2017 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 61

Which TACACS server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)

  1. EAP

  2. ASCII

  3. PAP

  4. PEAP

  5. MS-CHAPv1

  6. MS-CHAPv2

Answer: B,C,E

Question No: 62

What hash type does Cisco use to validate the integrity of downloaded images?

  1. Sha1

  2. Sha2

  3. Md5

  4. Md1

Answer: C

Question No: 63

Refer to the exhibit.


What is the effect of the given command?

  1. It merges authentication and encryption methods to protect traffic that matches an ACL.

  2. It configures the network to use a different transform set between peers.

  3. It configures encryption for MD5 HMAC.

  4. It configures authentication as AES 256.

Answer: A

Question No: 64

Refer to the exhibit.


All ports on switch 1 have a primary VLAN of 300. Which devices can host 1 reach?

  1. Host 2

  2. Server

  3. Host 4

  4. Other devices within VLAN 303

Answer: B

Question No: 65

What is the primary purpose of a defined rule in an IPS?

  1. to configure an event action that takes place when a signature is triggered

  2. to define a set of actions that occur when a specific user logs in to the system

  3. to configure an event action that is pre-defined by the system administrator

  4. to detect internal attacks

Answer: A

Question No: 66

Which two devices are components of the BYOD architectural framework?

  1. Prime Infrastructure

  2. Nexus 7010 Switch

  3. Cisco 3945 Router

  4. Wireless Access Points

  5. Identity Services Engine

Answer: A,E

Question No: 67

When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?

  1. STP elects the root bridge

  2. STP selects the root port

  3. STP selects the designated port

  4. STP blocks one of the ports

Answer: A

Question No: 68

Which type of encryption technology has the broadest platform support to protect operating systems?

  1. software

  2. hardware

  3. middleware

  4. file-level

Answer: A

Question No: 69

Which tool can an attacker use to attempt a DDoS attack?

  1. botnet

  2. Trojan horse

  3. virus

  4. adware

Answer: A

Question No: 70

Which of the following are features of IPsec transport mode? (Choose three.)

  1. IPsec transport mode is used between end stations

  2. IPsec transport mode is used between gateways

  3. IPsec transport mode supports multicast

  4. IPsec transport mode supports unicast

  5. IPsec transport mode encrypts only the payload

  6. IPsec transport mode encrypts the entire packet

Answer: A,D,E

100% Free Download!
Download Free Demo:210-260 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 210-260 Full Exam PDF and VCE
Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.07.01-2017.07.31]

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE