aiotestking uk

210-260 Exam Questions - Online Test


210-260 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Approved 210-260 courses are available on Google Drive, GET MORE: https://drive.google.com/open?id=15-c9rTF9Mlkw5H3RVg0ANt7WlKNsZNZm


New Cisco 210-260 Exam Dumps Collection (Question 3 - Question 12)

New Questions 3

Whit which type of Leyer 2 attack can you u201cdo somethingu201d for one host:

A. MAC spoofing

B. CAM overflowu2026.

Answer: A


New Questions 4

Refer to the exhibit.

You have configured R1 and R2 as shown, but the routers are unable to establish a site-to- site VPN tunnel. What action can you take to correct the problem?

A. Edit the crypto keys on R1 and R2 to match.

B. Edit the ISAKMP policy sequence numbers on R1 and R2 to match.

C. Set a valid value for the crypto key lifetime on each router.

D. Edit the crypto isakmp key command on each router with the address value of its own interface.

Answer: A


New Questions 5

If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?

A. STP BPDU guard

B. loop guard

C. STP Root guard

D. EtherChannel guard

Answer: A


New Questions 6

Which address block is reserved for locally assigned unique local addresses?

A. 2002::/16

B. FD00::/8

C. 2001::/32

D. FB00::/8

Answer: B


New Questions 7

Which security measures can protect the control plane of a Cisco router? (Choose two.)

A. CCPr

B. Parser views

C. Access control lists

D. Port security

E. CoPP

Answer: A,E


New Questions 8

Which FirePOWER preprocessor engine is used to prevent SYN attacks?

A. Rate-Based Prevention

B. Portscan Detection

C. IP Defragmentation

D. Inline Normalization

Answer: A


New Questions 9

In which stage of an attack does the attacker discover devices on a target network?

A. Reconnaissance

B. Covering tracks

C. Gaining access

D. Maintaining access

Answer: A


New Questions 10

Refer to the exhibit.

While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?

A. IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.

B. IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.

C. IPSec Phase 1 is down due to a QM_IDLE state.

D. IPSec Phase 2 is down due to a QM_IDLE state.

Answer: A


New Questions 11

What configuration allows AnyConnect to automatically establish a VPN session when a user logs in to the computer?

A. always-on

B. proxy

C. transparent mode

D. Trusted Network Detection

Answer: A


New Questions 12

Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?

A. advanced persistent threat

B. targeted malware

C. drive-by spyware

D. social activism

Answer: A


P.S. Easily pass 210-260 Exam with Certleader Approved Dumps & pdf vce, Try Free: https://www.certleader.com/210-260-dumps.html (387 New Questions)