QUESTION 101
Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)
A. |
start-stop |
B. |
stop-record |
C. |
stop-only |
D. |
stop |
Correct Answer: AC
QUESTION 102
What improvement does EAP-FASTv2 provide over EAP-FAST?
A. |
It support more secure encryption protocols. |
B. |
It allows multiple credentials to be passed in a single EAP exchange. |
C. |
It addresses security vulnerabilities found in the original protocol. |
D. |
It allows faster authentication by using fewer packets. |
Correct Answer: B
QUESTION 103
Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?
A. |
FlexConfig |
B. |
Device Manager |
C. |
Report Manager |
D. |
Health and Performance Monitor |
Correct Answer: D
QUESTION 104
If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?
A. |
The interface on both switches may shut down |
B. |
STP loops may occur |
C. |
The switch with the higher native VLAN may shut down |
D. |
The interface with the lower native VLAN may shut down |
Correct Answer: B
QUESTION 105
Refer to the following:
Username Engineer privilege 9 password 0 configure
Username Monitor privilege 8 password 0 vatcher
Username HelpDesk privilege 6 password help
Privilege exec level 6 show running
Privilege exec level 7show start-up
Privilege exec level 9 show configure terminal
Privilege exec level 10 interface
Which line in this configuration prevents the HelpDesk user from modifying the interface configuration?
A. |
Privilege exec level 9 show configure terminal |
B. |
Privilege exec level 7show start-up |
C. |
Privilege exec level 10 interface |
D. |
Username HelpDesk privilege 6 password help |
Correct Answer: A
QUESTION 106
By which kind of threat is the victim tricked into entering username and password information at a disguised website?
A. |
Spoofing |
B. |
Malware |
C. |
Spam |
D. |
Phishing |
A. |
To create customized policies. |
B. |
To detect unknown attacks. |
C. |
To normalize streams. |
D. |
To collect information about attacks. |
Correct Answer: D
QUESTION 108
Which statements about reflexive access lists are true? (Choose three.)
A. |
Reflexive access lists create a permanent ACE |
B. |
Reflexive access lists approximate session filtering using the established keyword |
C. |
Reflexive access lists can be attached to standard named IP ACLs |
D. |
Reflexive access lists support UDP sessions |
E. |
Reflexive access lists can be attached to extended named IP ACLs |
F. |
Reflexive access lists support TCP sessions |
Correct Answer: DEF
QUESTION 109
Which statement about IOS privilege levels is true?
A. |
Each privilege level is independent of all other privilege levels. |
B. |
Each privilege level supports the commands at its own level and all levels above it. |
C. |
Each privilege level supports the commands at its own level and all levels below it. |
D. |
Privilege-level commands are set explicitly for each user. |
Correct Answer: C
QUESTION 110
What are two users of SIEM software? (Choose two)
A. |
performing automatic network audits |
B. |
configuring firewall and IDS devices |
C. |
alerting administrators to security events in real time |
D. |
scanning emails for suspicious attachments |
E. |
collecting and archiving syslog data |
Correct Answer: CE
Free VCE & PDF File for Cisco 210-260 Real Exam
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …