Cisco CCNA Security Exam Dumps For 210-260

By | November 28, 2019

You do need verified CCNA Security exam questions to get skills of Implementing Cisco security network solutions and these skills help you to pass 210-260 exam. 

Try it Latest DumpsSchool 210-260 Exam dumps. Buy Full File here: https://www.dumpsschool.com/210-260-exam-dumps.html (502 As Dumps)

Download the DumpsSchool 210-260 braindumps from Google Drive: https://drive.google.com/file/d/1OLgDbCqeAs1x3q7eiGn25-G5lDunbsJv/view (FREE VERSION!!!)

Question No. 1

Which type of firewall can serve as the intermediary between a client and a server?

Answer: D

Question No. 2

Which component offers a variety of security solutions, including firewall, IPS, VPN, antispyware, antivirus, and antiphishing features?

Answer: A

Question No. 3

Which type of encryption technology has the broadest platform support to protect operating systems?

Answer: A

Much commercial and free software enables you to encrypt files in an end-user workstation or mobile device.

The following are a few examples of free solutions:

+ GPG: GPG also enables you to encrypt files and folders on a Windows, Mac, or Linux system. GPG is free.

+ The built-in MAC OS X Disk Utility: D isk Utility enables you to create secure disk images by encrypting files with AES 128-bit or AES 256-bit encryption.

+ TrueCrypt: A free encryption tool for Windows, Mac, and Linux systems.

+ AxCrypt: A f ree Windows-only file encryption tool.

+ BitLocker: Full disk encryption feature included in several Windows operating systems.

+ Many Linux distributions such as Ubuntu: A llow you to encrypt the home directory of a user with built-in utilities.

+ MAC OS X FileVault: Supports full disk encryption on Mac OS X systems.

The following are a few examples of commercial file encryption software:

+ Symantec Endpoint Encryption

+ PGP Whole Disk Encryption

+ McAfee Endpoint Encryption (SafeBoot)

+ Trend Micro Endpoint Encryption

Source: Cisco Official Certification Guide, Encrypting Endpoint Data at Rest, p.501

Question No. 4

Which description of the nonsecret numbers that are used to start a Diffie-Hellman exchange is true?

Answer: D

Question No. 5

Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?

Answer: C

Question No. 6

What are the primary attack methods of VLAN hopping? (Choose two.)

Answer: B, D

VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible. There are two primary methods of VLAN hopping: switch spoofing and double tagging.

+ In a switch spoofing attack, an attacking host imitates a trunking switch by speaking the tagging and trunking protocols (e.g. Multiple VLAN Registration Protocol, IEEE 802.1Q, Dynamic Trunking Protocol) used in maintaining a VLAN. Traffic for multiple VLANs is then accessible to the attacking host.

+ In a double tagging attack, an attacking host connected on a 802.1q interface prepends two VLAN tags to packets that it transmits.

Source: https://en.wikipedia.org/wiki/VLAN_hopping

Question No. 7

Which two authentication types does OSPF support? (Choose two.)

Answer: A, B

Question No. 8

Refer to the exhibit.

Which statement about the device time is true?

Answer: A

Remember: The [.] at the beginning of the time tells us the NTP process has last contact with its servers. We know the time is authoritative because there would be a [*] at the beginning if not.

210-260 Dumps Google Drive: (Limited Version!!!)
https://drive.google.com/file/d/1OLgDbCqeAs1x3q7eiGn25-G5lDunbsJv/view

Related Certification: https://www.dumpsschool.com/ccna-security-questions.html