Download CCNA Security Implementing Cisco Network Security.PremDumps.210-260.2019-04-04.1e.292q.vcex

Download Exam

File Info

Exam CCNA Security - Implementing Cisco Network Security (IINS v3.0)
Number 210-260
File Name CCNA Security Implementing Cisco Network Security.PremDumps.210-260.2019-04-04.1e.292q.vcex
Size 21.3 Mb
Posted April 04, 2019
Downloads 397

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
In which two situations should you use out-of-band management? (Choose two.)

  • A: when a network device fails to forward packets
  • B: when you require ROMMON access
  • C: when management applications need concurrent access to the device
  • D: when you require administrator access from multiple locations
  • E: when the control plane fails to respond

Question 2
Which three ESP fields can be encrypted during transmission? (Choose three.)

  • A: Security Parameter Index
  • B: Sequence Number
  • C: MAC Address
  • D: Padding
  • E: Pad Length
  • F: Next Header

Question 3
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)

  • A: QoS
  • B: traffic classification
  • C: access lists
  • D: policy maps
  • E: class maps
  • F: Cisco Express Forwarding

Question 4
Which three statements about host-based IPS are true? (Choose three.)

  • A: It can view encrypted files.
  • B: It can have more restrictive policies than network-based IPS.
  • C: It can generate alerts based on behavior at the desktop level.
  • D: It can be deployed at the perimeter.
  • E: It uses signature-based policies.
  • F: It works with deployed firewalls.

Question 5
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)

  • A: deny attacker
  • B: deny packet
  • C: modify packet
  • D: request block connection
  • E: request block host
  • F: reset TCP connection

Question 6
What is the purpose of the Integrity component of the CIA triad?

  • A: to ensure that only authorized parties can modify data
  • B: to determine whether data is relevant
  • C: to create a process for accessing data
  • D: to ensure that only authorized parties can view data

Question 7
Which tool can an attacker use to attempt a DDoS attack?

  • A: botnet
  • B: Trojan horse
  • C: virus
  • D: adware

Question 8
What type of security support is provided by the Open Web Application Security Project?

  • A: Education about common Web site vulnerabilities.
  • B: A Web site security framework.
  • C: A security discussion forum for Web site developers.
  • D: Scoring of common vulnerabilities and exposures.

Question 9
What type of algorithm uses the same key to encrypt and decrypt data?

  • A: a symmetric algorithm
  • B: an asymmetric algorithm
  • C: a Public Key Infrastructure algorithm
  • D: an IP security algorithm

Question 10
Refer to the exhibit. 


How many times was a read-only string used to attempt a write operation?

  • A: 9
  • B: 6
  • C: 4
  • D: 3
  • E: 2



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files