P.S. Actual 210-260 testing software are available on Google Drive, GET MORE: https://drive.google.com/open?id=1Kl4PFWi2xwwT55i2I8OXlDu8m47EY9P5
Q1. What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)
A. Use an SSH connection.
B. Use SNMPv3.
C. Use out-of-band management.
D. Use SNMPv2.
E. Use in-band management.
Answer: A,B
Q2. Which alert protocol is used with Cisco IPS Manager Express to support up to 10 sensors?
A. SDEE
B. Syslog
C. SNMP
D. CSM
Answer: A
Q3. # nat (inside,outside) dynamic interface
Refer to the above. Which translation technique does this configuration result in?
A. Static NAT
B. Dynamic NAT
C. Dynamic PAT
D. Twice NAT
Answer: C
Q4. Which security term refers to a person, property, or data of value to a company?
A. Risk
B. Asset
C. Threat prevention
D. Mitigation technique
Answer: B
Q5. What does the command crypto isakmp nat-traversal do?
A. Enables udp port 4500 on all IPsec enabled interfaces
B. rebooting the ASA the global command
Answer: A
Q6. When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
A. Deny the connection inline.
B. Perform a Layer 6 reset.
C. Deploy an antimalware system.
D. Enable bypass mode.
Answer: A
Q7. Which tasks is the session management path responsible for? (Choose three.)
A. Verifying IP checksums
B. Performing route lookup
C. Performing session lookup
D. Allocating NAT translations
E. Checking TCP sequence numbers
F. Checking packets against the access list
Answer: B,D,F
Q8. Which two statements about stateless firewalls are true? (Choose two.)
A. They compare the 5-tuple of each incoming packet against configurable rules.
B. They cannot track connections.
C. They are designed to work most efficiently with stateless protocols such as HTTP or HTTPS.
D. Cisco IOS cannot implement them because the platform is stateful by nature.
E. The Cisco ASA is implicitly stateless because it blocks all traffic by default.
Answer: A,B
Q9. What can the SMTP preprocessor in FirePOWER normalize?
A. It can extract and decode email attachments in client to server traffic.
B. It can look up the email sender.
C. It compares known threats to the email sender.
D. It can forward the SMTP traffic to an email filter server.
E. It uses the Traffic Anomaly Detector.
Answer: A
Q10. What do you use when you have a network object or group and want to use an IP address?
A. Static NAT
B. Dynamic NAT
C. identity NAT
D. Static PAT
Answer: B
P.S. Easily pass 210-260 Exam with Certleader Actual Dumps & pdf vce, Try Free: https://www.certleader.com/210-260-dumps.html (310 New Questions)