[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 101-110

Ensurepass    QUESTION 101 Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)   A. start-stop B. stop-record C. stop-only D. stop   Correct Answer: AC     QUESTION 102 What improvement does EAP-FASTv2 provide over EAP-FAST?   A. It support more secure encryption protocols. B. It allows multiple credentials to be passed in a single EAP exchange. C. It addresses security vulnerabilities Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 91-100

EnsurepassQUESTION 91 Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user?   A. Trust B. Block C. Allow without inspection D. Monitor E. Allow with inspection   Correct Answer: E Explanation: Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don’t exist.       QUESTION 92 Refer to the Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 81-90

EnsurepassQUESTION 81 You have been tasked with blocking user access to website that violate company policy, but the site use dynamic IP Addresses. What is the best practice URL filtering to solve the problem?   A. Enable URL filtering and create a blacklist to block the websites that violate company policy. B. Enable URL filtering and create a whitelist to allow only the websites the company policy allow users to access. C. Enable URL filtering and use URL categorization to allow Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 61-70

EnsurepassQUESTION 61 A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.   A. EnableURL filtering on the perimeterrouter and add the URLs you want to block to the router’s local URL list. B. Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router’s local URL list. C. EnableURL filtering on the perimeterrouter and add the URLs Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 71-80

EnsurepassQUESTION 71 What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?   A. 5 seconds B. 10 seconds C. 15 seconds D. 20 seconds   Correct Answer: A     QUESTION 72 How does PEAP protect EAP exchange?   A. It encrypts the exchange using the client certificate. B. It validates the server-supplied certificate and then encrypts the exchange using the client certificate. Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 51-60

EnsurepassQUESTION 51 Which statement about communication over failover interfaces is true?   A. All information that is sent over the failover and stateful failover interfaces is sent as clear text by default. B. All information that is sent over the failover interface is sent as clear text, but the stateful failover link is encrypted by default. C. All information that is sent over the failover and stateful failover interfaces is encrypted by default. D. User names, passwords, Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 41-50

EnsurepassQUESTION 41 What command can you use to verify the binding table status?   A. show ip dhcp snooping database B. show ip dhcp snooping binding C. show ip dhcp snooping statistics D. show ip dhcp pool E. show ip dhcp source binding F. show ip dhcp snooping   Correct Answer: A   QUESTION 42 If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use?   A. root guard B. EtherChannel guard C. loop Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 31-40

EnsurepassQUESTION 31 Refer to the exhibit. What is the effect of the given command sequence?     A. It configures IKE Phase 1. B. It configures a site-to-site VPN tunnel. C. It configures a crypto policy with a key size of 14400. D. It configures IPSec Phase 2. Correct Answer: A     QUESTION 32 Refer to the exhibit. What is the effect of the given command sequence?     A. It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 21-30

EnsurepassQUESTION 21 What type of algorithm uses the same key to encrypt and decrypt data?   A. a symmetric algorithm B. an asymmetric algorithm C. a Public Key Infrastructure algorithm D. an IP security algorithm   Correct Answer: A   QUESTION 22 Refer to the exhibit. How many times was a read-only string used to attempt a write operation?     A. 9 B. 6 C. 4 D. 3 E. 2   Correct Answer: A     QUESTION 23 Refer to the exhibit. Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 11-20

EnsurepassQUESTION 11 Which three statements about host-based IPS are true? (Choose three.)   A. It can view encrypted files. B. It can have more restrictive policies than network-based IPS. C. It can generate alerts based on behavior at the desktop level. D. It can be deployed at the perimeter. E. It uses signature-based policies. F. It works with deployed firewalls.   Correct Answer: ABC     QUESTION 12 What three actions are limitations when running IPS Read more […]

Continue reading


[Free] Download New Updated (April 2016) Cisco 210-260 Actual Tests 1-10

EnsurepassQUESTION 1 Which two services define cloud networks? (Choose two.)   A. Infrastructure as a Service B. Platform as a Service C. Security as a Service D. Compute as a Service E. Tenancy as a Service   Correct Answer: AB     QUESTION 2 In which two situations should you use out-of-band management? (Choose two.)   A. when a network device fails to forward packets B. when you require ROMMON access C. when management applications need concurrent Read more […]

Continue reading