[Free] 2018(Aug) Dumps4cert Cisco 210-260 Dumps with VCE and PDF Download 151-160

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Cisco Official New Released 210-260
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Network Security

Question No: 151

Which address block is reserved for locally assigned unique local addresses?

A. 2002::/16 B. FD00::/8 C. 2001::/32 D. FB00::/8

Answer: B

Question No: 152

What can cause the the state table of a stateful firewall to update? (choose two)

  1. when a connection is created

  2. When a connection’s timer has expired within state table

  3. C. when packet is evaluated against the outbound access list and is denied

  4. D. when outbound packets forwarded to outbound interface

  5. E. when rate-limiting is applied

Answer: A,B

Question No: 153

What is true about the Cisco IOS Resilient Configuration feature?

  1. The feature can be disabled through a remote session

  2. There is additional space required to secure the primary Cisco IOS Image file

  3. The feature automatically detects image and configuration version mismatch

  4. Remote storage is used for securing files

Answer: C

Question No: 154

If a router configuration includes the line aaa authentication login default group tacacs enable, which events will occur when the TACACS server returns an error? (Choose two.)

  1. The user will be prompted to authenticate using the enable password

  2. Authentication attempts to the router will be denied

  3. Authentication will use the router`s local database

  4. Authentication attempts will be sent to the TACACS server

Answer: A,B

Question No: 155

Refer to the exhibit.

Dumps4Cert 2018 PDF and VCE

What is the effect of the given command sequence?

  1. It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.

  2. It defines IPSec policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.

  3. It defines IKE policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.

  4. It defines IKE policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.

Answer: A

Question No: 156

What is the purpose of the Integrity component of the CIA triad?

  1. to ensure that only authorized parties can modify data

  2. to determine whether data is relevant

  3. to create a process for accessing data

  4. to ensure that only authorized parties can view data

Answer: A

Question No: 157

which feature allow from dynamic NAT pool to choose next IP address and not a port on a used IP address?

  1. next IP

  2. round robin

  3. Dynamic rotation

  4. Dynamic PAT rotation

Answer: B

Question No: 158

What three actions are limitations when running IPS in promiscuous mode? (Choose three.)

  1. deny attacker

  2. deny packet

  3. modify packet

  4. request block connection

  5. request block host

  6. reset TCP connection

Answer: A,B,C

Question No: 159

What command can you use to verify the binding table status?

  1. show ip dhcp snooping database

  2. show ip dhcp snooping binding

  3. show ip dhcp snooping statistics

  4. show ip dhcp pool

  5. show ip dhcp source binding

  6. show ip dhcp snooping

Answer: A

Question No: 160

Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)

  1. start-stop

  2. stop-record

  3. stop-only

  4. stop

Answer: A,C

100% Dumps4cert Free Download!
210-260 PDF
100% Dumps4cert Pass Guaranteed!
210-260 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No


Leave a Reply

Your email address will not be published. Required fields are marked *

  • Categories

  • Tags

  • Hot Exam List

  • Hot Exams

  • Hot Catageories List