Vendor: Cisco Exam Code: 210-260 dumps Exam Name: Implementing Cisco Network Security Version: Demo

QUESTION 1 Which two authentication types does OSPF support? (Choose two.) A. plaintext B. MD5 C. HMAC D. AES 256 E. SHA-1 F. DES Correct Answer: AB

QUESTION 2 Which statement about personal firewalls is true? A. They can protect a system by denying probing requests. B. They are resilient against kernel attacks. C. They can protect email messages and private documents in a similar way to a VPN. D. They can protect the network against attacks. Correct Answer: A

QUESTION 3 Which two authentication 300-101 dumps types does OSPF support? (Choose two.) A. plaintext B. MD5 C. HMAC D. AES 256 E. SHA-1 F. DES Correct Answer: AB

QUESTION 4 How does a device on a network using ISE receive its digital certificate during the new- device registration process? A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server. B. ISE issues a certificate from its internal CA server. C. ISE issues a pre-defined certificate from a local database. D. The device requests a new certificate directly from a central CA. Correct Answer: A

QUESTION 5 Refer to the exhibit.The Admin user is unable to enter configuration mode on a device with the given configuration. What change can you make to the configuration to correct the problem? A. Remove the autocommand keyword and arguments from the username admin privilege line. B. Change the Privilege exec level value to 15. C. Remove the two Username Admin lines. D. Remove the Privilege exec line. Correct Answer: A

QUESTION 6 When an administrator initiates a device wipe 200-310 dumps command from the ISE, what is the immediate effect? A. It requests the administrator to choose between erasing all device data or only managed corporate data. B. It requests the administrator to enter the device PIN or password before proceeding with the operation. C. It notifies the device user and proceeds with the erase operation. D. It immediately erases all data on the device. Correct Answer: A

QUESTION 7 Which two services define cloud networks? (Choose two.) A. Infrastructure as a Service B. Platform as a Service C. Security as a Service D. Compute as a Service E. Tenancy as a Service Correct Answer: AB

QUESTION 8 You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address? A. Create a whitelist and add the appropriate IP address to allow the traffic. B. Create a custom blacklist to allow the traffic. C. Create a user based access control rule to allow the traffic. D. Create a network based access control 100-105 dumps rule to allow the traffic. E. Create a rule to bypass inspection to allow the traffic. Correct Answer: A

QUESTION 9 What is a benefit of a web application firewall? A. It blocks known vulnerabilities without patching applications. B. It simplifies troubleshooting. C. It accelerates web traffic. D. It supports all networking 400-251 dumps protocols. Correct Answer: A

QUESTION 10 Refer to the exhibit.What is the effect of the given command sequence? A. It configures IKE Phase 1. B. It configures a site-to-site VPN tunnel. C. It configures a crypto 200-125 dumps policy with a key size of 14400. D. It configures IPSec Phase 2. Correct Answer: A

QUESTION 11 What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.) A. The Internet Key Exchange protocol establishes security associations B. The Internet Key Exchange protocol provides data confidentiality C. The Internet Key Exchange protocol provides replay detection D. The Internet Key Exchange protocol is responsible for mutual authentication Correct Answer: AD

Categoría: TICs: Banda Ancha e Internet

¿Tienen las TICs y la Banda Ancha un impacto positivo en el rendimiento escolar?

Tablets, pizarras electrónicas u ordenadores son dispositivos habituales hoy en día en las aulas y en todos los niveles educativos, desde Infancia hasta Secundaria, Bachillerato o Estudios Universitarios. Lápiz y papel están aún presentes en los métodos de estudio, pero cada vez más la informatización de la información se prioriza sobre la documentación en papel. ¿Influyen las nuevas tecnologías en el rendimiento escolar?

Read More

¿Son necesarios más ordenadores con acceso a Internet en centros públicos?

Las nuevas tecnologías se han instaurado en nuestras vidas de tal forma que no imaginamos nuestro día a día sin ellas. El ejemplo más claro lo tenemos en el teléfono móvil, un aparato que hace unos años era cosa sólo de unos pocos y que sin embargo hoy en día nos cuesta prescindir de él. Esta necesidad de tecnología se ha visto acrecentada a raíz de la existencia de Internet y de su fácil acceso, ya que las compañías de telecomunicaciones ofrecen precios cada vez más competitivos, por lo que una gran parte de las familias de Utrera ya cuentan en sus hogares con este servicio.

Read More
Loading