Cisco 210-260 exam questions, 210-260 dumps easy to prepare for passing exams

Implementing Cisco Network Security (IINS)” Exam 210-260. Here you can get the latest free Cisco 210-260 exam exercise questions and answers for free and easily improve your skills!

210-260 exam – This exam tests the candidate’s knowledge of secure network infrastructure, understanding core security concepts, managing secure access, VPN encryption, firewalls, intrusion prevention, web, and email content security, and endpoint security using:

  • SIEM Technology
  • Cloud & Virtual Network Topologies
  • BYOD, Bring Your Own Device
  • Identity Services Engine (ISE)
  • 802.1x Authentication
  • Cisco FirePOWER Next-Generation IPS (under Domain 6.0)
  • Anti-Malware/Cisco Advanced Malware Protection

This exam validates skills for installation, troubleshooting, and monitoring of a secure network to maintain integrity, confidentiality, and availability of data and devices. Follow the link to find more information about https://www.leads4pass.com/210-260.html exam.

Watch the Cisco 210-260 video tutorial online

Table of Contents:

Latest Cisco 210-260 pdf

[PDF] Free Cisco 210-260 pdf dumps download from Google Drive: https://drive.google.com/open?id=18g6SvjFACTYNFLSKSTyQQ9v_tk78GEnN

Free Cisco 210-260 Exam Practice Questions

QUESTION 1
Which statement about college campus is true?
A. College campus has geographical position.
B. College campus Hasn`t got internet access.
C. College campus Has multiple subdomains.
Correct Answer: A

 

QUESTION 2
Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)
A. EAP
B. ASCII
C. PAP
D. PEAP
E. MS-CHAPv1
F. MS-CHAPv2
Correct Answer: CEF
The ASA supports the following authentication methods with RADIUS servers:
PAP – For all connection types.
CHAP and MS-CHAPv1 – For L2TP-over-IPsec connections.
MS-CHAPv2 – For L2TP-over-IPsec connections, and for regular IPsec remote access connections when the password
management feature is enabled. You can also use MS-CHAPv2 with clientless connections.
Authentication Proxy modes – For RADIUS-to Active-Directory, RADIUS-to-RSA/SDI, RADIUS- to-Token server
http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/aaa_radius.html#77318

 

QUESTION 3
Where OAKLEY and SKEME come to play?
A. IKE
B. ISAKMP
C. DES
Correct Answer: A
The Oakley Key Determination Protocol is a key-agreement protocol that allows authenticated parties to exchange
keying material across an insecure connection using the DiffieHellman key exchange algorithm. The protocol was
proposed by Hilarie K. Orman in 1998, and formed the basis for the more widely used Internet key exchange protocol
https://en.wikipedia.org/wiki/Oakley_protocol IKE (Internet Key Exchange) A key management protocol standard that is
used in conjunction with the IPSec standard. IPSec is an IP security feature that provides robust authentication and
encryption of IP packets. IPSec can be configured without IKE, but IKE enhances IPSec by providing additional
features, flexibility, and ease of configuration for the IPSec standard. IKE is a hybrid protocol that implements the
Oakley key exchange and Skeme key exchange inside of the Internet Security Association and Key Management
Protocol (ISAKMP) framework. ISAKMP, Oakley, and Skeme are security protocols implemented by IKE
https://www.symantec.com/security_response/glossary/define.jsp?letter=iandword=ike-internet-key-exchange

 

QUESTION 4
Which type of layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?
A. BPDU attack
B. DHCP Starvation
C. CAM table overflow
D. MAC address spoofing
Correct Answer: D

 

QUESTION 5
In which two situations should you use out-of-band management? (Choose two)
A. when a network device fails to forward packets
B. when management applications need concurrent access to the device
C. when you require ROMMON access
D. when you require administrator\\’s access from multiple locations
E. when the control plane fails to respond
Correct Answer: AC
OOB management is used for devices at the headquarters and is accomplished by connecting dedicated management
ports or spare Ethernet ports on devices directly to the dedicated OOB management network hosting the management
and monitoring applications and services. The OOB management network can be either implemented as a collection of
dedicated hardware or based on VLAN isolation. Source:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg/chap9.html


QUESTION 6
Which three ESP fields can be encrypted during transmission? (Choose three)
A. Next Header
B. MAC Address
C. Padding
D. Pad Length
E. Sequence Number
F. Security Parameter Index
Correct Answer: ACD
The last encrypted part is the Payload Data. The unencrypted parts are the Security Parameter Index and the Sequence
Number.

 

QUESTION 7
What is the only permitted operation for processing multicast traffic on zone-based firewalls?
A. Stateful inspection of multicast traffic is supported only for the self zone
B. Stateful inspection for multicast traffic is supported only between the self-zone and the internal zone
C. Only control plane policing can protect the control plane against multicast traffic.
D. Stateful inspection of multicast traffic is supported only for the internal zone.
Correct Answer: C

 

QUESTION 8
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate
host?
A. MAC spoofing
B. ARP spoofing
C. CAM table overflow
D. DHCP spoofing
Correct Answer: C

 

QUESTION 9
Self zone (2 option)?
A. can be source or deatination zone.
B. can be use statful filtering during multicast.
C. all interfaces wil be used for self zone
Correct Answer: AC
DHCP spoofing occurs when an attacker attempts to respond to DHCP requests and trying to list themselves (spoofs)
as the default gateway or DNS server, hence, initiating a man in the middle attack. With that, it is possible that they can
intercept traffic from users before forwarding to the real gateway or perform DoS by flooding the real DHCP server with
request to choke ip address resources. https://learningnetwork.cisco.com/thread/67229
https://learningnetwork.cisco.com/docs/DOC-24355

 

QUESTION 10
Which statement about zone-based firewall configuration is true?
A. Traffic is implicitly denied by default between interfaces the same zone
B. Traffic that is desired to or sourced from the self-zone is denied by default
C. The zone must be configured before a can be assigned
D. You can assign an interface to more than one interface
Correct Answer: C

 

QUESTION 11
What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)
A. Use an SSH connection.
B. Use SNMPv3.
C. Use out-of-band management.
D. Use SNMPv2.
E. Use in-band management.
Correct Answer: AB

 

QUESTION 12
Which two NAT types allow only objects or groups to reference an IP address? (Choose two)
A. dynamic NAT
B. dynamic PAT
C. static NAT
D. identity NAT
Correct Answer: AC
Adding Network Objects for Mapped Addresses
For dynamic NAT, you must use an object or group for the mapped addresses. Other NAT types have the option of
using inline addresses, or you can create an object or group according to this section.
* Dynamic NAT:
+
You cannot use an inline address; you must configure a network object or group.
+
The object or group cannot contain a subnet; the object must define a range; the group can include hosts and ranges.
+
If a mapped network object contains both ranges and host IP addresses, then the ranges are used for dynamic NAT,
and then the host IP addresses are used as a PAT fallback.
* Dynamic PAT (Hide):
+
Instead of using an object, you can optionally configure an inline host address or specify the interface address.
+
If you use an object, the object or group cannot contain a subnet; the object must define a host, or for a PAT pool, a
range; the group (for a PAT pool) can include hosts and ranges.
* Static NAT or Static NAT with port translation:
+
Instead of using an object, you can configure an inline address or specify the interface address (for static NAT-with-port-
translation).
+
If you use an object, the object or group can contain a host, range, or subnet.
* Identity NAT
+
Instead of using an object, you can configure an inline address.
+
If you use an object, the object must match the real addresses you want to translate.
http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/nat_objects.html#61711

 

QUESTION 13
What is the purpose of the Integrity component of the CIA triad?
A. to ensure that only authorized parties can modify data
B. to determine whether data is relevant
C. to create a process for accessing data
D. to ensure that only authorized parties can view data
Correct Answer: A

Related 210-260 Popular Exam resources

titlepdf youtube Cisco leads4pass leads4pass Total Questions
Cisco CCNA Security leads4pass 210-260 dumps pdf leads4pass 210-260 youtube 210-260 IINS – Cisco https://www.leads4pass.com/210-260.html 524 Q&A
leads4pass 640-554 dumps pdf leads4pass 640-554 youtube https://www.leads4pass.com/640-554.html 308 Q&A

Get leads4pass Coupons(12% OFF)

leads4pass coupon

What are the advantages of leads4pass?

leads4pass employs the most authoritative exam specialists from Cisco, Microsoft, CompTIA, IBM, EMC, etc. We update exam data throughout the year. Highest pass rate! We have a large user base. We are an industry leader! Choose leads4pass to pass the exam with ease!

why leads4pass

Summarize:

It’s not easy to pass the Cisco 210-260 exam, but with accurate learning materials and proper practice, you can crack the exam with excellent results. leads4pass provides you with the most relevant learning materials that you can use to help you prepare.

You may also like...