[Free] 2018(July) Dumps4cert Cisco 210-260 Dumps with VCE and PDF Download 121-130

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 121

What type of packet creates and performs network operations on a network device?

  1. control plane packets

  2. data plane packets

  3. management plane packets

  4. services plane packets

Answer: A

Question No: 122

What mechanism does asymmetric cryptography use to secure data?

  1. a public/private key pair

  2. shared secret keys

  3. an RSA nonce

  4. an MD5 hash

Answer: A

Question No: 123

What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)

  1. The Internet Key Exchange protocol establishes security associations

  2. The Internet Key Exchange protocol provides data confidentiality

  3. The Internet Key Exchange protocol provides replay detection

  4. The Internet Key Exchange protocol is responsible for mutual authentication

Answer: A,D

Question No: 124

In a security context, which action can you take to address compliance?

  1. Implement rules to prevent a vulnerability.

  2. Correct or counteract a vulnerability.

  3. Reduce the severity of a vulnerability.

  4. Follow directions from the security appliance manufacturer to remediate a vulnerability.

Answer: A

Question No: 125

which term best describes the concept of preventing the modification of data in transit and in storage?

  1. Confidentiality

  2. Integrity

  3. Availability

  4. fidelity

Answer: B Explanation:

Integrity for data means that changes made to data are done only by authorized individuals/systems.

Corruption of data is a failure to maintain data integrity.

Source: Cisco Official Certification Guide, Confidentiality, Integrity, and Availability, p.6

Question No: 126

Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end user?

  1. Allow with inspection

  2. Allow without inspection

  3. Block

  4. Trust

  5. Monitor

Answer: A

Question No: 127

Which type of PVLAN port allows communication from all port types?

  1. isolated

  2. community

  3. in-line

  4. promiscuous

Answer: D

Question No: 128

What are two well-known security terms? (Choose Two)

  1. Phishing.

  2. BPDU guard

  3. LACP

  4. ransomeware

  5. hair-pinning

Answer: A,D

Question No: 129

SSL certificates are issued by Certificate Authority(CA) are?

  1. Trusted root

  2. Not trusted

Answer: A

Question No: 130

Which product can be used to provide application layer protection for TCP port 25 traffic?

  1. ESA

  2. CWS

  3. WSA

  4. ASA

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:210-260 Demo PDF
100% Dumps4cert Pass Guaranteed!
210-260 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *