210-260 Dump Flashcards
Which three ESP fields can be encrypted during transmission?
Padding
Pad Length
Next Header
What mechanism does asymmetric cryptography use to secure data?
a public/private key pair
Which feature allows a dynamic PAT pool to select the next address in the PAT pool instead of the next port of an existing address?
round robin
Which label is given to a person who uses existing computer scripts to hack into computers lacking the expertise to write their own?
script kiddy
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class?
pass
inspect
drop
Which type of security control is defense-in-depth?
Threat mitigation
Which statement about a PVLAN isolated port configured on a switch is true?
The isolated port can communicate only with the promiscuous port
Which statement about Cisco ACS authentication and authorization is true?
ACS servers can be clustered to provide scalability
If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?
The supplicant will fail to advance beyond the webauth method
What configure mode you used for the command ip ospf authentication-key c1$c0?
interface
Which two features are commonly use CoPP and CPPr to protect the control plane?
QoS Traffic classification
What is one requirement for locking a wired or wireless device from ISE?
The ISE agent must be installed on the device
Which three statements are characteristics of DHCP Spoofing?
Arp Poisoning modify traffic in transit used to perform man-in-the-middle attack
Which statement correctly describes the function of a private VLAN?
a private VLAN partitions the layer 2 broadcast domain of a VLAN into subdomains
Which feature allows from dynamic NAT pool to choose next IP address and not a port on a used IP address?
round robin
Which type of encryption technology has the broadcast platform support?
Software
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
deny the connection inline
Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS Wizard?
Select the interface to apply the IPS rule Select the traffic flow direction that should be applied by the IPS rule Specify the signature file and the Cisco public key Specify the configuration location and select the category of signatures to be applied to the selected interface
An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?
The switch could become the root bridge
What is the effect of the given command sequence?
It configures IKE Phase 1
Which 2 NAT types allows only objects or groups to reference an IP address?
dynamic NAT
static NAT
Which FirePOWER preprocessor engine is used to prevent SYN attacks?
Rate-Based Prevention
What is the advantage of implementing a Trusted Platform Module for disk encryption?
It provides hardware authentication
What is the Cisco preferred countermeasure to mitigate CAM overflows?
Dynamic port security