P.S. Pinpoint 210-260 preparation exams are available on Google Drive, GET MORE: https://drive.google.com/open?id=1gwjXgAJefTuogS03f-ww4R_KL-qD9880
New Questions 11
Which two protocols enable Cisco Configuration Professional to pull IPS alerts from a Cisco ISR router? (Choose two.)
A. syslog
B. SDEE
C. FTP
D. TFTP
E. SSH
F. HTTPS
Answer: B,F
Explanation:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/prod_white_paper0900aecd805c4ea8.html
Step 4: Enabling IOS IPS
The fourth step is to configure IOS IPS using the following sequence of steps: Step 4.1: Create a rule name (This will be used on an interface to enable IPS) ip ips name <rule name> < optional ACL>
router#configure terminal router(config)# ip ips name iosips
You can specify an optional extended or standard access control list (ACL) to filter the traffic that will be scanned by this rule name. All traffic that is permitted by the ACL is subject to inspection by the IPS. Traffic that is denied by the ACL is not inspected by the IPS.
router(config)#ip ips name ips list ?
<1-199> Numbered access list WORD Named access list
Step 4.2: Configure IPS signature storage location, this is the directory `ips' created in Step 2
ip ips config location flash:<directory name> router(config)#ip ips config location flash:ips Step 4.3: Enable IPS SDEE event notification
ip ips notify sdee router(config)#ip ips notify sdee
To use SDEE, the HTTP server must be enabled (via the `ip http server' command). If the HTTP server is not enabled, the router cannot respond to the SDEE clients because it
cannot see the requests. SDEE notification is disabled by default and must be explicitly enabled.
New Questions 12
Which IPS mode provides the maximum number of actions?
A. inline
B. promiscuous
C. span
D. failover
E. bypass
Answer: A
New Questions 13
Which statement about a PVLAN isolated port configured on a switch is true?
A. The isolated port can communicate only with the promiscuous port.
B. The isolated port can communicate with other isolated ports and the promiscuous port.
C. The isolated port can communicate only with community ports.
D. The isolated port can communicate only with other isolated ports.
Answer: A
New Questions 14
Refer to the exhibit.
How many times was a read-only string used to attempt a write operation?
A. 9
B. 6
C. 4
D. 3
E. 2
Answer: A
New Questions 15
What can cause the the state table of a stateful firewall to update? (choose two)
A. when a connection is created
B. When a connectionu2021s timer has expired within state table
C. C. when packet is evaluated against the outbound access list and is denied
D. D. when outbound packets forwarded to outbound interface
E. E. when rate-limiting is applied
Answer: A,B
New Questions 16
Which term best describes the concept of preventing the modification of data in transit and in storage?
A. Confidentiality
B. Integrity
C. Availability
D. fidelity
Answer: B
Explanation:
Integrity for data means that changes made to data are done only by authorized individuals/systems.
Corruption of data is a failure to maintain data integrity.
Source: Cisco Official Certification Guide, Confidentiality, Integrity, and Availability, p.6
New Questions 17
Which option describes information that must be considered when you apply an access list to a physical interface?
A. Protocol used for filtering
B. Direction of the access class
C. Direction of the access group
D. Direction of the access list
Answer: C
New Questions 18
How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?
A. Issue the command anyconnect keep-installer under the group policy or username webvpn mode
B. Issue the command anyconnect keep-installer installed in the global configuration
C. Issue the command anyconnect keep-installer installed under the group policy or username webvpn mode
D. Issue the command anyconnect keep-installer installer under the group policy or username webvpn mode
Answer: C
New Questions 19
Which firepower preprocessor block traffic based on IP?
A. Signature-Based
B. Policy-Based
C. Anomaly-Based
D. Reputation-Based
Answer: D
New Questions 20
Which Cisco product can help mitigate web-based attacks within a network?
A. Adaptive Security Appliance
B. Web Security Appliance
C. Email Security Appliance
D. Identity Services Engine
Answer: B
P.S. Easily pass 210-260 Exam with Examcollectionplus Pinpoint Dumps & pdf vce, Try Free: https://www.examcollectionplus.net/vce-210-260/ (310 New Questions)