aiotestking uk

210-260 Exam Questions - Online Test


210-260 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. For what reason would you configure multiple security contexts on the ASA firewall? 

A. To separate different departments and business units. 

B. To enable the use of VRFs on routers that are adjacently connected. 

C. To provide redundancy and high availability within the organization. 

D. To enable the use of multicast routing and QoS through the firewall. 

Answer:

Q2. Which FirePOWER preprocessor engine is used to prevent SYN attacks? 

A. Rate-Based Prevention 

B. Portscan Detection 

C. IP Defragmentation 

D. Inline Normalization 

Answer:

Q3. Which statement about a PVLAN isolated port configured on a switch is true? 

A. The isolated port can communicate only with the promiscuous port. 

B. The isolated port can communicate with other isolated ports and the promiscuous port. 

C. The isolated port can communicate only with community ports. 

D. The isolated port can communicate only with other isolated ports. 

Answer:

Q4. What three actions are limitations when running IPS in promiscuous mode? (Choose three.) 

A. deny attacker 

B. deny packet 

C. modify packet 

D. request block connection 

E. request block host 

F. reset TCP connection 

Cisco 210-260 : Practice Test 

Answer: A,B,C 

Q5. Which statement about personal firewalls is true? 

A. They can protect a system by denying probing requests. 

B. They are resilient against kernel attacks. 

C. They can protect email messages and private documents in a similar way to a VPN. 

D. They can protect the network against attacks. 

Answer:

Q6. What can the SMTP preprocessor in FirePOWER normalize? 

A. It can extract and decode email attachments in client to server traffic. 

B. It can look up the email sender. 

C. It compares known threats to the email sender. 

D. It can forward the SMTP traffic to an email filter server. 

E. It uses the Traffic Anomaly Detector. 

Answer:

Q7. Which statement about application blocking is true? 

A. It blocks access to specific programs. 

B. It blocks access to files with specific extensions. 

C. It blocks access to specific network addresses. 

D. It blocks access to specific network services. 

Answer:

Q8. What is an advantage of implementing a Trusted Platform Module for disk encryption? 

A. It provides hardware authentication. 

B. It allows the hard disk to be transferred to another device without requiring re-encryption.dis 

C. It supports a more complex encryption algorithm than other disk-encryption technologies. 

D. It can protect against single points of failure. 

Answer:

Q9. What type of algorithm uses the same key to encrypt and decrypt data? Cisco 210-260 : Practice Test 

A. a symmetric algorithm 

B. an asymmetric algorithm 

C. a Public Key Infrastructure algorithm 

D. an IP security algorithm 

Answer:

Q10. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.) 

A. AES 

B. 3DES 

C. DES 

D. MD5 

E. DH-1024 

F. SHA-384 

Answer: A,F