This page was exported from Braindump2go Exam Dumps Free Download
[
https://www.pass4surevce.com
]
Export date: Fri Mar 29 9:30:19 2024 / +0000 GMT
2017 Oct New 210-260 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 210-250 Questions: 1.|2017 New 210-260 Exam Dumps (PDF & VCE) 362Q&As Download: 2.|2017 New 210-260 Exam Questions & Answers Download: QUESTION 123 A. Denial of Service Answer: A QUESTION 124 A. Port security Answer: B QUESTION 125 A. STP elects the root bridge Answer: A QUESTION 126 A. Port security Answer: BD QUESTION 127 A. Extended access lists should be placed as near as possible to the destination Answer: BCE QUESTION 128 A. Reconnaissance Answer: A QUESTION 129 A. Threat mitigation Answer: A QUESTION 130 A. AAA Summary Answer: A QUESTION 131 A. It work with deployed firewalls. Answer: DEF QUESTION 132 A. performing automatic network audits Answer: CE QUESTION 133 A. the ASA will apply the actions from only the last matching class maps it finds for the feature type. Answer: D QUESTION 134 A. Malware is tools and applications that remove unwanted programs. Answer: C QUESTION 135 A. social activism Answer: B 1.|2017 New 210-260 Exam Dumps (PDF & VCE) 362Q&As Download: 2.|2017 New 210-260 Study Guide Video: YouTube Video: YouTube.com/watch?v=9yy5IlptXYw
https://www.braindump2go.com/210-260.html
https://drive.google.com/drive/folders/0B75b5xYLjSSNV1RGaFJYZkxGWFk?usp=sharing
What is the most common Cisco Discovery Protocol version 1 attack?
B. MAC-address spoofing
C. CAM-table overflow
D. VLAN hopping
What is the Cisco preferred countermeasure to mitigate CAM overflows?
B. Dynamic port security
C. IP source guard
D. Root guard
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?
B. STP selects the root port
C. STP selects the designated port
D. STP blocks one of the ports
Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)
B. DHCP snooping
C. IP source guard
D. Dynamic ARP inspection
Which of the following statements about access lists are true? (Choose three.)
B. Extended access lists should be placed as near as possible to the source
C. Standard access lists should be placed as near as possible to the destination
D. Standard access lists should be placed as near as possible to the source
E. Standard access lists filter on the source address
F. Standard access lists filter on the destination address
In which stage of an attack does the attacker discover devices on a target network?
B. Covering tracks
C. Gaining access
D. Maintaining access
Which type of security control is defense in depth?
B. Risk analysis
C. Botnet mitigation
D. Overt and covert channels
On which Cisco Configuration Professional screen do you enable AAA?
B. AAA Servers and Groups
C. Authentication Policies
D. Authorization Policies
Which three statements about Cisco host-based IPS solution are true? (Choose three)
B. It can be deployed at the perimeter
C. It uses signature-based policies
D. It can have more restrictive policies than network-based IPS
E. It can generate alerts based on behavior at the desktop level
F. It can view encrypted files
Explanation:
The key word here is 'Cisco', and Cisco's host-based IPS, CSA, is NOT signature-based and CAN view encrypted files.
What are two users of SIEM software? (Choose two)
B. configuring firewall and IDS devices
C. alerting administrators to security events in real time
D. scanning emails for suspicious attachments
E. collecting and archiving syslog data
Explanation:
The other choices are not functions of SIEM software.
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?
B. the ASA will apply the actions from all matching class maps it finds for the feature type.
C. the ASA will apply the actions from only the most specific matching class map it finds for the feature type.
D. the ASA will apply the actions from only the first matching class maps it finds for the feature type
Explanation:
If it matches a class map for a given feature type, it will NOT attempt to match to any subsequent class maps.
What statement provides the best definition of malware?
B. Malware is a software used by nation states to commit cyber-crimes.
C. Malware is unwanted software that is harmful or destructive
D. Malware is a collection of worms, viruses and Trojan horses that is distributed as a single.....
Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months.
What are two possible types of attacks your team discovered?
B. advanced persistent threat
C. drive-by spyware
D. targeted malware
Explanation:
If required 2 answers in the real exam, please choose BD.
!!!RECOMMEND!!!
https://www.braindump2go.com/210-260.html
Post date: 2017-10-12 03:52:43
Post date GMT: 2017-10-12 03:52:43
Post modified date: 2017-10-12 03:52:43
Post modified date GMT: 2017-10-12 03:52:43
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com