[Free] 2019(Nov) EnsurePass Cisco 210-260 Dumps with VCE and PDF 11-20

Get Full Version of the Exam
http://www.EnsurePass.com/210-260.html

Question No.11

Which three statements about Cisco host-based IPS solutions are true? (Choose three.)

  1. It can view encrypted files.

  2. It can have more restrictive policies than network-based IPS.

  3. It can generate alerts based on behavior at the desktop level.

  4. It can be deployed at the perimeter.

  5. It uses signature-based policies.

  6. It works with deployed firewalls.

Correct Answer: ABC

Question No.12

What three actions are limitations when running IPS in promiscuous mode? (Choose three.)

  1. deny attacker

  2. deny packet

  3. modify packet

  4. request block connection

  5. request block host

  6. reset TCP connection

Correct Answer: ABC

Question No.13

When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?

  1. Deny the connection inline.

  2. Perform a Layer 6 reset.

  3. Deploy an antimalware system.

  4. Enable bypass mode.

Correct Answer: A

Question No.14

What is an advantage of implementing a Trusted Platform Module for disk encryption?

  1. It provides hardware authentication.

  2. It allows the hard disk to be transferred to another device without requiring re-encryption.dis

  3. It supports a more complex encryption algorithm than other disk-encryption technologies.

  4. It can protect against single points of failure.

Correct Answer: A

Question No.15

What is the purpose of the Integrity component of the CIA triad?

  1. to ensure that only authorized parties can modify data

  2. to determine whether data is relevant

  3. to create a process for accessing data

  4. to ensure that only authorized parties can view data

Correct Answer: A

Question No.16

In a security context, which action can you take to address compliance?

  1. Implement rules to prevent a vulnerability.

  2. Correct or counteract a vulnerability.

  3. Reduce the severity of a vulnerability.

  4. Follow directions from the security appliance manufacturer to remediate a vulnerability.

Correct Answer: A

Question No.17

Which type of secure connectivity does an extranet provide?

  1. other company networks to your company network

  2. remote branch offices to your company network

  3. your company network to the Internet

  4. new networks to your company network

Correct Answer: A

Question No.18

Which tool can an attacker use to attempt a DDoS attack?

  1. botnet

  2. Trojan horse

  3. virus

  4. adware

Correct Answer: A

Question No.19

What type of security support is provided by the Open Web Application Security Project?

  1. Education about common Web site vulnerabilities.

  2. A Web site security framework.

  3. A security discussion forum for Web site developers.

  4. Scoring of common vulnerabilities and exposures.

Correct Answer: A

Question No.20

What type of attack was the Stuxnet virus?

  1. cyber warfare

  2. hacktivism

  3. botnet

  4. social engineering

Correct Answer: A

Get Full Version of the Exam
210-260 Dumps
210-260 VCE and PDF