The Secret of 210 260 home lab files

Your success in Cisco 210 260 vce is our sole target and we develop all our cisco 210 260 dump braindumps in a way that facilitates the attainment of this target. Not only is our ccna security 210 260 official cert guide pdf study material the best you can find, it is also the most detailed and the most updated. ccna security 210 260 book Practice Exams for Cisco CCNA Security cisco 210 260 dump are written to the highest standards of technical accuracy.


Free VCE & PDF File for Cisco 210-260 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 210-260 Exam Dumps (PDF & VCE):
Available on:

Q1. Which three ESP fields can be encrypted during transmission? (Choose three.) 

A. Security Parameter Index 

B. Sequence Number 

C. MAC Address 

D. Padding 

E. Pad Length 

F. Next Header 

Answer: D,E,F 

Q2. If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use? 

A. root guard 

B. EtherChannel guard 

C. loop guard 

D. BPDU guard 


Q3. What type of attack was the Stuxnet virus? 

A. cyber warfare 

B. hacktivism 

C. botnet 

D. social engineering 


Q4. What is a reason for an organization to deploy a personal firewall? 

A. To protect endpoints such as desktops from malicious activity. 

B. To protect one virtual network segment from another. 

C. To determine whether a host meets minimum security posture requirements. 

D. To create a separate, non-persistent virtual environment that can be destroyed after a session. 

E. To protect the network from DoS and syn-flood attacks. 


Q5. When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading? 

A. Deny the connection inline. 

B. Perform a Layer 6 reset. 

C. Deploy an antimalware system. 

D. Enable bypass mode. 


Q6. What type of security support is provided by the Open Web Application Security Project? 

A. Education about common Web site vulnerabilities. 

B. A Web site security framework. 

C. A security discussion forum for Web site developers. 

D. Scoring of common vulnerabilities and exposures. 


Q7. How does the Cisco ASA use Active Directory to authorize VPN users? 

A. It queries the Active Directory server for a specific attribute for the specified user. 

B. It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server. 

C. It downloads and stores the Active Directory database to query for future authorization requests. 

D. It redirects requests to the Active Directory server defined for the VPN group. 


Q8. Which statement about a PVLAN isolated port configured on a switch is true? 

A. The isolated port can communicate only with the promiscuous port. 

B. The isolated port can communicate with other isolated ports and the promiscuous port. 

C. The isolated port can communicate only with community ports. 

D. The isolated port can communicate only with other isolated ports. 


Q9. A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware. 

A. Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list. 

B. Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router's local URL list. 

C. Enable URL filtering on the perimeter router and add the URLs you want to allow to the firewall's local URL list. 

D. Create a blacklist that contains the URL you want to block and activate the blacklist on the perimeter router. 

E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router. 


Q10. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.) 


B. 3DES 


D. MD5 

E. DH-1024 

F. SHA-384 

Answer: A,F