[Free] 2018(Aug) Ensurepass Cisco 210-260 Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 11

Which three ESP fields can be encrypted during transmission? (Choose three.)

  1. Security Parameter Index

  2. Sequence Number

  3. MAC Address

  4. Padding

  5. Pad Length

  6. Next Header

Answer: D,E,F

Question No: 12

Which type of layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?

  1. BPDU attack

  2. DHCP Starvation

  3. CAM table overflow

  4. MAC address spoofing

Answer: D

Question No: 13

By which kind of threat is the victim tricked into entering username and password information at a disguised website?

  1. Spoofing

  2. Malware

  3. Spam

  4. Phishing

Answer: D

Question No: 14

When is the default deny all policy an exception in zone-based firewalls?

  1. When traffic traverses two interfaces in in the same zone

  2. When traffic terminates on the router via the self zone

  3. When traffic sources from the router via the self zone

  4. When traffic traverses two interfaces in different zones

Answer: A

Question No: 15

Which statement about IOS privilege levels is true?

  1. Each privilege level supports the commands at its own level and all levels below it.

  2. Each privilege level supports the commands at its own level and all levels above it.

  3. Privilege-level commands are set explicitly for each user.

  4. Each privilege level is independent of all other privilege levels.

Answer: A

Question No: 16

Which statement about college campus is true?

  1. College campus has geographical position.

  2. College campus Hasn`t got internet access.

  3. College campus Has multiple subdomains.

Answer: A

Question No: 17

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

You have configured R1 and R2 as shown, but the routers are unable to establish a site-to- site VPN tunnel. What action can you take to correct the problem?

  1. Edit the crypto keys on R1 and R2 to match.

  2. Edit the ISAKMP policy sequence numbers on R1 and R2 to match.

  3. Set a valid value for the crypto key lifetime on each router.

  4. Edit the crypto isakmp key command on each router with the address value of its own interface.

Answer: A

Question No: 18

Which EAP method uses Protected Access Credentials?


  2. EAP-TLS


  4. EAP-GTC

Answer: A

Question No: 19

Which command verifies phase 1 of an IPsec VPN on a Cisco router?

  1. show crypto map

  2. show crypto ipsec sa

  3. show crypto isakmp sa

  4. show crypto engine connection active

Answer: C

Question No: 20

Which type of IPS can identify worms that are propagating in a network?

  1. Policy-based IPS

  2. Anomaly-based IPS

  3. Reputation-based IPS

  4. Signature-based IPS

Answer: B

100% Ensurepass Free Download!
Download Free Demo:210-260 Demo PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.