210-260 Premium Bundle

210-260 Premium Bundle

IINS Implementing Cisco Network Security Certification Exam

4.5 
(41340 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 210-260 Free Practice Questions

P.S. Vivid 210-260 discount pack are available on Google Drive, GET MORE: https://drive.google.com/open?id=18pZ7Xebg0YZOwsiIMF0baJMeHvQ2WdFK


New Cisco 210-260 Exam Dumps Collection (Question 1 - Question 10)

Question No: 1

Which line in the following OSPF configuration will not be required for MD5 authentication to work?

interface GigabitEthernet0/1

ip address 192.168.10.1 255.255.255.0

ip ospf authentication message-digest

ip ospf message-digest-key 1 md5 CCNA

!

router ospf 65000

router-id 192.168.10.1

area 20 authentication message-digest network 10.1.1.0 0.0.0.255 area 10

network 192.168.10.0 0.0.0.255 area 0

!

A. ip ospf authentication message-digest

B. network 192.168.10.0 0.0.0.255 area 0

C. area 20 authentication message-digest

D. ip ospf message-digest-key 1 md5 CCNA

Answer: C


Question No: 2

Refer to the exhibit.

What type of firewall would use the given configuration line?

A. a stateful firewall

B. a personal firewall

C. a proxy firewall

D. an application firewall

E. a stateless firewall

Answer: A


Question No: 3

In which two situations should you use out-of-band management? (Choose two.)

A. when a network device fails to forward packets

B. when you require ROMMON access

C. when management applications need concurrent access to the device

D. when you require administrator access from multiple locations

E. when the control plane fails to respond

Answer: A,B


Question No: 4

What is the actual IOS privilege level of User Exec mode?

A. 1

B. 0

C. 5

D. 15

Answer: A

Explanation: By default, the Cisco IOS software command-line interface (CLI) has two levels of access to commands: user EXEC mode (level 1) and privileged EXEC mode (level 15). However, you can configure additional levels of access to commands, called privilege levels, to meet the needs of your users while protecting the system from unauthorized access. Up to 16 privilege levels can be configured, from level 0, which is the most restricted level, to level 15, which is the least restricted level.

Source: http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfpas s.html


Question No: 5

Which IPS mode is less secure than other options but allows optimal network throughput?

A. promiscuous mode

B. inline mode

C. inline-bypass mode

D. transparent mode.

Answer: A


Question No: 6

What is a possible reason for the error message?Router(config)#aaa server?%

Unrecognized command

A. The command syntax requires a space after the word u201cserveru201d

B. The command is invalid on the target device

C. The router is already running the latest operating system

D. The router is a new device on which the aaa new-model command must be applied before continuing

Answer: D


Question No: 7

Refer to the exhibit.

While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?

A. IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.

B. ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.

C. IKE version 2 security associations are established between 10.1.1.1 and 10.1.1.5.

D. IPSec Phase 2 is down due to a mismatch between encrypted and decrypted packets.

Answer: A


Question No: 8

Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)

A. FTP

B. SSH

C. Telnet

D. AAA

E. HTTPS

F. HTTP

Answer: B,E


Question No: 9

Refer to the exhibit.

While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?

A. IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.

B. IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.

C. IPSec Phase 1 is down due to a QM_IDLE state.

D. IPSec Phase 2 is down due to a QM_IDLE state.

Answer: A


Question No: 10

Which three ESP fields can be encrypted during transmission? (Choose three.)

A. Security Parameter Index

B. Sequence Number

C. MAC Address

D. Padding

E. Pad Length

F. Next Header

Answer: D,E,F


100% Regenerate Cisco 210-260 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/210-260-dumps.html (New 310 Q&As)


START 210-260 EXAM