Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!
Implementing Cisco Network Security
Question No: 101
What command could you implement in the firewall to conceal internal IP address?
-
no source-route
-
no broadcast….
-
no proxy-arp
Answer: C
Question No: 102
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
-
Deny the connection inline.
-
Perform a Layer 6 reset.
-
Deploy an antimalware system.
-
Enable bypass mode.
Answer: A
Question No: 103
Which IPS detection method can you use to detect attacks that based on the attackers IP addresses?
-
Policy-based
-
Anomaly-based
-
Reputation-based
-
Signature-based
Answer: C
Question No: 104
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
-
TACACS uses TCP to communicate with the NAS.
-
TACACS can encrypt the entire packet that is sent to the NAS.
-
TACACS supports per-command authorization.
-
TACACS authenticates and authorizes simultaneously, causing fewer packets to be transmitted.
-
TACACS uses UDP to communicate with the NAS.
-
TACACS encrypts only the password field in an authentication packet.
Answer: A,B,C
Question No: 105
Which two NAT types allows only objects or groups to reference an IP address? (choose two)
-
dynamic NAT
-
dynamic PAT
-
static NAT
-
identity NAT
Answer: A,C
Question No: 106
Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method?
-
aaa authentication enable console LOCAL SERVER_GROUP
-
aaa authentication enable console SERVER_GROUP LOCAL
-
aaa authentication enable console local
-
aaa authentication enable console LOCAL
Answer: D
Question No: 107
Which type of encryption technology has the broadcast platform support?
-
Middleware
-
Hardware
-
Software
-
File-level
Answer: C
Question No: 108
Which option is the cloud based security service from Cisco that provides URL filtering web browsing content security, and roaming user protection?
-
Cloud web security
-
Cloud web Protection
-
Cloud web Service
-
Cloud advanced malware protection
Answer: A
Question No: 109
What can the SMTP preprocessor in FirePOWER normalize?
-
It can extract and decode email attachments in client to server traffic.
-
It can look up the email sender.
-
It compares known threats to the email sender.
-
It can forward the SMTP traffic to an email filter server.
-
It uses the Traffic Anomaly Detector.
Answer: A
Question No: 110
In which three cases does the ASA firewall permit inbound HTTP GET requests during
normal operations? (Choose three).
-
when matching NAT entries are configured
-
when matching ACL entries are configured
-
when the firewall receives a SYN-ACK packet
-
when the firewall receives a SYN packet
-
when the firewall requires HTTP inspection
-
when the firewall requires strict HTTP inspection
Answer: A,B,D
100% Dumps4cert Free Download!
–Download Free Demo:210-260 Demo PDF
100% Dumps4cert Pass Guaranteed!
–210-260 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |