210-260 Real Exam Dumps Questions and answers 91-100

Get Full Version of the Exam
http://www.EnsurePass.com/210-260.html

Question No.91

Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end-user?

A.

Trust

B.

Block

C.

Allow without inspection

D.

Monitor

E.

Allow with inspection

Correct Answer: E

Explanation:

Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don鈥檛 exist.

Question No.92

Refer to the exhibit. With which NTP server has the router synchronized?

image

A.

192.168.10.7

B.

108.61.73.243

C.

209.114.111.1

D.

204.2.134.164

E.

132.163.4.103

F.

241.199.164.101

Correct Answer: A

Question No.93

Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?

A.

Unidirectional Link Detection

B.

Unicast Reverse Path Forwarding

C.

TrustSec

D.

IP Source Guard

Correct Answer: B

Question No.94

Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)

A.

Port security

B.

DHCP snooping

C.

IP source guard

D.

Dynamic ARP inspection

Correct Answer: BD

Question No.95

Which type of security control is defense in depth?

A.

Threat mitigation

B.

Risk analysis

C.

Botnet mitigation

D.

Overt and covert channels

Correct Answer: A

Question No.96

When a company puts a security policy in place, what is the effect on the company鈥檚 business?

A.

Minimizing risk

B.

Minimizing total cost of ownership

C.

Minimizing liability

D.

Maximizing compliance

Correct Answer: A

Question No.97

What is the primary purpose of a defined rule in an IPS?

A.

to detect internal attacks

B.

to define a set of actions that occur when a specific user logs in to the system

C.

to configure an event action that is pre-defined by the system administrator

D.

to configure an event action that takes place when a signature is triggered

Correct Answer: D

Explanation: http://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/sec urity_manager/4-1/user/guide/CSMUserGuide_wrapper/ipsevact.pdf

Question No.98

When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?

A.

STP elects the root bridge

B.

STP selects the root port

C.

STP selects the designated port

D.

STP blocks one of the ports

Correct Answer: A

Question No.99

Which option describes information that must be considered when you apply an access list to a physical interface?

A.

Protocol used for filtering

B.

Direction of the access class

C.

Direction of the access group

D.

Direction of the access list

image

Correct Answer: C

Question No.100

In which type of attack does an attacker send email message that ask the recipient to click a link such ashttps://www.cisco.net.cc/securelogs?

A.

pharming

B.

phishing

C.

solicitation

D.

secure transaction

Correct Answer: B

Get Full Version of 210-260 Dumps

Tagged

Leave a Reply

Your email address will not be published. Required fields are marked *