08 March, 2020
Implementing Cisco Network Security 210-260 Questions Pool
Our pass rate is high to 98.9% and the similarity percentage between our 210-260 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco 210-260 exam in just one try? I am currently studying for the Cisco 210-260 exam. Latest Cisco 210-260 Test exam practice questions and answers, Try Cisco 210-260 Brain Dumps First.
Check 210-260 free dumps before getting the full version:
Question 1
- (Exam Topic 3)
Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)
Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)
Question 2
- (Exam Topic 1)
What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?
What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?
Question 3
- (Exam Topic 1)
Scenario
Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements.
New additional connectivity requirements:
Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram.
To access the Firefox Browser on the Outside PC, click the Outside PC icon in the topology diagram. To access the Command prompt on the Inside PC, click the Inside PC icon in the topology diagram. Note:
After you make the configuration changes in ASDM, remember to click Apply to apply the configuration changes.
Not all ASDM screens are enabled in this simulation, if some screen is not enabled, try to use different methods to configure the ASA to meet the requirements.
In this simulation, some of the ASDM screens may not look and function exactly like the real ASDM.
Solution:
First, for the HTTP access we need to creat a NAT object. Here I called it HTTP but it can be given any name.
Then, create the firewall rules to allow the HTTP access:
You can verify using the outside PC to HTTP into 209.165.201.30.
For step two, to be able to ping hosts on the outside, we edit the last service policy shown below:
And then check the ICMP box only as shown below, then hit Apply.
After that is done, we can pingwww.cisco.comagain to verify:
Does this meet the goal?
Scenario
Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements.
New additional connectivity requirements:
Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram.
To access the Firefox Browser on the Outside PC, click the Outside PC icon in the topology diagram. To access the Command prompt on the Inside PC, click the Inside PC icon in the topology diagram. Note:
After you make the configuration changes in ASDM, remember to click Apply to apply the configuration changes.
Not all ASDM screens are enabled in this simulation, if some screen is not enabled, try to use different methods to configure the ASA to meet the requirements.
In this simulation, some of the ASDM screens may not look and function exactly like the real ASDM.
Solution:
First, for the HTTP access we need to creat a NAT object. Here I called it HTTP but it can be given any name.
Then, create the firewall rules to allow the HTTP access:
You can verify using the outside PC to HTTP into 209.165.201.30.
For step two, to be able to ping hosts on the outside, we edit the last service policy shown below:
And then check the ICMP box only as shown below, then hit Apply.
After that is done, we can pingwww.cisco.comagain to verify:
Does this meet the goal?
Question 4
- (Exam Topic 3)
Which two characteristics of an application layer firewall are true? (Choose two)
Which two characteristics of an application layer firewall are true? (Choose two)
Question 5
- (Exam Topic 1)
By which kind of threat is the victim tricked into entering username and password information at a disguised website?
By which kind of threat is the victim tricked into entering username and password information at a disguised website?
Question 6
- (Exam Topic 1)
Which options are filtering options used to display SDEE message types? (Choose two.)
Which options are filtering options used to display SDEE message types? (Choose two.)
Question 7
- (Exam Topic 3)
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class? (Choose three.)
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class? (Choose three.)
Question 8
- (Exam Topic 1)
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.
Question 9
- (Exam Topic 4)
Refer to the exhibit.
Which area represents the data center?
Refer to the exhibit.
Which area represents the data center?
Question 10
- (Exam Topic 2)
What improvement does EAP-FASTv2 provide over EAP-FAST?
What improvement does EAP-FASTv2 provide over EAP-FAST?
Question 11
- (Exam Topic 1)
Which command verifies phase 1 of an IPsec VPN on a Cisco router?
Which command verifies phase 1 of an IPsec VPN on a Cisco router?
Question 12
- (Exam Topic 1)
What VPN feature allows traffic to exit the security appliance through the same interface it entered?
What VPN feature allows traffic to exit the security appliance through the same interface it entered?
Question 13
- (Exam Topic 3)
Which type of firewall can serve as the intermediary between a client and a server?
Which type of firewall can serve as the intermediary between a client and a server?
Question 14
- (Exam Topic 4)
In which form of fraud does an attacker try to team information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels?
In which form of fraud does an attacker try to team information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels?
Question 15
- (Exam Topic 4)
Which two SNMPv3 services support its capabilities as a secure network management protocol?
Which two SNMPv3 services support its capabilities as a secure network management protocol?
Question 16
- (Exam Topic 1)
What hash type does Cisco use to validate the integrity of downloaded images?
What hash type does Cisco use to validate the integrity of downloaded images?
Question 17
- (Exam Topic 2)
Which type of encryption technology has the broadest platform support to protect operating systems?
Which type of encryption technology has the broadest platform support to protect operating systems?
Question 18
- (Exam Topic 1)
Which Cisco product can help mitigate web-based attacks within a network?
Which Cisco product can help mitigate web-based attacks within a network?
Question 19
- (Exam Topic 3)
Which statement is a benefit of using Cisco IOS IPS?
Which statement is a benefit of using Cisco IOS IPS?
Question 20
- (Exam Topic 1)
Refer to the exhibit.
While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?
Refer to the exhibit.
While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?
Question 21
- (Exam Topic 2)
How does a device on a network using ISE receive its digital certificate during the new-device registration process?
How does a device on a network using ISE receive its digital certificate during the new-device registration process?
Question 22
- (Exam Topic 3)
Which type of PVLAN port allows a host in the same VLAN to communicate only with promiscuous hosts?
Which type of PVLAN port allows a host in the same VLAN to communicate only with promiscuous hosts?
Question 23
- (Exam Topic 3)
Security well known terms Choose 2
Security well known terms Choose 2
Question 24
- (Exam Topic 3)
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?
Question 25
- (Exam Topic 4)
Which type of malicious software can create a back-door into a device or network?
Which type of malicious software can create a back-door into a device or network?
Question 26
- (Exam Topic 4)
Which type of social engineering attack targets top executives?
Which type of social engineering attack targets top executives?
Question 27
- (Exam Topic 1)
What is one requirement for locking a wired or wireless device from ISE?
What is one requirement for locking a wired or wireless device from ISE?
Question 28
- (Exam Topic 1)
After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?
After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?
Question 29
- (Exam Topic 4)
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?