[Free] 2018(Aug) Ensurepass Cisco 210-260 Dumps with VCE and PDF 181-190

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 181

What is the FirePOWER impact flag used for?

  1. A value that indicates the potential severity of an attack.

  2. A value that the administrator assigns to each signature.

  3. A value that sets the priority of a signature.

  4. A value that measures the application awareness.

Answer: A

Question No: 182

How does a device on a network using ISE receive its digital certificate during the new- device registration process?

  1. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server.

  2. ISE issues a certificate from its internal CA server.

  3. ISE issues a pre-defined certificate from a local database.

  4. The device requests a new certificate directly from a central CA.

Answer: A

Question No: 183

SYN flood attack is a form of ?

  1. Denial of Service attack

  2. Man in the middle attack

  3. Spoofing attack

Answer: A

Question No: 184

Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)

  1. QoS

  2. traffic classification

  3. access lists

  4. policy maps

  5. class maps

  6. Cisco Express Forwarding

Answer: A,B

Question No: 185

Which command is used to verify that a VPN connection is established between two endpoints and that the connection is passing?

  1. Firewall#sh crypto ipsec sa

  2. Firewall#sh crypto isakmp sa

  3. Firewall#debug crypto isakmp

  4. Firewall#sh crypto session

Answer: A

Question No: 186

What is example of social engineering

  1. Gaining access to a building through an unlocked door.

  2. something about inserting a random flash drive.

  3. gaining access to server room by posing as IT

  4. Watching other user put in username and password (something around there)

Answer: C

Question No: 187

In which configuration mode do you configure the ip ospf authentication-key 1

command?

  1. Interface

  2. routing process

  3. global

  4. privileged

Answer: A

Question No: 188

Which three statements are characteristics of DHCP Spoofing? (choose three)

  1. Arp Poisoning

  2. Modify Traffic in transit

  3. Used to perform man-in-the-middle attack

  4. Physically modify the network gateway

  5. Protect the identity of the attacker by masking the DHCP address

  6. can access most network devices

Answer: A,B,C

Question No: 189

Which option is the most effective placement of an IPS device within the infrastructure?

  1. Inline, behind the internet router and firewall

  2. Inline, before the internet router and firewall

  3. Promiscuously, after the Internet router and before the firewall

  4. Promiscuously, before the Internet router and the firewall

Answer: A

Question No: 190

What is the purpose of a honeypot IPS?

  1. To create customized policies

  2. To detect unknown attacks

  3. To normalize streams

  4. To collect information about attacks

Answer: D

100% Ensurepass Free Download!
210-260 PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.