210-260 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.71What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?A.5 secondsB.10 secondsC.15 secondsD.20 secondsCorrect Answer: A Question No.72How does PEAP protect the EAP exchange?A.It encrypts the exchange using the client certificate.B.It validates the server-supplied certificate and […]

210-260 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.81You have been tasked with blocking user access to websites that violate company policy, but the site use dynamic IP Addresses. What is the best practice URL filtering to solve the problem?A.Enable URL filtering and create a blacklist to block the websites that violate company policy.B.Enable URL filtering […]

210-260 Real Exam Dumps Questions and answers 91-100

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.91Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end-user?A.TrustB.BlockC.Allow without inspectionD.MonitorE.Allow with inspectionCorrect Answer: EExplanation:Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don鈥檛 […]

210-260 Real Exam Dumps Questions and answers 61-70

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.61A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.A.Enable URL filtering on the perimeterrouter and add the URLs you want to block to the router#39;s local URL list.B.Enable URL filtering […]

210-260 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.51Which statement about communication over failover interfaces is true?A.All information that is sent over the failover and stateful failover interfaces is sent as clear text by default.B.All information that is sent over the failover interface is sent as clear text, but the stateful failover link is encrypted by […]

210-260 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.21What type of algorithm uses the same key to encrypt and decrypt data?A.a symmetric algorithmB.an asymmetric algorithmC.a Public Key Infrastructure algorithmD.an IP security algorithmCorrect Answer: A Question No.22Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A.9B.6C.4D.3E.2Correct Answer: A Question No.23Refer […]

210-260 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.31Refer to the exhibit. What is the effect of the given command sequence?A.It configures IKE Phase 1.B.It configures a site-to-site VPN tunnel.C.It configures a crypto policy with a key size of 14400.D.It configures IPSec Phase 2.Correct Answer: A Question No.32Refer to the exhibit. What is the effect of […]

210-260 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.1Which two services define cloud networks? (Choose two.)A.Infrastructure as a ServiceB.Platform as a ServiceC.Security as a ServiceD.Compute as a ServiceE.Tenancy as a ServiceCorrect Answer: AB Question No.2In which two situations should you use out-of-band management? (Choose two.)A.when a network device fails to forward packetsB.when you require ROMMON accessC.when […]

210-260 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.11Which three statements about Cisco host-based IPS solutions are true? (Choose three.)A.It can view encrypted files.B.It can have more restrictive policies than network-based IPS.C.It can generate alerts based on behavior at the desktop level.D.It can be deployed at the perimeter.E.It uses signature-based policies.F.It works with deployed firewalls.Correct Answer: […]