This page was exported from Lead2pass 100% Valid Exam Questions PDF Free Download [ ] Export date:Mon Sep 28 14:43:18 2020 / +0000 GMT ___________________________________________________ Title: [Lead2pass Official] Easily Pass 210-260 Exam By Training Lead2pass New Cisco VCE Dumps (261-280) --------------------------------------------------- 2017 September Cisco Official New Released 210-260 Dumps in! 100% Free Download! 100% Pass Guaranteed! Our dumps have been reviewed and approved by industry experts and individuals who have taken and passed 210-260 exam. Lead2pass will have you prepared to take 210-260 test with high confidence and pass easily. Whether you are looking for 210-260 study guide, 210-260 exam questions, 210-260 exam dump or 210-260 test, has you covered. Following questions and answers are all new published by Cisco Official Exam Center: QUESTION 261HIPS and NIPSYou need to place these 7 options into HIPS and NIPS. Each section has 4 choices which means one out of these 7 options goes into both.  Answer:   QUESTION 262Which label is given to a person who uses existing computer scripts to hack into computers lacking the expertise to write their own? A.    white hat hackerB.    hacktivistC.    phreakerD.    script kiddy Answer: D QUESTION 263When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class? (Choose three.) A.    passB.    policeC.    inspectD.    dropE.    queueF.    shape Answer: ACD QUESTION 264Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS wizard? (Choose four.) A.    Select the interface(s) to apply the IPS rule.B.    Select the traffic flow direction that should be applied by the IPS rule.C.    Add or remove IPS alerts actions based on the risk rating.D.    Specify the signature file and the Cisco public key.E.    Select the IPS bypass mode (fail-open or fail-close).F.    Specify the configuration location and select the category of signatures to be applied to the selected interface(s). Answer: ABDF QUESTION 265Refer to the exhibit. All ports on switch 1 have a primary VLAN of 300. Which devices can host 1 reach?   A.    Host 2B.    ServerC.    Host 4D.    Other devices within VLAN 303 Answer: B QUESTION 266What is the effect of the ASA command crypto isakmp nat-traversal? A.    It opens port 4500 only on the outside interface.B.    It opens port 500 only on the inside interface.C.    It opens port 500 only on the outside interface.D.    It opens port 4500 on all interfaces that are IPSec enabled. Answer: D QUESTION 267What is true about the Cisco IOS Resilient Configuration feature? A.    The feature can be disabled through a remote sessionB.    There is additional space required to secure the primary Cisco IOS Image fileC.    The feature automatically detects image and configuration version mismatchD.    Remote storage is used for securing files Answer: C QUESTION 268Which two characteristics apply to an Intrusion Prevention System (IPS) ? Choose two A.    Does not add delay to the original traffic.B.    Cabled directly inline with the flow of the network traffic.C.    Can drop traffic based on a set of rules.D.    Runs in promoscous mode.E.    Cannot drop the packet on its own Answer: BCExplanation:+ Position in the network flow: Directly inline with the flow of network traffic and every packet goes through the sensor on its way through the network.+ Mode: Inline mode+ The IPS can drop the packet on its own because it is inline. The IPS can also request assistance fromanother device to block future packets just as the IDS does. QUESTION 269What information does the key length provide in an encryption algorithm? A.    the packet sizeB.    the number of permutationsC.    the hash block sizeD.    the cipher block size Answer: C QUESTION 270Which type of layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient? A.    BPDU attackB.    DHCP StarvationC.    CAM table overflowD.    MAC address spoofing Answer: D QUESTION 271What feature defines a campus area network? A.    It has a single geographic location.B.    It has limited or restricted Internet access.C.    It has a limited number of segments.D.    it lacks external connectivity. Answer: A QUESTION 272A Cisco ASA appliance has three interfaces configured. The first interface is the inside interface with a security level of 100. The second interface is the DMZ interface with a security level of 50. The third interface is the outside interface with a security level of 0.By default, without any access list configured, which five types of traffic are permitted? (Choose five.) A.    outbound traffic initiated from the inside to the DMZB.    outbound traffic initiated from the DMZ to the outsideC.    outbound traffic initiated from the inside to the outsideD.    inbound traffic initiated from the outside to the DMZE.    inbound traffic initiated from the outside to the insideF.    inbound traffic initiated from the DMZ to the insideG.    HTTP return traffic originating from the inside network and returning via the outside interfaceH.    HTTP return traffic originating from the inside network and returning via the DMZ interfaceI.    HTTP return traffic originating from the DMZ network and returning via the inside interfaceJ.    HTTP return traffic originating from the outside network and returning via the inside interface Answer: ABCGHExplanation: QUESTION 273Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement? A.    nested object-classB.    class-mapC.    extended wildcard matchingD.    object groups Answer: D QUESTION 274What are two well-known security terms? (Choose Two) A.    Phishing.B.    BPDU guardC.    LACPD.    ransomewareE.    hair-pinning Answer: AD QUESTION 275How to verify that TACACS+ connectivity to a device? A.    You successfully log in to the device by using the local credentials.B.    You connect to the device using SSH and receive the login prompt.C.    You successfully log in to the device by using ACS credentials.D.    You connect via console port and receive the login prompt. Answer: B QUESTION 276Which two actions can a zone-based firewall take when looking at traffic? (Choose two) A.    FilterB.    ForwardC.    DropD.    BroadcastE.    Inspect Answer: CE QUESTION 277What technology can you use to provide data confidentiality, data integrity and data origin authentication on your network? A.    Certificate AuthorityB.    IKEC.    IPSecD.    Data Encryption Standards Answer: C QUESTION 278In which type of attack does an attacker send email messages that ask the recipient to click a link such as A.    phishingB.    pharmingC.    solicitationD.    secure transaction Answer: A QUESTION 279When is the default deny all policy an exception in zone-based firewalls? A.    When traffic traverses two interfaces in in the same zoneB.    When traffic terminates on the router via the self zoneC.    When traffic sources from the router via the self zoneD.    When traffic traverses two interfaces in different zones Answer: A QUESTION 280In which configuration mode do you configure the ip ospf authentication-key 1 command? A.    InterfaceB.    routing processC.    globalD.    privileged Answer: A At Lead2pass we verify that 100% of the 210-260 exam questions in exam test prep package are real questions from a recent version of the 210-260 test you are about to take. We have a wide library of 210-260 exam dumps. 210-260 new questions on Google Drive: 2017 Cisco 210-260 exam dumps (All 362 Q&As) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-09-28 06:15:23 Post date GMT: 2017-09-28 06:15:23 Post modified date: 2017-09-28 06:15:23 Post modified date GMT: 2017-09-28 06:15:23 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from