This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Fri Mar 29 12:36:19 2024 / +0000 GMT ___________________________________________________ Title: [210-260 New VCE]100% Exam Pass-210-260 PDF and 210-260 VCE Dumps Free from Braindump2go[71-80] --------------------------------------------------- (2017 June)Cisco 210-260 Exam Dumps with PDF and VCE New Updated in www.Braindump2go.com  Today!100% Real Exam Questions! 100% Exam Pass Guaranteed!1.|2017 Version New 210-260 PDF and 210-260 VCE 265Q&As Download:http://www.braindump2go.com/210-260.html 2.|2017 Version New 210-260 Exam Questions & Answers Download:https://drive.google.com/drive/folders/0B75b5xYLjSSNV1RGaFJYZkxGWFk?usp=sharing QUESTION 71In what type of attack does an attacker virtually change a devices burned in address in an attempt to circumvent access lists and mask the device's true identity? A.    gratuitous ARPB.    ARP poisoningC.    IP SpoofingD.    MAC Spoofing Answer: D QUESTION 72How does a zone-based firewall implementation handle traffic between Interfaces in the same Zone? A.    traffic between interfaces in the same zone is blocked unless yoc configure the same-security permit commandB.    Traffic between interfaces in the same zone is always blockedC.    Traffic between two interfaces in the same zone is allowed by defaultD.    Traffic between interfaces in the same zone is blocked unless you apply a service policy to the zone pair Answer: C QUESTION 73An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity? A.    The switch could offer fake DHCP addresses.B.    The switch could become the root bridge.C.    The switch could be allowed to join the VTP domainD.    The switch could become a transparent bridge. Answer: B QUESTION 74Which two next generation encrytption algorithms does Cisco recommend? (Choose two) A.    AESB.    3DESC.    DESD.    MD5E.    DH-1024F.    SHA-384 Answer: AF QUESTION 75In which three cases does the ASA firewall permit inbound HTTP GET requests during normal operations? (Choose three). A.    when a matching TCP connection is foundB.    when the firewall requires strict HTTP inspectionC.    when the firewall receives a FIN packetD.    when matching ACL entries are configuredE.    when the firewall requires HTTP inspectionF.    when matching NAT entries are configured Answer: ADF QUESTION 76Which two features do CoPP and CPPr use to protect the control plane? (Choose two) A.    QoSB.    traffic classificationC.    access listsD.    policy mapsE.    class mapsF.    Cisco Express Forwarding Answer: AB QUESTION 77What is an advantage of implementing a Trusted Platform Module for disk encryption? A.    It provides hardware authenticationB.    It allows the hard disk to be transferred to another device without requiring re-encryption.disC.    it supports a more complex encryption algorithm than other disk-encryption technologies.D.    it can protect against single poins of failure. Answer: A QUESTION 78Refer to the exhibit. What is the effect of the given command sequence?  A.    It configures IKE Phase 1B.    It configures a site-to-site VPN TunnelC.    It configures a crypto policy with a key size of 14400D.    It configures IPSec Phase 2 Answer: A QUESTION 79A specific URL has been identified as containing malware. What action can you take to block users from accidentaly visiting the URL and becoming infected with malware? A.    Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the routers local URL listB.    Enable URL filtering on the perimeter router and add the URLs you want to allow to the firewalls local URL listC.    Create a blacklist that contains the URL you want to block and activate the blacklist on the perimeter router.D.    Enable URL filtering on the perimeter router and add the URLs you want to block to the routers local URL listE.    Create a whitelist that contains the URls you want to allow and activate the whitelist on the perimeter router. Answer: D QUESTION 80If you change the native VLAN on the port to an unused VLAN, what happens if an attacker attempts a double tagging attack? A.    The trunk port would go into an error-disable state.B.    A VLAN hopping attack would be successfulC.    A VLAN hopping attack would be preventedD.    the attacked VLAN will be pruned Answer: C !!!RECOMMEND!!! 1.|2017 Version New 210-260 PDF and 210-260 VCE 265Q&As Download:http://www.braindump2go.com/210-260.html 2.|2017 Version New 210-260 Study Guide Video: YouTube Video: YouTube.com/watch?v=9yy5IlptXYw --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-06-13 04:00:07 Post date GMT: 2017-06-13 04:00:07 Post modified date: 2017-06-13 04:00:07 Post modified date GMT: 2017-06-13 04:00:07 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com