Cisco official certifications is sought after from it work. Plate with Cisco official certifications can put on pertaining to employment everywhere in the entire world. Cisco official certifications would be the term with ensure. A specialist will be able to greatly enhance his/her features and will simply develop his/her understanding and also expertise along with Cisco. Firms would like all those staff who definitely are properly accredited and get additional everyday skills and also expertise inside their area.

2021 Mar 210-260 practice test

Q11. A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware. 

A. Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list. 

B. Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router's local URL list. 

C. Enable URL filtering on the perimeter router and add the URLs you want to allow to the firewall's local URL list. 

D. Create a blacklist that contains the URL you want to block and activate the blacklist on the perimeter router. 

E. Create a whitelist that contains the URLs you want to allow and activate the whitelist on the perimeter router. 


Q12. What are two default Cisco IOS privilege levels? (Choose two.) 

A. 0 

B. 1 

C. 5 

D. 7 

E. 10 

F. 15 

Answer: B,F 

Q13. What is a reason for an organization to deploy a personal firewall? 

A. To protect endpoints such as desktops from malicious activity. 

B. To protect one virtual network segment from another. 

C. To determine whether a host meets minimum security posture requirements. 

D. To create a separate, non-persistent virtual environment that can be destroyed after a session. 

E. To protect the network from DoS and syn-flood attacks. 


Q14. What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection? 

A. split tunneling 

B. hairpinning 

C. tunnel mode 

D. transparent mode 


Q15. What is one requirement for locking a wired or wireless device from ISE? Cisco 210-260 : Practice Test 

A. The ISE agent must be installed on the device. 

B. The device must be connected to the network when the lock command is executed. 

C. The user must approve the locking action. 

D. The organization must implement an acceptable use policy allowing device locking. 


Most recent 210-260 download:

Q16. Refer to the exhibit. 

While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show? 

A. IPSec Phase 2 is established between and 

B. ISAKMP security associations are established between and 

C. IKE version 2 security associations are established between and 

D. IPSec Phase 2 is down due to a mismatch between encrypted and decrypted packets. 


Q17. What command can you use to verify the binding table status? 

A. show ip dhcp snooping database 

B. show ip dhcp snooping binding 

C. show ip dhcp snooping statistics 

D. show ip dhcp pool 

E. show ip dhcp source binding 

F. show ip dhcp snooping 


Q18. Which statement about Cisco ACS authentication and authorization is true? 

A. ACS servers can be clustered to provide scalability. 

B. ACS can query multiple Active Directory domains. 

C. ACS uses TACACS to proxy other authentication servers. 

D. ACS can use only one authorization profile to allow or deny requests. 


Q19. How does the Cisco ASA use Active Directory to authorize VPN users? 

A. It queries the Active Directory server for a specific attribute for the specified user. 

B. It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server. 

C. It downloads and stores the Active Directory database to query for future authorization requests. 

D. It redirects requests to the Active Directory server defined for the VPN group. 




Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. 

New additional connectivity requirements: 

. Currently, the ASA configurations only allow on the Inside and DMZ networks to access any hosts on the Outside. Your task is to use ASDM to configure the ASA to also allow any host only on the Outside to HTTP to the DMZ server. The hosts on the Outside will need to use the public IP address when HTTPing to the DMZ server. 

. Currently, hosts on the ASA higher security level interfaces are not able to ping any hosts on the lower security level interfaces. Your task in this simulation is to use ASDM to enable the ASA to dynamically allow the echo-reply responses back through the ASA. 

Once the correct ASA configurations have been configured: 

. You can test the connectivity to from the Outside PC browser. 

. You can test the pings to the Outside ( by opening the inside PC command prompt window. In this simulation, only testing pings to will work. 

To access ASDM, click the ASA icon in the topology diagram. 

To access the Firefox Browser on the Outside PC, click the Outside PC icon in the topology diagram. 

To access the Command prompt on the Inside PC, click the Inside PC icon in the topology diagram. 


After you make the configuration changes in ASDM, remember to click Apply to apply the configuration changes. 

Not all ASDM screens are enabled in this simulation, if some screen is not enabled, try to use different methods to configure the ASA to meet the requirements. 

In this simulation, some of the ASDM screens may not look and function exactly like the real ASDM. 

Answer: Follow the explanation part to get answer on this sim question.