Download CCNA Security Implementing Cisco Network Security.PracticeTest.210-260.2019-02-24.1e.173q.vcex

Download Exam

File Info

Exam CCNA Security - Implementing Cisco Network Security (IINS v3.0)
Number 210-260
File Name CCNA Security Implementing Cisco Network Security.PracticeTest.210-260.2019-02-24.1e.173q.vcex
Size 16.14 Mb
Posted February 24, 2019
Downloads 259

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
Which three ESP fields can be encrypted during transmission? (Choose three.)

  • A: Security Parameter Index
  • B: Sequence Number
  • C: MAC Address
  • D: Padding
  • E: Pad Length
  • F: Next Header

Question 2
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)

  • A: QoS
  • B: traffic classification
  • C: access lists
  • D: policy maps
  • E: class maps
  • F: Cisco Express Forwarding

Question 3
Which three statements about host-based IPS are true? (Choose three.)

  • A: It can view encrypted files.
  • B: It can have more restrictive policies than network-based IPS.
  • C: It can generate alerts based on behavior at the desktop level.
  • D: It can be deployed at the perimeter.
  • E: It uses signature-based policies.
  • F: It works with deployed firewalls.

Question 4
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)

  • A: deny attacker
  • B: deny packet
  • C: modify packet
  • D: request block connection
  • E: request block host
  • F: reset TCP connection

Question 5
What is the purpose of the Integrity component of the CIA triad?

  • A: to ensure that only authorized parties can modify data
  • B: to determine whether data is relevant
  • C: to create a process for accessing data
  • D: to ensure that only authorized parties can view data

Question 6
Which tool can an attacker use to attempt a DDoS attack?

  • A: botnet
  • B: Trojan horse
  • C: virus
  • D: adware

Question 7
What type of security support is provided by the Open Web Application Security Project?

  • A: Education about common Web site vulnerabilities.
  • B: A Web site security framework.
  • C: A security discussion forum for Web site developers.
  • D: Scoring of common vulnerabilities and exposures.

Question 8
What type of algorithm uses the same key to encrypt and decrypt data?

  • A: a symmetric algorithm
  • B: an asymmetric algorithm
  • C: a Public Key Infrastructure algorithm
  • D: an IP security algorithm

Question 9
Refer to the exhibit. 


How many times was a read-only string used to attempt a write operation?

  • A: 9
  • B: 6
  • C: 4
  • D: 3
  • E: 2

Question 10
Refer to the exhibit. 


Which statement about the device time is true?

  • A: The time is authoritative, but the NTP process has lost contact with its servers.
  • B: The time is authoritative because the clock is in sync.
  • C: The clock is out of sync.
  • D: NTP is configured incorrectly.
  • E: The time is not authoritative.



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files