[Free] 2018(Aug) Ensurepass Cisco 210-260 Dumps with VCE and PDF 171-180

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 171

Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)

  1. outbreak filter

  2. buffer overflow filter

  3. bayesian filter

  4. web reputation filter

  5. exploit filtering

Answer: A,D

Explanation: Cisco IronPort Outbreak Filters provide a critical first layer of defense against new outbreaks. With this proven preventive solution, protection begins hours before signatures used by traditional antivirus solutions are in place. Real-world results show an average 14-hour lead time over reactive antivirus solutions.

SenderBase, the world#39;s largest email and web traffic monitoring network, provides real- time protection. The Cisco IronPort SenderBase Network captures data from over 120,000 contributing organizations around the world.

Source: http://www.cisco.com/c/en/us/products/security/email-security- appliance/outbreak_filters_index.html

Question No: 172

Which three ESP fields can be encrypted during transmission? (Choose three.)

  1. Security Parameter Index

  2. Sequence Number

  3. MAC Address

  4. Padding

  5. Pad Length

  6. Next Header

Answer: D,E,F

Question No: 173

What security feature allows a private IP address to access the Internet by translating it to a public address?

  1. NAT

  2. hairpinning

  3. Trusted Network Detection

  4. Certification Authority

Answer: A

Question No: 174

How many crypto map sets can you apply to a router interface?

  1. 3

  2. 2

  3. 4

  4. 1

Answer: D

Question No: 175

What type of algorithm uses the same key to encrypt and decrypt data?

  1. a symmetric algorithm

  2. an asymmetric algorithm

  3. a Public Key Infrastructure algorithm

  4. an IP security algorithm

Answer: A

Question No: 176

Within an 802.1X enabled network with the Auth Fail feature configured, when does a switch port get placed into a restricted VLAN?

  1. When 802.1X is not globally enabled on the Cisco catalyst switch

  2. When AAA new-model is enabled

  3. When a connected client fails to authenticate after a certain number of attempts

  4. If a connected client does not support 802.1X

  5. After a connected client exceeds a specific idle time

Answer: C

Question No: 177

What is the best way to confirm that AAA authentication is working properly?

  1. Use the test aaa command.

  2. Ping the NAS to confirm connectivity.

  3. Use the Cisco-recommended configuration for AAA authentication.

  4. Log into and out of the router, and then check the NAS authentication log.

Answer: A

Question No: 178

Which statements about reflexive access lists are true? (Choose three.)

  1. Reflexive access lists create a permanent ACE

  2. Reflexive access lists approximate session filtering using the established keyword

  3. Reflexive access lists can be attached to standard named IP ACLs

  4. Reflexive access lists support UDP sessions

  5. Reflexive access lists can be attached to extended named IP ACLs

  6. Reflexive access lists support TCP sessions

Answer: D,E,F

Question No: 179

Which technology can be used to rate data fidelity and to provide an authenticated hash for data?

  1. file reputation

  2. file analysis

  3. signature updates

  4. network blocking

Answer: A

Question No: 180

Which IPS mode provides the maximum number of actions?

  1. inline

  2. promiscuous

  3. span

  4. failover

  5. bypass

Answer: A

100% Ensurepass Free Download!
Download Free Demo:210-260 Demo PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.