[Free] 2018(Aug) Ensurepass Cisco 210-260 Dumps with VCE and PDF 61-70

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 61

Which TACACS server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)

  1. EAP

  2. ASCII

  3. PAP

  4. PEAP

  5. MS-CHAPv1

  6. MS-CHAPv2

Answer: B,C,E

Question No: 62

What hash type does Cisco use to validate the integrity of downloaded images?

  1. Sha1

  2. Sha2

  3. Md5

  4. Md1

Answer: C

Question No: 63

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

What is the effect of the given command?

  1. It merges authentication and encryption methods to protect traffic that matches an ACL.

  2. It configures the network to use a different transform set between peers.

  3. It configures encryption for MD5 HMAC.

  4. It configures authentication as AES 256.

Answer: A

Question No: 64

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

All ports on switch 1 have a primary VLAN of 300. Which devices can host 1 reach?

  1. Host 2

  2. Server

  3. Host 4

  4. Other devices within VLAN 303

Answer: B

Question No: 65

What is the primary purpose of a defined rule in an IPS?

  1. to configure an event action that takes place when a signature is triggered

  2. to define a set of actions that occur when a specific user logs in to the system

  3. to configure an event action that is pre-defined by the system administrator

  4. to detect internal attacks

Answer: A

Question No: 66

Which two devices are components of the BYOD architectural framework?

  1. Prime Infrastructure

  2. Nexus 7010 Switch

  3. Cisco 3945 Router

  4. Wireless Access Points

  5. Identity Services Engine

Answer: A,E

Question No: 67

When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?

  1. STP elects the root bridge

  2. STP selects the root port

  3. STP selects the designated port

  4. STP blocks one of the ports

Answer: A

Question No: 68

Which type of encryption technology has the broadest platform support to protect operating systems?

  1. software

  2. hardware

  3. middleware

  4. file-level

Answer: A

Question No: 69

Which tool can an attacker use to attempt a DDoS attack?

  1. botnet

  2. Trojan horse

  3. virus

  4. adware

Answer: A

Question No: 70

Which of the following are features of IPsec transport mode? (Choose three.)

  1. IPsec transport mode is used between end stations

  2. IPsec transport mode is used between gateways

  3. IPsec transport mode supports multicast

  4. IPsec transport mode supports unicast

  5. IPsec transport mode encrypts only the payload

  6. IPsec transport mode encrypts the entire packet

Answer: A,D,E

100% Ensurepass Free Download!
210-260 PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.