Master the ccna security 210 260 dumps pdf free download Implementing Cisco Network Security content and be ready for exam day success quickly with this Actualtests cisco ccna security 210 260 pdf exam cost. We guarantee it!We make it a reality and give you real cisco 210 260 dump questions in our Cisco ccna security 210 260 dumps pdf braindumps.Latest 100% VALID Cisco ccna security 210 260 pdf download Exam Questions Dumps at below page. You can use our Cisco ccna security 210 260 official cert guide pdf download braindumps and pass your exam.

Q31. You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address? 

A. Create a whitelist and add the appropriate IP address to allow the traffic. 

B. Create a custom blacklist to allow the traffic. 

C. Create a user based access control rule to allow the traffic. 

D. Create a network based access control rule to allow the traffic. 

E. Create a rule to bypass inspection to allow the traffic. 

Answer:


Q32. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.) 

A. AES 

B. 3DES 

C. DES 

D. MD5 

E. DH-1024 

F. SHA-384 

Answer: A,F 


Q33. An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity? 

A. The switch could offer fake DHCP addresses. 

B. The switch could become the root bridge. 

C. The switch could be allowed to join the VTP domain. 

D. The switch could become a transparent bridge. 

Answer:


Q34. Which type of secure connectivity does an extranet provide? 

A. other company networks to your company network 

B. remote branch offices to your company network 

C. your company network to the Internet 

D. new networks to your company network 

Answer:


Q35. In a security context, which action can you take to address compliance? 

A. Implement rules to prevent a vulnerability. 

B. Correct or counteract a vulnerability. 

C. Reduce the severity of a vulnerability. 

D. Follow directions from the security appliance manufacturer to remediate a vulnerability. 

Answer:


Q36. Scenario 

In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. 

To access ASDM, click the ASA icon in the topology diagram. 

Note: Not all ASDM functionalities are enabled in this simulation. 

To see all the menu options available on the left navigation pane, you may also need to un-expand the expanded menu first. 

Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test? 

A. AAA with LOCAL database 

B. AAA with RADIUS server 

C. Certificate 

D. Both Certificate and AAA with LOCAL database 

E. Both Certificate and AAA with RADIUS server 

Cisco 210-260 : Practice Test 

Answer:

Explanation: 

This can be seen from the Connection Profiles Tab of the Remote Access VPN configuration, where the alias of test is being used, 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.16.10 AM.png 


Q37. If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack? 

A. The trunk port would go into an error-disabled state. 

B. A VLAN hopping attack would be successful. 

C. A VLAN hopping attack would be prevented. 

D. The attacked VLAN will be pruned. 

Answer:


Q38. What three actions are limitations when running IPS in promiscuous mode? (Choose three.) 

A. deny attacker 

B. deny packet 

C. modify packet 

D. request block connection 

E. request block host 

F. reset TCP connection 

Cisco 210-260 : Practice Test 

Answer: A,B,C 


Q39. Refer to the exhibit. 

While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show? 

A. IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5. 

B. IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5. 

C. IPSec Phase 1 is down due to a QM_IDLE state. 

D. IPSec Phase 2 is down due to a QM_IDLE state. 

Answer:


Q40. Scenario 

In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. 

To access ASDM, click the ASA icon in the topology diagram. 

Note: Not all ASDM functionalities are enabled in this simulation. 

To see all the menu options available on the left navigation pane, you may also need to un-expand the expanded menu first. 

When users login to the Clientless SSLVPN using https://209.165.201.2/test, which group policy will be applied? 

A. test 

B. clientless 

C. Sales 

D. DfltGrpPolicy 

E. DefaultRAGroup 

F. DefaultWEBVPNGroup 

Answer:

Explanation: First navigate to the Connection Profiles tab as shown below, highlight the one with the test alias: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.45.23 AM.png 

Then hit the “edit” button and you can clearly see the Sales Group Policy being applied. 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.44.53 AM.png