Get Full Version of the Exam
http://www.EnsurePass.com/210-260.html
Question No.21
What type of algorithm uses the same key to encrypt and decrypt data?
-
a symmetric algorithm
-
an asymmetric algorithm
-
a Public Key Infrastructure algorithm
-
an IP security algorithm
Correct Answer: A
Question No.22
Refer to the exhibit. How many times was a read-only string used to attempt a write operation?
A.
9
B.
6
C.
4
D.
3
E.
2
Correct Answer: A
Question No.23
Refer to the exhibit. Which statement about the device time is true?
-
The time is authoritative, but the NTP process has lost contact with its servers.
-
The time is authoritative because the clock is in sync.
-
The clock is out of sync.
-
NTP is configured incorrectly.
-
The time is not authoritative.
-
Correct Answer: A
Question No.24
How does the Cisco ASA use Active Directory to authorize VPN users?
-
It queries the Active Directory server for a specific attribute for the specified user.
-
It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server.
-
It downloads and stores the Active Directory database to query for future authorization requests.
-
It redirects requests to the Active Directory server defined for the VPN group.
Correct Answer: A
Question No.25
Which statement about Cisco ACS authentication and authorization is true?
-
ACS servers can be clustered to provide scalability.
-
ACS can query multiple Active Directory domains.
-
ACS uses TACACS to proxy other authentication servers.
-
ACS can use only one authorization profile to allow or deny requests.
Correct Answer: A
Question No.26
Refer to the exhibit. If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?
-
The supplicant will fail to advance beyond the webauth method.
-
The switch will cycle through the configured authentication methods indefinitely.
-
The authentication attempt will time out and the switch will place the port into the unauthorized state.
-
The authentication attempt will time out and the switch will place the port into VLAN 101.
Correct Answer: A
Question No.27
Which EAP method uses Protected Access Credentials?
-
EAP-FAST
-
EAP-TLS
-
EAP-PEAP
-
EAP-GTC
Correct Answer: A
Question No.28
What is one requirement for locking a wired or wireless device from ISE?
-
The ISE agent must be installed on the device.
-
The device must be connected to the network when the lock command is executed.
-
The user must approve the locking action.
-
The organization must implement an acceptable use policy allowing device locking.
Correct Answer: A
Question No.29
What VPN feature allows traffic to exit the security appliance through the same interface it entered?
-
hairpinning
-
NAT
-
NAT traversal
-
split tunneling
Correct Answer: A
Question No.30
What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?
-
split tunneling
-
hairpinning
-
tunnel mode
-
transparent mode
Correct Answer: A
Get Full Version of the Exam
210-260 Dumps
210-260 VCE and PDF