[Free] 2017(June) Ensurepass Passguide Cisco 210-260 Actual Tests 11-20

Ensurepass
2017 June Cisco Official New Released 210-260 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/210-260.html

Implementing Cisco Network Security (IINS)

QUESTION 11

Which three statements about host-based IPS are true? (Choose three.)

 

A.

It can view encrypted files.

B.

It can have more restrictive policies than network-based IPS.

C.

It can generate alerts based on behavior at the desktop level.

D.

It can be deployed at the perimeter.

E.

It uses signature-based policies.

F.

It works with deployed firewalls.

 

Correct Answer: ABC

 

 

QUESTION 12

What three actions are limitations when running IPS in promiscuous mode? (Choose three.)

 

A.

deny attacker

B.

deny packet

C.

modify packet

D.

request block connection

E.

request block host

F.

reset TCP connection

 

Correct Answer: ABC

 

 

 

QUESTION 13

When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?

 

A.

Deny the connection inline.

B.

Perform a Layer 6 reset.

C.

Deploy an antimalware system.

D.

Enable bypass mode.

 

Correct Answer: A

 

 

QUESTION 14

What is an advantage of implementing a Trusted Platform Module for disk encryption?

 

A.

It provides hardware authentication.

B.

It allows the hard disk to be transferred to another device without requiring re-encryption.dis

C.

It supports a more complex encryption algorithm than other disk-encryption technologies.

D.

It can protect against single points of failure.

 

Correct Answer: A

 

 

QUESTION 15

What is the purpose of the Integrity component of the CIA triad?

 

A.

to ensure that only authorized parties can modify data

B.

to determine whether data is relevant

C.

to create a process for accessing data

D.

to ensure that only authorized parties can view data

 

Correct Answer: A

 

 

QUESTION 16

In a security context, which action can you take to address compliance?

 

A.

Implement rules to prevent a vulnerability.

B.

Correct or counteract a vulnerability.

C.

Reduce the severity of a vulnerability.

D.

Follow directions from the security appliance manufacturer to remediate a vulnerability.

 

Correct Answer: A

 

 

QUESTION 17

Which type of secure connectivity does an extranet provide?

 

A.

other company networks to your company network

B.

remote branch offices to your company network

C.

your company network to the Internet

D.

new networks to your company network

 

Correct Answer: A

 

 

QUESTION 18

Which tool can an attacker use to attempt a DDoS attack?

 

A.

botnet

B.

Trojan horse

C.

virus

D.

adware

 

Correct Answer: A

 

 

QUESTION 19

What type of security support is provided by the Open Web Application Security Project?

 

A.

Education about common Web site vulnerabilities.

B.

A Web site security framework.

C.

A security discussion forum for Web site developers.

D.

Scoring of common vulnerabilities and exposures.

 

Correct Answer: A

 

 

QUESTION 20

What type of attack was the Stuxnet virus?

 

A.

cyber warfare

B.

hacktivism

C.

botnet

D.

social engineering

 

Correct Answer: A

100% Free Download!
—Download Free Demo:210-260 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 210-260 Full Exam PDF and VCE Q&As:236
—Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.06.01-2017.06.30]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE