P.S. Exact 210-260 Q&A are available on Google Drive, GET MORE: https://drive.google.com/open?id=15Wj8GqxvfYTz0nGHdJkfV_zMadDrezid
Q1. Which two NAT types allows only objects or groups to reference an IP address? (choose two)
A. dynamic NAT
B. dynamic PAT
C. static NAT
D. identity NAT
Answer: A,C
Q2. Which prevent the company data from modification even when the data is in transit?
A. Confidentiality
B. Integrity
C. Vailability
Answer: B
Q3. What is an advantage of implementing a Trusted Platform Module for disk encryption?
A. It provides hardware authentication.
B. It allows the hard disk to be transferred to another device without requiring re- encryption.dis
C. It supports a more complex encryption algorithm than other disk-encryption technologies.
D. It can protect against single points of failure.
Answer: A
Q4. Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)
A. Smart tunnels can be used by clients that do not have administrator privileges
B. Smart tunnels support all operating systems
C. Smart tunnels offer better performance than port forwarding
D. Smart tunnels require the client to have the application installed locally
Answer: A,C
Q5. Which two primary security concerns can you mitigate with a BYOD solution? (Choose two)
A. Schedule for patching the device
B. compliance with applicable policies
C. device lagging and inventory
D. Connections to public Wi-Fi networks
E. Securing access to a trusted corporate network.
Answer: B,E
Q6. What are two uses of SIEM software? (Choose two.)
A. collecting and archiving syslog data
B. alerting administrators to security events in real time
C. performing automatic network audits
D. configuring firewall and IDS devices
E. scanning email for suspicious attachments
Answer: A,B
Q7. By which kind of threat is the victim tricked into entering username and password information at a disguised website?
A. Spoofing
B. Malware
C. Spam
D. Phishing
Answer: D
Q8. Which line in the following OSPF configuration will not be required for MD5 authentication to work?
interface GigabitEthernet0/1
ip address 192.168.10.1 255.255.255.0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 CCNA
!
router ospf 65000
router-id 192.168.10.1
area 20 authentication message-digest network 10.1.1.0 0.0.0.255 area 10
network 192.168.10.0 0.0.0.255 area 0
!
A. ip ospf authentication message-digest
B. network 192.168.10.0 0.0.0.255 area 0
C. area 20 authentication message-digest
D. ip ospf message-digest-key 1 md5 CCNA
Answer: C
Q9. What VPN feature allows traffic to exit the security appliance through the same interface it entered?
A. hairpinning
B. NAT
C. NAT traversal
D. split tunneling
Answer: A
Q10. SYN flood attack is a form of ?
A. Denial of Service attack
B. Man in the middle attack
C. Spoofing attack
Answer: A
P.S. Easily pass 210-260 Exam with 2passeasy Exact Dumps & pdf vce, Try Free: https://www.2passeasy.com/dumps/210-260/ (310 New Questions)