aiotestking uk

210-260 Exam Questions - Online Test


210-260 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Exact 210-260 Q&A are available on Google Drive, GET MORE: https://drive.google.com/open?id=15Wj8GqxvfYTz0nGHdJkfV_zMadDrezid


New Cisco 210-260 Exam Dumps Collection (Question 2 - Question 11)

Q1. Which two NAT types allows only objects or groups to reference an IP address? (choose two)

A. dynamic NAT

B. dynamic PAT

C. static NAT

D. identity NAT

Answer: A,C


Q2. Which prevent the company data from modification even when the data is in transit?

A. Confidentiality

B. Integrity

C. Vailability

Answer: B


Q3. What is an advantage of implementing a Trusted Platform Module for disk encryption?

A. It provides hardware authentication.

B. It allows the hard disk to be transferred to another device without requiring re- encryption.dis

C. It supports a more complex encryption algorithm than other disk-encryption technologies.

D. It can protect against single points of failure.

Answer: A


Q4. Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)

A. Smart tunnels can be used by clients that do not have administrator privileges

B. Smart tunnels support all operating systems

C. Smart tunnels offer better performance than port forwarding

D. Smart tunnels require the client to have the application installed locally

Answer: A,C


Q5. Which two primary security concerns can you mitigate with a BYOD solution? (Choose two)

A. Schedule for patching the device

B. compliance with applicable policies

C. device lagging and inventory

D. Connections to public Wi-Fi networks

E. Securing access to a trusted corporate network.

Answer: B,E


Q6. What are two uses of SIEM software? (Choose two.)

A. collecting and archiving syslog data

B. alerting administrators to security events in real time

C. performing automatic network audits

D. configuring firewall and IDS devices

E. scanning email for suspicious attachments

Answer: A,B


Q7. By which kind of threat is the victim tricked into entering username and password information at a disguised website?

A. Spoofing

B. Malware

C. Spam

D. Phishing

Answer: D


Q8. Which line in the following OSPF configuration will not be required for MD5 authentication to work?

interface GigabitEthernet0/1

ip address 192.168.10.1 255.255.255.0

ip ospf authentication message-digest

ip ospf message-digest-key 1 md5 CCNA

!

router ospf 65000

router-id 192.168.10.1

area 20 authentication message-digest network 10.1.1.0 0.0.0.255 area 10

network 192.168.10.0 0.0.0.255 area 0

!

A. ip ospf authentication message-digest

B. network 192.168.10.0 0.0.0.255 area 0

C. area 20 authentication message-digest

D. ip ospf message-digest-key 1 md5 CCNA

Answer: C


Q9. What VPN feature allows traffic to exit the security appliance through the same interface it entered?

A. hairpinning

B. NAT

C. NAT traversal

D. split tunneling

Answer: A


Q10. SYN flood attack is a form of ?

A. Denial of Service attack

B. Man in the middle attack

C. Spoofing attack

Answer: A


P.S. Easily pass 210-260 Exam with 2passeasy Exact Dumps & pdf vce, Try Free: https://www.2passeasy.com/dumps/210-260/ (310 New Questions)