Download CCNA Security -Implementing Cisco Network Security (IINS v3-0).selftestengine.210-260.2018-09-05.1e.159q.vcex

Download Dump

File Info

Exam CCNA Security - Implementing Cisco Network Security (IINS v3.0)
Number 210-260
File Name CCNA Security -Implementing Cisco Network Security (IINS v3-0).selftestengine.210-260.2018-09-05.1e.159q.vcex
Size 26.56 Mb
Posted September 05, 2018
Downloaded 33



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?

  • A: gratuitous ARP
  • B: ARP poisoning
  • C: IP spoofing
  • D: MAC spoofing



Question 2
What command can you use to verify the binding table status?

  • A: show ip dhcp snooping database
  • B: show ip dhcp snooping binding
  • C: show ip dhcp snooping statistics
  • D: show ip dhcp pool
  • E: show ip dhcp source binding
  • F: show ip dhcp snooping



Question 3
If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use?

  • A: root guard
  • B: EtherChannel guard
  • C: loop guard
  • D: BPDU guard



Question 4
Which statement about a PVLAN isolated port configured on a switch is true?

  • A: The isolated port can communicate only with the promiscuous port.
  • B: The isolated port can communicate with other isolated ports and the promiscuous port.
  • C: The isolated port can communicate only with community ports.
  • D: The isolated port can communicate only with other isolated ports.



Question 5
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?

  • A: The trunk port would go into an error-disabled state.
  • B: A VLAN hopping attack would be successful.
  • C: A VLAN hopping attack would be prevented.
  • D: The attacked VLAN will be pruned.



Question 6
What is a reason for an organization to deploy a personal firewall?

  • A: To protect endpoints such as desktops from malicious activity.
  • B: To protect one virtual network segment from another.
  • C: To determine whether a host meets minimum security posture requirements.
  • D: To create a separate, non-persistent virtual environment that can be destroyed after a session.
  • E: To protect the network from DoS and syn-flood attacks.



Question 7
Which statement about personal firewalls is true?

  • A: They can protect a system by denying probing requests.
  • B: They are resilient against kernel attacks.
  • C: They can protect email messages and private documents in a similar way to a VPN.
  • D: They can protect the network against attacks.



Question 8
Refer to the exhibit. 

  

What type of firewall would use the given configuration line?

  • A: a stateful firewall
  • B: a personal firewall
  • C: a proxy firewall
  • D: an application firewall
  • E: a stateless firewall



Question 9
What is the only permitted operation for processing multicast traffic on zone-based firewalls?

  • A: Only control plane policing can protect the control plane against multicast traffic.
  • B: Stateful inspection of multicast traffic is supported only for the self-zone.
  • C: Stateful inspection for multicast traffic is supported only between the self-zone and the internal zone.
  • D: Stateful inspection of multicast traffic is supported only for the internal zone.



Question 10
How does a zone-based firewall implementation handle traffic between interfaces in the same zone?

  • A: Traffic between two interfaces in the same zone is allowed by default.
  • B: Traffic between interfaces in the same zone is blocked unless you configure the same-security permit command.
  • C: Traffic between interfaces in the same zone is always blocked.
  • D: Traffic between interfaces in the same zone is blocked unless you apply a service policy to the zone pair.









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset