210-260 Exam - Implementing Cisco Network Security

certleader.com

Q1. What type of packet creates and performs network operations on a network device? 

A. control plane packets 

B. data plane packets 

C. management plane packets 

D. services plane packets 

Answer:

Q2. What is the FirePOWER impact flag used for? Cisco 210-260 : Practice Test 

A. A value that indicates the potential severity of an attack. 

B. A value that the administrator assigns to each signature. 

C. A value that sets the priority of a signature. 

D. A value that measures the application awareness. 

Answer:

Q3. What is one requirement for locking a wired or wireless device from ISE? Cisco 210-260 : Practice Test 

A. The ISE agent must be installed on the device. 

B. The device must be connected to the network when the lock command is executed. 

C. The user must approve the locking action. 

D. The organization must implement an acceptable use policy allowing device locking. 

Answer:

Q4. What type of algorithm uses the same key to encrypt and decrypt data? Cisco 210-260 : Practice Test 

A. a symmetric algorithm 

B. an asymmetric algorithm 

C. a Public Key Infrastructure algorithm 

D. an IP security algorithm 

Answer:

Q5. Scenario 

In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. 

To access ASDM, click the ASA icon in the topology diagram. 

Note: Not all ASDM functionalities are enabled in this simulation. 

To see all the menu options available on the left navigation pane, you may also need to un-expand the expanded menu first. 

Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test? 

A. AAA with LOCAL database 

B. AAA with RADIUS server 

C. Certificate 

D. Both Certificate and AAA with LOCAL database 

E. Both Certificate and AAA with RADIUS server 

Cisco 210-260 : Practice Test 

Answer:

Explanation: 

This can be seen from the Connection Profiles Tab of the Remote Access VPN configuration, where the alias of test is being used, 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.16.10 AM.png 

Q6. CORRECT TEXT 

Scenario 

Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. 

New additional connectivity requirements: 

. Currently, the ASA configurations only allow on the Inside and DMZ networks to access any hosts on the Outside. Your task is to use ASDM to configure the ASA to also allow any host only on the Outside to HTTP to the DMZ server. The hosts on the Outside will need to use the 209.165.201.30 public IP address when HTTPing to the DMZ server. 

. Currently, hosts on the ASA higher security level interfaces are not able to ping any hosts on the lower security level interfaces. Your task in this simulation is to use ASDM to enable the ASA to dynamically allow the echo-reply responses back through the ASA. 

Once the correct ASA configurations have been configured: 

. You can test the connectivity to http://209.165.201.30 from the Outside PC browser. 

. You can test the pings to the Outside (www.cisco.com) by opening the inside PC command prompt window. In this simulation, only testing pings to www.cisco.com will work. 

To access ASDM, click the ASA icon in the topology diagram. 

To access the Firefox Browser on the Outside PC, click the Outside PC icon in the topology diagram. 

To access the Command prompt on the Inside PC, click the Inside PC icon in the topology diagram. 

Note: 

After you make the configuration changes in ASDM, remember to click Apply to apply the configuration changes. 

Not all ASDM screens are enabled in this simulation, if some screen is not enabled, try to use different methods to configure the ASA to meet the requirements. 

In this simulation, some of the ASDM screens may not look and function exactly like the real ASDM. 

Answer: Follow the explanation part to get answer on this sim question. 

Q7. What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command? 

A. It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January 1, 2014 and continue using the key indefinitely. 

B. It configures the device to begin transmitting the authentication key to other devices at 23:59:00 local time on December 31, 2013 and continue using the key indefinitely. 

C. It configures the device to begin accepting the authentication key from other devices immediately and stop accepting the key at 23:59:00 local time on December 31, 2013. 

D. It configures the device to generate a new authentication key and transmit it to other devices at 23:59:00 local time on December 31, 2013. 

E. It configures the device to begin accepting the authentication key from other devices at 23:59:00 local time on December 31, 2013 and continue accepting the key indefinitely. 

F. It configures the device to begin accepting the authentication key from other devices at 00:00:00 local time on January 1, 2014 and continue accepting the key indefinitely. 

Answer:

Q8. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.) 

A. BOOTP 

B. TFTP 

C. DNS 

D. MAB 

E. HTTP 

F. 802.1x 

Answer: A,B,C 

Q9. Which two statements about stateless firewalls are true? (Choose two.) 

A. They compare the 5-tuple of each incoming packet against configurable rules. 

B. They cannot track connections. 

C. They are designed to work most efficiently with stateless protocols such as HTTP or HTTPS. 

D. Cisco IOS cannot implement them because the platform is stateful by nature. 

E. The Cisco ASA is implicitly stateless because it blocks all traffic by default. 

Answer: A,B 

Q10. After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output? 

A. The secure boot-image command is configured. 

B. The secure boot-comfit command is configured. 

C. The confreg 0x24 command is configured. 

D. The reload command was issued from ROMMON. 

Answer: