Академический Документы
Профессиональный Документы
Культура Документы
An im
portant milestone toward your success in any Certification exam is a quali
ty 210-260 study material. Dumpsdownload.com has come up with an exc
eptional package of 210-260 braindumps to help you pass your certificatio
n exam in just 24 hours. Read More
210-260
Certification Provider: Cisco
Correct Answer: A
QUESTION 2
What is an advantage of implementing a Trusted Platform Module for
disk encryption?
Correct Answer: A
QUESTION 3
In what type of attack does an attacker virtually change a device's bur
ned-in address in an attempt to circumvent access lists and mask the
device's true identity?
A. gratuitous ARP
B. ARP poisoning
C. IP spoofing
D. MAC spoofing
Correct Answer: D
QUESTION 4
What type of algorithm uses the same key to encrypt and decr
ypt data?
A. a symmetric algorithm
B. an asymmetric algorithm
C. a Public Key Infrastructure algorithm
D. an IP security algorithm
Correct Answer: A
QUESTION 5
What is one requirement for locking a wired or wireless device from IS
E?
Correct Answer: A
QUESTION 6
What is the FirePOWER impact flag used for?
Correct Answer: A
QUESTION 6
What is the FirePOWER impact flag used for?
Correct Answer: A
QUESTION 8
Which statement about IOS privilege levels is true?
A. Each privilege level supports the commands at its own level and all
levels below it.
B. Each privilege level supports the commands at its own level and all
levels above it.
C. Privilege-level commands are set explicitly for each user.
D. Each privilege level is independent of all other privilege levels.
Correct Answer: A
QUESTION 9
Which Cisco product can help mitigate web-based attacks withi
n a network?
Correct Answer: B
QUESTION 10
Correct Answer: A