Implementing Cisco Network Security (IINS)

 

QUESTION 101

Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)

 

A.

start-stop

B.

stop-record

C.

stop-only

D.

stop

 

Correct Answer: AC

 

 

QUESTION 102

What improvement does EAP-FASTv2 provide
over EAP-FAST?

 

A.

It support more secure encryption protocols.

B.

It allows multiple credentials to be passed in a single EAP exchange.

C.

It addresses security vulnerabilities found in the original protocol.

D.

It allows faster authentication by using fewer packets.

 

Correct Answer: B

 

 

QUESTION 103

Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?

 

A.

FlexConfig

B.

Device Manager

C.

Report Manager

D.

Health and Performance Monitor

 

Correct Answer: D

 

 

 

QUESTION 104

If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?

 

A.

The interface on both switches may shut down

B.

STP loops may occur

C.

The switch with the higher native VLAN may shut down

D.

The interface with the lower native VLAN may shut down

 

Correct Answer: B

 

 

QUESTION 105

Refer to the following:

 

Username Engineer privilege 9 password 0 configure

 

Username Monitor privilege 8 password 0 vatcher

 

Username HelpDesk privilege 6 password help

 

Privilege exec level 6 show running

 

Privilege exec level 7show start-up

 

Privilege exec level 9 show configure terminal

 

Privilege exec level 10 interface

 

Which line in this configuration prevents the HelpDesk user from modifying the interface configuration?

 

A.

Privilege exec level 9 show configure terminal

B.

Privilege exec level 7show start-up

C.

Privilege exec level 10 interface

D.

Username HelpDesk privilege 6 password help

 

Correct Answer: A

 

 

QUESTION 106

By which kind of threat is the victim tricked into entering username and password information at a disguised website?

 

A.

Spoofing

B.

Malware

C.

Spam

D.

Phishing

 

Correct Answer: D

 

 

 

 

QUESTION 107

What is the purpose of a honeypot IPS?

 

A.

To create customized policies.

B.

To detect unknown attacks.

C.

To normalize streams.

D.

To collect information about attacks.

 

Correct Answer: D

 

 

QUESTION 108

Which statements about reflexive access lists are true? (Choose three.)

 

A.

Reflexive access lists create a permanent ACE

B.

Reflexive access lists approximate session filtering using the established keyword

C.

Reflexive access lists can be attached to standard named IP ACLs

D.

Reflexive access lists support UDP sessions

E.

Reflexive access lists can be attached to extended named IP ACLs

F.

Reflexive access lists support TCP sessions

 

Correct Answer: DEF

 

 

QUESTION 109

Which statement about IOS privilege levels is true?

 

A.

Each privilege level is independent of all other privilege levels.

B.

Each privilege level supports the commands at its own level and all levels above it.

C.

Each privilege level supports the commands at its own level and all levels below it.

D.

Privilege-level commands are set explicitly for each user.

 

Correct Answer: C

 

 

QUESTION 110

What are two uses of SIEM software? (Choose two)

 

A.

performing automatic network audits

B.

configuring firewall and IDS devices

C.

alerting administrators to security events in real time

D.

scanning emails for suspicious attachments

E.

collecting and archiving syslog data

 

Correct Answer: CE

 

Free VCE & PDF File for Cisco 210-260 Practice Test

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …