210-260 Premium Bundle

210-260 Premium Bundle

Implementing Cisco Network Security Certification Exam

4.5 
(17850 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 210-260 Free Practice Questions

Q1. What VPN feature allows traffic to exit the security appliance through the same interface it entered? 

A. hairpinning 

B. NAT 

C. NAT traversal 

D. split tunneling 

Answer:

Q2. CORRECT TEXT 

Scenario 

Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. 

New additional connectivity requirements: 

. Currently, the ASA configurations only allow on the Inside and DMZ networks to access any hosts on the Outside. Your task is to use ASDM to configure the ASA to also allow any host only on the Outside to HTTP to the DMZ server. The hosts on the Outside will need to use the 209.165.201.30 public IP address when HTTPing to the DMZ server. 

. Currently, hosts on the ASA higher security level interfaces are not able to ping any hosts on the lower security level interfaces. Your task in this simulation is to use ASDM to enable the ASA to dynamically allow the echo-reply responses back through the ASA. 

Once the correct ASA configurations have been configured: 

. You can test the connectivity to http://209.165.201.30 from the Outside PC browser. 

. You can test the pings to the Outside (www.cisco.com) by opening the inside PC command prompt window. In this simulation, only testing pings to www.cisco.com will work. 

To access ASDM, click the ASA icon in the topology diagram. 

To access the Firefox Browser on the Outside PC, click the Outside PC icon in the topology diagram. 

To access the Command prompt on the Inside PC, click the Inside PC icon in the topology diagram. 

Note: 

After you make the configuration changes in ASDM, remember to click Apply to apply the configuration changes. 

Not all ASDM screens are enabled in this simulation, if some screen is not enabled, try to use different methods to configure the ASA to meet the requirements. 

In this simulation, some of the ASDM screens may not look and function exactly like the real ASDM. 

Answer: Follow the explanation part to get answer on this sim question. 

Q3. Scenario 

In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. 

To access ASDM, click the ASA icon in the topology diagram. 

Note: Not all ASDM functionalities are enabled in this simulation. 

To see all the menu options available on the left navigation pane, you may also need to un-expand the expanded menu first. 

Which four tunneling protocols are enabled in the DfltGrpPolicy group policy? (Choose four) 

A. Clientless SSL VPN 

B. SSL VPN Client 

C. PPTP 

D. L2TP/IPsec 

E. IPsec IKEv1 

F. IPsec IKEv2 

Cisco 210-260 : Practice Test 

Answer: A,D,E,F 

Explanation: 

By clicking one the Configuration-> Remote Access -> Clientless CCL VPN Access-> Group Policies tab you can view the DfltGrpPolicy protocols as shown below: 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.00.18 AM.png 

Q4. Which three ESP fields can be encrypted during transmission? (Choose three.) 

A. Security Parameter Index 

B. Sequence Number 

C. MAC Address 

D. Padding 

E. Pad Length 

F. Next Header 

Answer: D,E,F 

Q5. Which EAP method uses Protected Access Credentials? 

A. EAP-FAST 

B. EAP-TLS 

C. EAP-PEAP 

D. EAP-GTC 

Answer:

Q6. Which two features do CoPP and CPPr use to protect the control plane? (Choose two.) 

A. QoS 

B. traffic classification 

C. access lists 

D. policy maps 

E. class maps 

F. Cisco Express Forwarding 

Answer: A,B 

Q7. Which two authentication types does OSPF support? (Choose two.) 

A. plaintext 

B. MD5 

C. HMAC 

D. AES 256 

E. SHA-1 

F. DES 

Answer: A,B 

Q8. What is an advantage of implementing a Trusted Platform Module for disk encryption? 

A. It provides hardware authentication. 

B. It allows the hard disk to be transferred to another device without requiring re-encryption.dis 

C. It supports a more complex encryption algorithm than other disk-encryption technologies. 

D. It can protect against single points of failure. 

Answer:

Q9. You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two). 

A. Configure a proxy server to hide users' local IP addresses. 

B. Assign unique IP addresses to all users. 

C. Assign the same IP address to all users. 

D. Install a Web content filter to hide users' local IP addresses. 

E. Configure a firewall to use Port Address Translation. 

Answer: A,E 

Q10. Scenario 

In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. 

To access ASDM, click the ASA icon in the topology diagram. 

Note: Not all ASDM functionalities are enabled in this simulation. 

To see all the menu options available on the left navigation pane, you may also need to un-expand the expanded menu first. 

Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test? 

A. AAA with LOCAL database 

B. AAA with RADIUS server 

C. Certificate 

D. Both Certificate and AAA with LOCAL database 

E. Both Certificate and AAA with RADIUS server 

Cisco 210-260 : Practice Test 

Answer:

Explanation: 

This can be seen from the Connection Profiles Tab of the Remote Access VPN configuration, where the alias of test is being used, 

Macintosh HD:Users:danielkeller:Desktop:Screen Shot 2015-09-25 at 9.16.10 AM.png 

Q11. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.) 

A. AES 

B. 3DES 

C. DES 

D. MD5 

E. DH-1024 

F. SHA-384 

Answer: A,F 

Q12. If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack? 

A. The trunk port would go into an error-disabled state. 

B. A VLAN hopping attack would be successful. 

C. A VLAN hopping attack would be prevented. 

D. The attacked VLAN will be pruned. 

Answer:

Q13. In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity? 

A. gratuitous ARP 

B. ARP poisoning 

C. IP spoofing 

D. MAC spoofing 

Answer:

Q14. When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading? 

A. Deny the connection inline. 

B. Perform a Layer 6 reset. 

C. Deploy an antimalware system. 

D. Enable bypass mode. 

Answer:

Q15. What three actions are limitations when running IPS in promiscuous mode? (Choose three.) 

A. deny attacker 

B. deny packet 

C. modify packet 

D. request block connection 

E. request block host 

F. reset TCP connection 

Cisco 210-260 : Practice Test 

Answer: A,B,C 

Q16. What command can you use to verify the binding table status? 

A. show ip dhcp snooping database 

B. show ip dhcp snooping binding 

C. show ip dhcp snooping statistics 

D. show ip dhcp pool 

E. show ip dhcp source binding 

F. show ip dhcp snooping 

Answer:

Q17. Refer to the exhibit. 

If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond? 

A. The supplicant will fail to advance beyond the webauth method. 

B. The switch will cycle through the configured authentication methods indefinitely. 

C. The authentication attempt will time out and the switch will place the port into the unauthorized state. 

D. The authentication attempt will time out and the switch will place the port into VLAN 101. 

Answer:

Q18. Which Sourcefire logging action should you choose to record the most detail about a connection? 

A. Enable logging at the end of the session. 

B. Enable logging at the beginning of the session. 

C. Enable alerts via SNMP to log events off-box. 

D. Enable eStreamer to log events off-box. 

Answer:

Q19. Refer to the exhibit. 

Which statement about the device time is true? 

A. The time is authoritative, but the NTP process has lost contact with its servers. 

B. The time is authoritative because the clock is in sync. 

C. The clock is out of sync. 

D. NTP is configured incorrectly. 

E. The time is not authoritative. 

Answer:

Q20. Which statement about personal firewalls is true? 

A. They can protect a system by denying probing requests. 

B. They are resilient against kernel attacks. 

C. They can protect email messages and private documents in a similar way to a VPN. 

D. They can protect the network against attacks. 

Answer:

START 210-260 EXAM