[Free] 2018(Aug) Ensurepass Cisco 210-260 Dumps with VCE and PDF 71-80

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 71

Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?

  1. Unidirectional Link Detection

  2. Unicast Reverse Path Forwarding

  3. TrustSec

  4. IP Source Guard

Answer: B

Question No: 72

Which command do you enter to enable authentication for OSPF on an interface?

  1. router(config-if)#ip ospf message-digest-key 1 md5 CISCOPASS

  2. router(config-router)#area 0 authentication message-digest

  3. router(config-router)#ip ospf authentication-key CISCOPASS

  4. router(config-if)#ip ospf authentication message-digest

Answer: D

Question No: 73

You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?

  1. Create a whitelist and add the appropriate IP address to allow the traffic.

  2. Create a custom blacklist to allow the traffic.

  3. Create a user based access control rule to allow the traffic.

  4. Create a network based access control rule to allow the traffic.

  5. Create a rule to bypass inspection to allow the traffic.

Answer: A

Question No: 74

What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?

  1. It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January 1, 2014 and continue using the key indefinitely.

  2. It configures the device to begin transmitting the authentication key to other devices at 23:59:00 local time on December 31, 2013 and continue using the key indefinitely.

  3. It configures the device to begin accepting the authentication key from other devices

    immediately and stop accepting the key at 23:59:00 local time on December 31, 2013.

  4. It configures the device to generate a new authentication key and transmit it to other devices at 23:59:00 local time on December 31, 2013.

  5. It configures the device to begin accepting the authentication key from other devices at 23:59:00 local time on December 31, 2013 and continue accepting the key indefinitely.

  6. It configures the device to begin accepting the authentication key from other devices at 00:00:00 local time on January 1, 2014 and continue accepting the key indefinitely.

Answer: B

Question No: 75

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which statement about the given configuration is true?

  1. The single-connection command causes the device to establish one connection for all TACACS transactions.

  2. The single-connection command causes the device to process one TACACS request and then move to the next server.

  3. The timeout command causes the device to move to the next server after 20 seconds of

    TACACS inactivity.

  4. The router communicates with the NAS on the default port, TCP 1645.

Answer: A

Question No: 76

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which statement about the device time is true?

  1. The time is authoritative, but the NTP process has lost contact with its servers.

  2. The time is authoritative because the clock is in sync.

  3. The clock is out of sync.

  4. NTP is configured incorrectly.

  5. The time is not authoritative.

Answer: A

Question No: 77

How does PEAP protect the EAP exchange?

  1. It encrypts the exchange using the server certificate.

  2. It encrypts the exchange using the client certificate.

  3. It validates the server-supplied certificate, and then encrypts the exchange using the client certificate.

  4. It validates the client-supplied certificate, and then encrypts the exchange using the server certificate.

Answer: A

Question No: 78

What’s the technology that you can use to prevent non malicious program to run in the computer that is disconnected from the network?

  1. Firewall

  2. Software Antivirus

  3. Network IPS

  4. Host IPS.

Answer: D

Question No: 79

In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?

  1. phishing

  2. pharming

  3. solicitation

  4. secure transaction

Answer: A

Question No: 80

Which prevent the company data from modification even when the data is in transit?

  1. Confidentiality

  2. Integrity

  3. Vailability

Answer: B

100% Ensurepass Free Download!
210-260 PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No