This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Fri Nov 22 3:36:11 2024 / +0000 GMT ___________________________________________________ Title: [2016 NEW][Braindump2go] CCNA Security 210-260 Book Free Download --------------------------------------------------- 2016 NEW CCNA Security 210-260 Exam Questions & 210-260 Dump Released Today!2016 NEW ADDED 210-260 Exam Questions Free Share: QUESTION 131Which three statements about Cisco host-based IPS solution are true? (Choose three) A.    It work with deployed firewalls.B.    It can be deployed at the perimeterC.    It uses signature-based policiesD.    It can have more restrictive policies than network-based IPSE.    It can generate alerts based on behavior at the desktop levelF.    It can view encrypted files Answer: DEFExplanation:The key word here is 'Cisco', and Cisco's host-based IPS, CSA, is NOT signature-based and CAN view encrypted files. QUESTION 132What are two users of SIEM software? (Choose two) A.    performing automatic network auditsB.    configuring firewall and IDS devicesC.    alerting administrators to security events in real timeD.    scanning emails for suspicious attachmentsE.    collecting and archiving syslog data Answer: CEExplanation:The other choices are not functions of SIEM software. QUESTION 133If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet? A.    the ASA will apply the actions from only the last matching class maps it finds for the feature type.B.    the ASA will apply the actions from all matching class maps it finds for the feature type.C.    the ASA will apply the actions from only the most specific matching class map it finds for the feature type.D.    the ASA will apply the actions from only the first matching class maps it finds for the feature type Answer: DExplanation:If it matches a class map for a given feature type, it will NOT attempt to match to any subsequent class maps. QUESTION 134What statement provides the best definition of malware? A.    Malware is tools and applications that remove unwanted programs.B.    Malware is a software used by nation states to commit cyber-crimes.C.    Malware is unwanted software that is harmful or destructiveD.    Malware is a collection of worms, viruses and Trojan horses that is distributed as a single..... Answer: C QUESTION 135What command can you use to verify the binding table status? A.    show ip dhcp snooping statisticsB.    show ip dhcp snooping databaseC.    show ip dhcp snooping bindingD.    show ip dhcp poolE.    show ip dhcp snoopingF.    show ip dhcp source binding Answer: B QUESTION 136Which FirePOWER preprocessor engine is used to prevent SYN attacks? A.    Anomaly.B.    Rate-Based PreventionC.    Portscan DetectionD.    Inline Normalization Answer: B QUESTION 137What is the only permitted operation for processing multicast traffic on zone-based firewalls? A.    Stateful inspection of multicast traffic is supported only for the self-zone.B.    Stateful inspection of multicast traffic is supported only between the self-zone and the internal zone.C.    Only control plane policing can protect the control plane against multicast traffic.D.    Stateful inspection of multicast traffic is supported only for the internal zone Answer: CExplanation:Stateful inspection of multicast traffic is NOT supported by Cisco Zone based firewalls OR Cisco Classic firewall. QUESTION 138Which of encryption technology has the broadcast platform support to protect operating systems? A.    MiddlewareB.    HardwareC.    softwareD.    file-level Answer: DExplanation:Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don't exist. QUESTION 139Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack? A.    holistic understanding of threatsB.    graymail management and filteringC.    signature-based IPSD.    contextual analysis Answer: D QUESTION 140Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user? A.    TrustB.    BlockC.    Allow without inspectionD.    MonitorE.    Allow with inspection Answer: EExplanation:Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don't exist. 2016 NEW CCNA Security 210-260 Exam Questions & 210-260 Dump 185Q Full Version Free Shared By Braindump2go: http://www.braindump2go.com/210-260.html --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2016-02-19 08:56:25 Post date GMT: 2016-02-19 08:56:25 Post modified date: 2016-02-19 08:56:25 Post modified date GMT: 2016-02-19 08:56:25 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com