210-260 Exam - Implementing Cisco Network Security

certleader.com

Q1. What is an advantage of implementing a Trusted Platform Module for disk encryption? 

A. It provides hardware authentication. 

B. It allows the hard disk to be transferred to another device without requiring re-encryption.dis 

C. It supports a more complex encryption algorithm than other disk-encryption technologies. 

D. It can protect against single points of failure. 

Answer:

Q2. A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware. 

A. Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list. 

B. Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router's local URL list. 

C. Enable URL filtering on the perimeter router and add the URLs you want to allow to the firewall's local URL list. 

D. Create a blacklist that contains the URL you want to block and activate the blacklist on the perimeter router. 

E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router. 

Answer:

Q3. How does a zone-based firewall implementation handle traffic between interfaces in the same zone? 

A. Traffic between two interfaces in the same zone is allowed by default. 

B. Traffic between interfaces in the same zone is blocked unless you configure the same-security permit command. 

C. Traffic between interfaces in the same zone is always blocked. 

D. Traffic between interfaces in the same zone is blocked unless you apply a service policy to the zone pair. 

Answer:

Q4. Refer to the exhibit. 

The Admin user is unable to enter configuration mode on a device with the given configuration. What change can you make to the configuration to correct the problem? 

A. Remove the autocommand keyword and arguments from the Username Admin privilege line. 

B. Change the Privilege exec level value to 15. 

C. Remove the two Username Admin lines. 

D. Remove the Privilege exec line. 

Answer:

Q5. Which statement about a PVLAN isolated port configured on a switch is true? 

A. The isolated port can communicate only with the promiscuous port. 

B. The isolated port can communicate with other isolated ports and the promiscuous port. 

C. The isolated port can communicate only with community ports. 

D. The isolated port can communicate only with other isolated ports. 

Answer:

Q6. Refer to the exhibit. 

If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond? 

A. The supplicant will fail to advance beyond the webauth method. 

B. The switch will cycle through the configured authentication methods indefinitely. 

C. The authentication attempt will time out and the switch will place the port into the unauthorized state. 

D. The authentication attempt will time out and the switch will place the port into VLAN 101. 

Answer:

Q7. When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading? 

A. Deny the connection inline. 

B. Perform a Layer 6 reset. 

C. Deploy an antimalware system. 

D. Enable bypass mode. 

Answer:

Q8. Which two features do CoPP and CPPr use to protect the control plane? (Choose two.) 

A. QoS 

B. traffic classification 

C. access lists 

D. policy maps 

E. class maps 

F. Cisco Express Forwarding 

Answer: A,B 

Q9. An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity? 

A. The switch could offer fake DHCP addresses. 

B. The switch could become the root bridge. 

C. The switch could be allowed to join the VTP domain. 

D. The switch could become a transparent bridge. 

Answer:

Q10. In a security context, which action can you take to address compliance? 

A. Implement rules to prevent a vulnerability. 

B. Correct or counteract a vulnerability. 

C. Reduce the severity of a vulnerability. 

D. Follow directions from the security appliance manufacturer to remediate a vulnerability. 

Answer: