[Free] 2018(July) Ensurepass Cisco 210-260 Dumps with VCE and PDF 111-120

Ensurepass.com : Ensure you pass the IT Exams
2018 July Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 111

In which three ways does the RADIUS protocol differ from TACACS? (Choose three.)

  1. RADIUS uses UDP to communicate with the NAS.

  2. RADIUS encrypts only the password field in an authentication packet.

  3. RADIUS authenticates and authorizes simultaneously, causing fewer packets to be transmitted.

  4. RADIUS uses TCP to communicate with the NAS.

  5. RADIUS can encrypt the entire packet that is sent to the NAS.

  6. RADIUS supports per-command authorization.

Answer: A,B,C

Question No: 112

Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)

  1. Smart tunnels can be used by clients that do not have administrator privileges

  2. Smart tunnels support all operating systems

  3. Smart tunnels offer better performance than port forwarding

  4. Smart tunnels require the client to have the application installed locally

Answer: A,C

Question No: 113

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?

  1. IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.

  2. IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.

  3. IPSec Phase 1 is down due to a QM_IDLE state.

  4. IPSec Phase 2 is down due to a QM_IDLE state.

Answer: A

Question No: 114

What port option in a PVLAN that can communicate with every other ports…

A. promiscous

Answer: A

Question No: 115

Which source port does IKE use when NAT has been detected between two VPN gateways?

  1. TCP 4500

  2. TCP 500

  3. UDP 4500

  4. UDP 500

Answer: C

Question No: 116

Which two characteristics of an application layer firewall are true? (Choose two)

  1. provides protection for multiple applications

  2. is immune to URL manipulation

  3. provides reverse proxy services

  4. provides stateful firewall functionality

  5. has low processor usage

Answer: A,C

Question No: 117

Which label is given to a person who uses existing computer scripts to hack into computers lacking the expertise to write their own?

  1. white hat hacker

  2. hacktivist

  3. phreaker

  4. script kiddy

Answer: D

Question No: 118

Which two features are commonly used CoPP and CPPr to protect the control plane? (Choose two.)

  1. QoS

  2. traffic classification

  3. access lists

  4. policy maps

  5. class maps

  6. Cisco Express Forwarding

Answer: A,B

Question No: 119

The Oakley cryptography protocol is compatible with following for managing security?

  1. IPSec

  2. ISAKMP

Answer: B

Question No: 120

What are the primary attack methods of VLAN hopping? (Choose two.)

  1. VoIP hopping

  2. Switch spoofing

  3. CAM-table overflow

  4. Double tagging

Answer: B,D

100% Ensurepass Free Download!
Download Free Demo:210-260 Demo PDF
100% Ensurepass Free Guaranteed!
210-260 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.