aiotestking uk

210-260 Exam Questions - Online Test


210-260 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Scenario 

In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. 

To access ASDM, click the ASA icon in the topology diagram. 

Note: Not all ASDM functionalities are enabled in this simulation. 

To see all the menu options available on the left navigation pane, you may also need to un-expand the expanded menu first. 

Which four tunneling protocols are enabled in the DfltGrpPolicy group policy? (Choose four) 

A. Clientless SSL VPN 

B. SSL VPN Client 

C. PPTP 

D. L2TP/IPsec 

E. IPsec IKEv1 

F. IPsec IKEv2 

Cisco 210-260 : Practice Test 

Answer: A,D,E,F 

Explanation: 

By clicking one the Configuration-> Remote Access -> Clientless CCL VPN Access-> Group Policies tab you can view the DfltGrpPolicy protocols as shown below: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.00.18 AM.png 

Q2. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.) 

A. AES 

B. 3DES 

C. DES 

D. MD5 

E. DH-1024 

F. SHA-384 

Answer: A,F 

Q3. Refer to the exhibit. 

How many times was a read-only string used to attempt a write operation? 

A. 9 

B. 6 

C. 4 

D. 3 

E. 2 

Answer:

Q4. Which three ESP fields can be encrypted during transmission? (Choose three.) 

A. Security Parameter Index 

B. Sequence Number 

C. MAC Address 

D. Padding 

E. Pad Length 

F. Next Header 

Answer: D,E,F 

Q5. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.) 

A. BOOTP 

B. TFTP 

C. DNS 

D. MAB 

E. HTTP 

F. 802.1x 

Answer: A,B,C 

Q6. What type of algorithm uses the same key to encrypt and decrypt data? Cisco 210-260 : Practice Test 

A. a symmetric algorithm 

B. an asymmetric algorithm 

C. a Public Key Infrastructure algorithm 

D. an IP security algorithm 

Answer:

Q7. Which FirePOWER preprocessor engine is used to prevent SYN attacks? 

A. Rate-Based Prevention 

B. Portscan Detection 

C. IP Defragmentation 

D. Inline Normalization 

Answer:

Q8. Scenario 

In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. 

To access ASDM, click the ASA icon in the topology diagram. 

Note: Not all ASDM functionalities are enabled in this simulation. 

To see all the menu options available on the left navigation pane, you may also need to un-expand the expanded menu first. 

Which two statements regarding the ASA VPN configurations are correct? (Choose two) 

A. The ASA has a certificate issued by an external Certificate Authority associated to the ASDM_TrustPoint1. 

B. The DefaultWEBVPNGroup Connection Profile is using the AAA with RADIUS server method. 

C. The Inside-SRV bookmark references the https://192.168.1.2 URL 

D. Only Clientless SSL VPN access is allowed with the Sales group policy 

E. AnyConnect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface 

F. The Inside-SRV bookmark has not been applied to the Sales group policy 

Answer: B,C 

Explanation: 

For B: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.38.21 AM.png For C, Navigate to the Bookmarks tab: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.40.14 AM.png Then hit “edit” and you will see this: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.41.54 AM.png Not A, as this is listed under the Identity Certificates, not the CA certificates: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.34.54 AM.png Note E: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.26.56 AM.png 

Q9. In which three ways does the TACACS protocol differ from RADIUS? (Choose three.) 

A. TACACS uses TCP to communicate with the NAS. 

B. TACACS can encrypt the entire packet that is sent to the NAS. 

C. TACACS supports per-command authorization. 

D. TACACS authenticates and authorizes simultaneously, causing fewer packets to be transmitted. 

E. TACACS uses UDP to communicate with the NAS. 

F. TACACS encrypts only the password field in an authentication packet. 

Answer: A,B,C 

Q10. After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output? 

A. The secure boot-image command is configured. 

B. The secure boot-comfit command is configured. 

C. The confreg 0x24 command is configured. 

D. The reload command was issued from ROMMON. 

Answer: