Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!
Implementing Cisco Network Security
Question No: 51
Which 2 NAT type allows only objects or groups to reference an IP address?
-
dynamic NAT
-
dynamic PAT
-
static NAT
-
identity NAT
Answer: A,C Explanation:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_co nfig/nat_objects.html#18425
Question No: 52
Which security measures can protect the control plane of a Cisco router? (Choose two.)
-
CCPr
-
Parser views
-
Access control lists
-
Port security
-
CoPP
Answer: A,E
Question No: 53
What improvement does EAP-FASTv2 provide over EAP-FAST?
-
It allows multiple credentials to be passed in a single EAP exchange.
-
It supports more secure encryption protocols.
-
It allows faster authentication by using fewer packets.
-
It addresses security vulnerabilities found in the original protocol.
Answer: A
Question No: 54
What do you use when you have a network object or group and want to use an IP address?
-
Static NAT
-
Dynamic NAT
-
identity NAT
-
Static PAT
Answer: B
Question No: 55
How does the Cisco ASA use Active Directory to authorize VPN users?
-
It queries the Active Directory server for a specific attribute for the specified user.
-
It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server.
-
It downloads and stores the Active Directory database to query for future authorization requests.
-
It redirects requests to the Active Directory server defined for the VPN group.
Answer: A
Question No: 56
Refer to the exhibit.
With which NTP server has the router synchronized?
A. 192.168.10.7
B. 108.61.73.243
C. 209.114.111.1
D. 132.163.4.103
E. 204.2.134.164
F. 241.199.164.101
Answer: A
Question No: 57
Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)
-
The password
-
The hash
-
The key
-
The transform set
Answer: B,C
Question No: 58
What is a benefit of a web application firewall?
-
It blocks known vulnerabilities without patching applications.
-
It simplifies troubleshooting.
-
It accelerates web traffic.
-
It supports all networking protocols.
Answer: A
Question No: 59
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?
-
STP BPDU guard
-
loop guard
-
STP Root guard
-
EtherChannel guard
Answer: A
Question No: 60
Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?
-
hack
-
mitigation
-
risk
-
vulnerability
-
exploit
Answer: D
100% Dumps4cert Free Download!
–Download Free Demo:210-260 Demo PDF
100% Dumps4cert Pass Guaranteed!
–210-260 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |