feature combined with the initial registration process greatly simplifies the provisioning of digital certificates on endpoints.
Source:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/ BYOD_Design_Guide/BYOD_ISE.html

Question 22
- (Exam Topic 3)
Which type of PVLAN port allows a host in the same VLAN to communicate only with promiscuous hosts?
My answer: -
Reference answer: B
Reference analysis:

The types of private VLAN ports are as follows:
+ Promiscuous - The promiscuous port can communicate with all interfaces, including the community and isolated host ports, that belong to those secondary VLANs associated to the promiscuous port and associated with the primary VLAN
+ Isolated - This port has complete isolation from other ports within the same private VLAN domain, except that it can communicate with associated promiscuous ports.
+ Community -- A community port is a host port that belongs to a community secondary VLAN. Community ports communicate with other ports in the same community VLAN and with associated promiscuous ports.
These interfaces are isolated from all other interfaces in other communities and from all isolated ports within
the private VLAN domain.
Source:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli/ CLIConfigurationGuide/PrivateVLANs.html#42874

Question 23
- (Exam Topic 3)
Security well known terms Choose 2
My answer: -
Reference answer: BD
Reference analysis:

The following are the most common types of malicious software:
+ Computer viruses
+ Worms
+ Mailers and mass-mailer worms
+ Logic bombs
+ Trojan horses
+ Back doors
+ Exploits
+ Downloaders
+ Spammers
+ Key loggers
+ Rootkits
+ Ransomware

Question 24
- (Exam Topic 3)
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?
My answer: -
Reference answer: D
Reference analysis:

:
Reference: http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/objectgroups.html
Information About Object Groups
By grouping like objects together, you can use the object group in an ACE instead of having to enter an ACE for each object separately. You can create the following types of object groups:
•Protocol
•Network
•Service
•ICMP type
For example, consider the following three object groups:
•MyServices — Includes the TCP and UDP port numbers of the service requests that are allowed access to the internal network.
•TrustedHosts — Includes the host and network addresses allowed access to the greatest range of services and servers.
•PublicServers — Includes the host addresses of servers to which the greatest access is provided.
After creating these groups, you could use a single ACE to allow trusted hosts to make specific service requests to a group of public servers.
You can also nest object groups in other object groups.

Question 25
- (Exam Topic 4)
Which type of malicious software can create a back-door into a device or network?
My answer: -
Reference answer: B
Reference analysis:

None

Question 26
- (Exam Topic 4)
Which type of social engineering attack targets top executives?
My answer: -
Reference answer: A
Reference analysis:

None

Question 27
- (Exam Topic 1)
What is one requirement for locking a wired or wireless device from ISE?
My answer: -
Reference answer: A
Reference analysis:

Agents are applications that reside on client machines logging into the Cisco ISE network. Agents can be persistent (like the AnyConnect, Cisco NAC Agent for Windows and Mac OS X) and remain on the client machine after installation, even when the client is not logged into the network. Agents can also be temporal (like the Cisco NAC Web Agent), removing themselves from the client machine after the login session has terminated.
Source:
http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_010101.html

Question 28
- (Exam Topic 1)
After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?
My answer: -
Reference answer: A
Reference analysis:

autocommand: (Optional) Causes the specified command to be issued automatically after the user logs in. When the command is complete, the session is terminated. Because the command can be any length and can contain embedded spaces, commands using the autocommand keyword must be the last option on the line.
So after successfully logs in the Admin user sees the running configuration and immediately after is disconnected by the router. So removing the command lets keeps him connected.
Source:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-xe-3se-3850-cr-book/sec-s1-xe- 3se-3850-cr-book_chapter_0110.html

Question 29
- (Exam Topic 4)
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?
My answer: -
Reference answer: C
Reference analysis:

None

Page: 1 / 40
Total 481 questions Full Exam Access