IT Exam Training online / Bootcamp

Similar documents
UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

CCNA Security 1.0 Student Packet Tracer Manual

Implementing Cisco Network Security (IINS) 3.0

CCNA Security. 2.0 Secure Access. 1.0 Security Concepts

Cisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ]

Fundamentals of Network Security v1.1 Scope and Sequence

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

Exam Actual. Higher Quality. Better Service! QUESTION & ANSWER

CCNA Security PT Practice SBA

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Network Security and Cryptography. 2 September Marking Scheme

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

CISCO EXAM QUESTIONS & ANSWERS

802.1x Port Based Authentication

Network security session 9-2 Router Security. Network II

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

CCNP Switch Questions/Answers Securing Campus Infrastructure

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

ExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Cisco Networking Academy CCNP

ActualTorrent. Professional company engaging Providing Valid Actual Torrent file for qualification exams.

cisco. Number: Passing Score: 800 Time Limit: 120 min

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Indicate whether the statement is true or false.

CISCO EXAM QUESTIONS & ANSWERS

Cisco IOS Firewall Authentication Proxy

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Network Security and Cryptography. December Sample Exam Marking Scheme

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Cisco Number: Cisco Passing Score: 800 Time Limit: 120 min File Version: 1.0. Sections 1. Sims 2. Multi Select 3.

CSC 5930/9010 Offensive Security: Lateral Movement

CCNA Security. Implementing Cisco Network Security Version: 5.0

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

Implementing Cisco IP Routing

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

Security Hardening Checklist for Cisco Routers/Switches in 10 Steps

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2


Radius, LDAP, Radius used in Authenticating Users

Lab Configuring and Verifying Extended ACLs Topology

Teacher s Reference Manual

EXAM - JN ACX, Specialist (JNCIS-ACX) Buy Full Product.

CCNA Security Instructor Packet Tracer Manual

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Configuring L2TP over IPsec

CCNA Discovery 3 Chapter 8 Reading Organizer

Internetwork Expert s CCNA Security Bootcamp. Mitigating Layer 2 Attacks. Layer 2 Mitigation Overview

Technology Scenarios. INE s CCIE Security Bootcamp - 1 -

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Implementing Cisco Edge Network Security Solutions ( )

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018

Configuring Easy VPN Services on the ASA 5505

Cisco Exam Questions & Answers

KillTest. 半年免费更新服务

Security+ SY0-501 Study Guide Table of Contents

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

Vendor: Cisco. Exam Code: Exam Name: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT v2.0) Version: Demo

Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0)

Pass4sures. Latest Exam Guide & Learning Materials

Cisco Certified Network Associate ( )

Configuring NAT for IP Address Conservation

NAT Box-to-Box High-Availability Support

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Topexam. 一番権威的な IT 認定試験ウェブサイト 最も新たな国際 IT 認定試験問題集

Configuring Management Access

ValidVCE. ValidVCE - Free valid vce dumps for certification exam test prep

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Checkpoint Check Point VPN-1 VSX NGX. Practice Test. Version 2.0

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

HikCentral V.1.1.x for Windows Hardening Guide

Finding Feature Information

Exam Questions

Cisco Adaptive Security Appliance (ASA) 9.6 Preparative Procedures & Operational User Guide for the Common Criteria Certified configuration

Cisco EXAM CCNA Cisco Certified Network Associate. Buy Full Product.

Q&As Implementing Cisco Network Security

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

Lab - Troubleshooting ACL Configuration and Placement Topology

Network Access Flows APPENDIXB

Cisco CCIE Security Written.

CCNA Routing and Switching (NI )

Configuring Authentication Proxy

Cisco Secure PIX Firewall Advanced (CSPFA)

Radius, LDAP, Radius, Kerberos used in Authenticating Users

CISCO EXAM QUESTIONS & ANSWERS

Application Note. Using RADIUS with G6 Devices

Wireless LANs (CO72047) Bill Buchanan, Reader, School of Computing.

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

Transcription:

DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice

Exam : 210-260 Title : Implementing Cisco Network Security Vendor : Cisco Version : DEMO Get Latest & Valid 210-260 Exam's Question and Answers 1 from Dumpcollection.com. 1

NO.1 Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method? A. aaa authentication enable console LOCAL SERVER_GROUP B. aaa authentication enable console SERVER_GROUP LOCAL C. aaa authentication enable console local D. aaa authentication enable console LOCAL Answer: D The local database must be referenced in all capital letters when AAA is in use. If lower case letters are used, the ASA will look for an AAA server group called "local". NO.2 what causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network? A. client entered wrong credentials multiple times. B. client entered wrong credentials the first time C. When 802.1X is not globally enabled on the Cisco catalyst switch D. When AAA new-model is enabled Answer: A NO.3 What do you use when you have a network object or group and want to use an IP address? A. Static NAT B. Dynamic NAT C. identity NAT D. Static PAT Adding Network Objects for Mapped Addresses For dynamic NAT, you must use an object or group for the mapped addresses. Other NAT types have the option of using inline addresses, or you can create an object or group according to this section. * Dynamic NAT: + You cannot use an inline address; you must configure a network object or group. + The object or group cannot contain a subnet; the object must define a range; the group can include hosts and ranges. + If a mapped network object contains both ranges and host IP addresses, then the ranges are used for dynamic NAT, and then the host IP addresses are used as a PAT fallback. * Dynamic PAT (Hide): + Instead of using an object, you can optionally configure an inline host address or specify the interface address. + If you use an object, the object or group cannot contain a subnet; the object must define a host, or for a PAT pool, a range; the group (for a PAT pool) can include hosts and ranges. * Static NAT or Static NAT with port translation: + Instead of using an object, you can configure an inline address or specify the interface address (for static NAT-with-port-translation). + If you use an object, the object or group can contain a host, range, or subnet. * Identity NAT + Instead of using an object, you can configure an inline address. + If you use an object, the object must match the real addresses you want to translate. Get Latest & Valid 210-260 Exam's Question and Answers 2 from Dumpcollection.com. 2

http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/n at_objects.html#61711 NO.4 Which option is a key security component of an MDM deployment? A. using MS-CHAPv2 as the primary EAP method. B. using self-signed certificates to validate the server. C. using network-specific installer packages D. using an application tunnel by default. NO.5 What is the highest security level that can be configured for an interface on an ASA? A. 0 B. 50 C. 100 D. 200 Answer: C Security level 100: This is the highest security level on our ASA and by default this is assigned to the "inside" interface. Normally we use this for our "LAN". Since this is the highest security level, by default it can reach all the other interfaces. https://networklessons.com/cisco/asa-firewall/cisco-asa-security-levels/ NO.6 In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity? A. gratuitous ARP B. ARP poisoning C. IP spoofing D. MAC spoofing Answer: D If a switch receives an inferior BPDU, nothing changes. Receiving a superior BPDU will kick off a reconvergence of the STP topology. So the rogue switch may become a root bridge. http://www.networkpcworld.com/what-are-inferior-and-superior-bpdus-of-stp/ NO.7 Which type of secure connectivity does an extranet provide? A. other company networks to your company network B. remote branch offices to your company network C. your company network to the Internet D. new networks to your company network Answer: A What is an Extranet? In the simplest terms possible, an extranet is a type of network that crosses organizational boundaries, giving outsiders access to information and resources stored inside the organization's internal network (Loshin, p. 14). Get Latest & Valid 210-260 Exam's Question and Answers 3 from Dumpcollection.com. 3

https://www.sans.org/reading-room/whitepapers/firewalls/securing-extranet-connections-816 NO.8 Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.) A. The password B. The hash C. The key D. The transform set,c In cryptography, a keyed-hash message authentication code (HMAC) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. It may be used to simultaneously verify both the data integrity and the authentication of a message. https://en.wikipedia.org/wiki/hash-based_message_authentication_code NO.9 How does a zone paid handle traffic if the policy definition of the zone pair is missing? A. It permits all traffic without logging. B. it drops all traffic C. it permits and logs all traffic D. it inspects all traffic NO.10 Which two characteristics of symmetric encryption are true? (Choose two) A. It uses digital certificates. B. It uses a public key and a private key to encrypt and decrypt traffic. C. it requires more resources than asymmetric encryption D. it is faster than asymmetric encryption E. It uses the same key to encrypt and decrypt the traffic. E http://searchsecurity.techtarget.com/definition/secret-key-algorithm NO.11 DRAG DROP Drag the hash or algorithm from the left column to its appropriate category on the right. Get Latest & Valid 210-260 Exam's Question and Answers 4 from Dumpcollection.com. 4

Answer: https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html NO.12 Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data? A. hack B. mitigation C. risk D. vulnerability Get Latest & Valid 210-260 Exam's Question and Answers 5 from Dumpcollection.com. 5

E. exploit Answer: D vulnerability A flaw or weakness in a system's design or implementation that could be exploited. NO.13 Which option is a characteristic of the RADIUS protocol? A. uses TCP B. offers multiprotocol support C. combines authentication and authorization in one process D. supports bi-directional challenge Answer: C Explanation: http://www.cisco.com/en/us/tech/tk59/technologies_tech_note09186a0080094e99.shtml Authentication and Authorization RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the client contain authorization information. This makes it difficult to decouple authentication and authorization. TACACS+ uses the AAA architecture, which separates AAA. This allows separate authentication solutions that can still use TACACS+ for authorization and accounting. For example, with TACACS+, it is possible to use Kerberos authentication and TACACS+ authorization and accounting. After a NAS authenticates on a Kerberos server, it requests authorization information from a TACACS+ server without having to re-authenticate. The NAS informs the TACACS+ server that it has successfully authenticated on a Kerberos server, and the server then provides authorization information. During a session, if additional authorization checking is needed, the access server checks with a TACACS+ server to determine if the user is granted permission to use a particular command. This provides greater control over the commands that can be executed on the access server while decoupling from the authentication mechanism. NO.14 Which command should be used to enable AAA authentication to determine if a user can access the privilege command level? A. aaa authentication enable level B. aaa authentication enable default local C. aaa authentication enable method default D. aaa authentication enable local https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/fsecur_r/srfathen.h tml NO.15 Refer to the exhibit. Get Latest & Valid 210-260 Exam's Question and Answers 6 from Dumpcollection.com. 6

With which NTP server has the router synchronized? A. 192.168.10.7 B. 108.61.73.243 C. 209.114.111.1 D. 132.163.4.103 E. 204.2.134.164 F. 241.199.164.101 Answer: A The output presented is generated by the show ntp association detail command. Attributes: + configured: This NTP clock source has been configured to be a server. This value can also be dynamic, where the peer/server was dynamically discovered. + our_master: The local client is synchronized to this peer + valid: The peer/server time is valid. The local client accepts this time if this peer becomes the master. http://www.cisco.com/c/en/us/support/docs/ip/network-time-protocol-ntp/116161-trouble-ntp- 00.html NO.16 Which statement about extended access lists is true? A. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destination B. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the source C. Extended access lists perform filtering that is based on destination and are most effective when applied to the source D. Extended access lists perform filtering that is based on source and are most effective when applied to the destination Get Latest & Valid 210-260 Exam's Question and Answers 7 from Dumpcollection.com. 7

http://www.ciscopress.com/articles/article.asp?p=1697887 Standard ACL 1) Able Restrict, deny & filter packets by Host Ip or subnet only. 2) Best Practice is put Std. ACL restriction near from Source Host/Subnet (Interface-In-bound). 3) No Protocol based restriction. (Only HOST IP). Extended ACL 1) More flexible then Standard ACL. 2) You can filter packets by Host/Subnet as well as Protocol/TCPPort/UDPPort. 3) Best Practice is put restriction near form Destination Host/Subnet. (Interface-Outbound) Get Latest & Valid 210-260 Exam's Question and Answers 8 from Dumpcollection.com. 8