Download CCNA Security -Implementing Cisco Network Security (IINS v3-0).test-king.210-260.2018-10-24.1e.162q.vcex

Download Dump

File Info

Exam CCNA Security - Implementing Cisco Network Security (IINS v3.0)
Number 210-260
File Name CCNA Security -Implementing Cisco Network Security (IINS v3-0).test-king.210-260.2018-10-24.1e.162q.vcex
Size 26.44 Mb
Posted October 24, 2018
Downloads 107



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
What is an advantage of placing an IPS on the inside of a network?

  • A: It can provide higher throughput.
  • B: It receives traffic that has already been filtered.
  • C: It receives every inbound packet.
  • D: It can provide greater security.



Question 2
What is the FirePOWER impact flag used for?

  • A: A value that indicates the potential severity of an attack.
  • B: A value that the administrator assigns to each signature.
  • C: A value that sets the priority of a signature.
  • D: A value that measures the application awareness.



Question 3
Which FirePOWER preprocessor engine is used to prevent SYN attacks?

  • A: Rate-Based Prevention
  • B: Portscan Detection
  • C: IP Defragmentation
  • D: Inline Normalization



Question 4
Which Sourcefire logging action should you choose to record the most detail about a connection?

  • A: Enable logging at the end of the session.
  • B: Enable logging at the beginning of the session.
  • C: Enable alerts via SNMP to log events off-box.
  • D: Enable eStreamer to log events off-box.



Question 5
What can the SMTP preprocessor in FirePOWER normalize?

  • A: It can extract and decode email attachments in client to server traffic.
  • B: It can look up the email sender.
  • C: It compares known threats to the email sender.
  • D: It can forward the SMTP traffic to an email filter server.
  • E: It uses the Traffic Anomaly Detector.



Question 6
You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. 
What two solutions can you use? (Choose two).

  • A: Configure a proxy server to hide users' local IP addresses.
  • B: Assign unique IP addresses to all users.
  • C: Assign the same IP address to all users.
  • D: Install a Web content filter to hide users' local IP addresses.
  • E: Configure a firewall to use Port Address Translation.



Question 7
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?

  • A: Create a whitelist and add the appropriate IP address to allow the traffic.
  • B: Create a custom blacklist to allow the traffic.
  • C: Create a user based access control rule to allow the traffic.
  • D: Create a network based access control rule to allow the traffic.
  • E: Create a rule to bypass inspection to allow the traffic.



Question 8
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.

  • A: Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list.
  • B: Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router's local URL list.
  • C: Enable URL filtering on the perimeter router and add the URLs you want to allow to the firewall's local URL list.
  • D: Create a blacklist that contains the URL you want to block and activate the blacklist on the perimeter router.
  • E: Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router.



Question 9
When is the best time to perform an anti-virus signature update?

  • A: Every time a new update is available.
  • B: When the local scanner has detected a new virus.
  • C: When a new virus is discovered in the wild.
  • D: When the system detects a browser hook.



Question 10
Which statement about application blocking is true?

  • A: It blocks access to specific programs.
  • B: It blocks access to files with specific extensions.
  • C: It blocks access to specific network addresses.
  • D: It blocks access to specific network services.









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset