Which three statements about Cisco host-based IPS solution are true? (Choose three)
A. It work with deployed firewalls.
B. It can be deployed at the perimeter
C. It uses signature-based policies
D. It can have more restrictive policies than network-based IPS
E. It can generate alerts based on behavior at the desktop level
F. It can view encrypted files
Answer: ADF
Explanation:
The key word here is 'Cisco', and Cisco's host-based IPS, CSA, is NOT signature-based and CAN view encrypted files.
Question No : 2
Scenario
In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations.To access ASDM, click the ASA icon in the topology diagram.
Note: Not all ASDM functionalities are enabled in this simulation.To see all the menu options available on the left navigation pane, you may also need to unexpand the expanded menu first.
Which user authentication method is used when users login to the Clientless SSL VPN portal
using https://209165.201.2/test?
A. Both Certificate and AAA with LOCAL database
B. AAA with RADIUS server
C. Both Certificate and AAA with RADIUS server
D. AAA with LOCAL database
E. Certificate
Answer: D
Explanation:
This can be seen from the Connection Profiles Tab of the Remote Access VPN configuration,where the alias of test is being used.
Buy Exact 210-260 Exam Questions With Answers -
210-260 Dumps PDF Dumps4Download
Question No : 3
What are two users of SIEM software? (Choose two)
A. performing automatic network audits
B. configuring firewall and IDS devices
C. alerting administrators to security events in real time
D. scanning emails for suspicious attachments
E. collecting and archiving syslog data
Answer: C,E
Explanation:
The other choices are not functions of SIEM software.
Question No : 4
Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user?
A. Trust
B. Block
C. Allow without inspection
D. Monitor
E. Allow with inspection
Answer: E
Explanation:
Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don't exist.
Question No : 5
Which two next-generation encryption algorithms does Cisco recommends? (Choose two)
A. SHA-384
B. MD5
C. DH-1024
D. DES
E. AES
F. 3DES
Answer: A,E
Explanation:
From Cisco documentation:
A. SHA-384 - YES
B. MD5 - NO
C. DH-1024 - NO
D. DES - NO
E. AES - YES (CBC, or GCM modes)
F. 3DES - Legacy
Question No : 6
How does a device on a network using ISE receive its digital certificate during the new-device registration process?
A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server
B. The device request a new certificate directly from a central CA
C. ISE issues a pre-defined certificate from a local database
D. ISE issues a certificate from its internal CA server.
Answer: A
Explanation:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide.pdf
Question No : 7
Which three ESP fields can be encrypted during transmission? (Choose three)
A. Next Header
B. MAC Address
C. Padding
D. Pad Length
E. Sequence Number
F. Security Parameter Index
Answer: A,C,D
Explanation:
The last encrypted part is the Payload Data. The unencrypted parts are the Security Parameter Index and the Sequence Number.
Question No : 8
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?
A. Create a custom blacklist to allow traffic
B. Create a whitelist and add the appropriate IP address to allow traffic.
C. Create a user based access control rule to allo the traffic.
D. Create a network based access control rule to allow the traffic.
E. Create a rule to bypass inspection to allow the traffic
Answer: C
Explanation:
Custom whitelists override blacklists and mitigate false positives.
Verified
210-260 Exam Questions - Cisco 210-260 Exam Study Material Dumps4Download
Question No : 9
Which EAP method uses protected Access Credentials?
A. EAP-TLS
B. EAP-PEAP
C. EAP-FAST
D. EAP-GTC
Answer: C
Question No : 10
In which two situations should you use out-of-band management? (Choose two)
A. when a network device fails to forward packets
B. when management applications need concurrent access to the device
C. when you require ROMMON access
D. when you require adminstrator access from multiple locations
E. when the control plane fails to respond
Answer: A,C
100%
Valid Cisco 210-260 Exam Dumps Questions - Dumps4Download 210-260 Free Demo PDF








