[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 61-70

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 61 A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.   A. Enable URL filtering on the perimeterrouter and add the URLs you want to block to the router's local URL list. B. Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router's local URL list. C. Enable URL Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 141-150

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 141 Which type of firewall can act on the behalf of the end device?   A. Stateful packet B. Application C. Packet D. Proxy   Correct Answer: D     QUESTION 142 In the router ospf 200 command, what does the value 200 stands for?   A. Administrative distance value B. process ID C. area ID D. ABR ID   Correct Answer: B Explanation: Recall that the area is defined in the following Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 131-140

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 131 What is the potential drawback to leaving VLAN 1 as the native VLAN?   A. Gratuitous ARPs might be able to conduct a man-in-the-middle attack. B. The CAM might be overloaded, effectively turning the switch into hub. C. VLAN 1 might be vulnerable to IP address spoofing. D. It may be susceptible to a VLAN hopping attack.   Correct Answer: D     QUESTION 132 Which alert protocol is used with Cisco Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 121-130

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 121 Which statement about extended access lists is true?   A. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destination. B. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the source. C. Extended access lists perform filtering that is based on destination and are most Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 111-120

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 111 Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?   A. no switchport nonnegotiate B. switchport C. no switchport mode dynamic auto D. no switchport   Correct Answer: D     QUESTION 112 Which network device doe s NTP authenticate?   A. Only the time source B. Only the client device C. The firewall and the client device D. The client device and Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 101-110

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 101 Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)   A. start-stop B. stop-record C. stop-only D. stop   Correct Answer: AC     QUESTION 102 What improvement does EAP-FASTv2 provide over EAP-FAST?   A. It support more secure encryption protocols. B. It allows multiple credentials to be passed in a single EAP exchange. Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 91-100

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 91 Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user?   A. Trust B. Block C. Allow without inspection D. Monitor E. Allow with inspection   Correct Answer: E Explanation: Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don’t exist. Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 81-90

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 81 You have been tasked with blocking user access to website that violate company policy, but the site use dynamic IP Addresses. What is the best practice URL filtering to solve the problem?   A. Enable URL filtering and create a blacklist to block the websites that violate company policy. B. Enable URL filtering and create a whitelist to allow only the websites the company policy allow users to access. C. Enable Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 71-80

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 71 What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?   A. 5 seconds B. 10 seconds C. 15 seconds D. 20 seconds   Correct Answer: A     QUESTION 72 How does PEAP protect the EAP exchange?   A. It encrypts the exchange using the client certificate. B. It validates the server-supplied certificate and Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 31-40

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 31 Refer to the exhibit. What is the effect of the given command sequence?     A. It configures IKE Phase 1. B. It configures a site-to-site VPN tunnel. C. It configures a crypto policy with a key size of 14400. D. It configures IPSec Phase 2. Correct Answer: A     QUESTION 32 Refer to the exhibit. What is the effect of the given command sequence?     A. It defines IPSec policy Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 21-30

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 21 What type of algorithm uses the same key to encrypt and decrypt data?   A. a symmetric algorithm B. an asymmetric algorithm C. a Public Key Infrastructure algorithm D. an IP security algorithm   Correct Answer: A     QUESTION 22 Refer to the exhibit. How many times was a read-only string used to attempt a write operation?     A. 9 B. 6 C. 4 D. 3 E. 2   Correct Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 41-50

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 41 What command can you use to verify the binding table status?   A. show ip dhcp snooping database B. show ip dhcp snooping binding C. show ip dhcp snooping statistics D. show ip dhcp pool E. show ip dhcp source binding F. show ip dhcp snooping   Correct Answer: A   QUESTION 42 If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use?   Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 51-60

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 51 Which statement about communication over failover interfaces is true?   A. All information that is sent over the failover and stateful failover interfaces is sent as clear text by default. B. All information that is sent over the failover interface is sent as clear text, but the stateful failover link is encrypted by default. C. All information that is sent over the failover and stateful failover interfaces is Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 11-20

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 11 Which three statements about host-based IPS are true? (Choose three.)   A. It can view encrypted files. B. It can have more restrictive policies than network-based IPS. C. It can generate alerts based on behavior at the desktop level. D. It can be deployed at the perimeter. E. It uses signature-based policies. F. It works with deployed firewalls.   Correct Answer: ABC     QUESTION 12 What Read more [...]

[Free] 2017(Feb) Ensurepass Examcollection Cisco 210-260 Practice Test 1-10

EnsurepassImplementing Cisco Network Security (IINS)   QUESTION 1 Which two services define cloud networks? (Choose two.)   A. Infrastructure as a Service B. Platform as a Service C. Security as a Service D. Compute as a Service E. Tenancy as a Service   Correct Answer: AB     QUESTION 2 In which two situations should you use out-of-band management? (Choose two.)   A. when a network device fails to forward packets B. when you require ROMMON access Read more [...]