CCNA security 210-260 - 70Q Flashcards
Which next-generation encryption algorithms support four variants? A. SHA2 B. SHA1 C. MD5 D. HMAC
Answer: A
Which type of malicious software can create a back-door into a device or network? A. Worm B. Trojan C. Virus D. Bot
Answer: B
Which attack can be prevented by OSPF authentication? A. Smurf attack B. IP spoofing attack C. Buffer overflow attack D. Denial of service attack
Answer: D
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption? A. AuthNoPriv B. NoAuthNoPriv C. NoauthPriv D. authpriv
Answer: A
What are two advanced features of the Cisco AMP solution for endpoints? (Choose two) A. Reflection B. Foresight C. Sandboxing D. Contemplation E. Reputation
Answer: CE
What does the DH group refer to: A. Length of key hashing B. Length of key exchange C. Tunnel lifetime key D. Length of key for authentication E. Length of key for encryption
Answer: B
In which two modes can the Cisco Web Security Appliance be deployed? (Choose two.)
A. Explicit proxy mode
B. As a transparent proxy using secure socket layer protocol
C. As a transparent proxy using the Hyper Text Transfer Protocol
D. As a transparent proxy using the Web Cache Communication Protocol
E. Explicit active mode
Answer:
AD
Which type of mechanism does Cisco FirePower deploy to protect against email threats that are detected moving across other networks? A. Reputation-based B. Signature-based C. Antivirus-scanning D. Policy-based
Answer:
A
Which action does standard antivirus software perform as part of the file-analysis process?
A. Execute the file in a simulated environment to examine its behavior
B. Examine the execution instructions in the file
C. Flag the unexamined file as a potential threat
D. Create a backup copy of the file
Answer:
B
When you edit an IPS sub-signature, what is the effect on the parent signature and the family of signatures?
A. The changes applies to the parent signature and the sub signature that you edit
B. The changes applies to the parent signature and the entire family of sub signature
C. The changes applies only to sub signature that are numbered sequentially after the sub signature that you edit
D. Other signature are unaffected; the changes applies only to the su signature that you edit
Answer:
D
Which two ESA services are available for incoming and outgoing mails? (Choose two.) A.DLP B. Reputación filter C. Content filter D. Anti-Dos E. Antispam
Answer:
CE
Which EAP method uses Protected Access Credentials? A.EAP-FAST B. EAP-TLS C. EAP-PEP D. EAP-GTC
Answer:
A
You have implemented a dynamic blacklist, using intelligence to block illicit network activity. However, the blacklist contains several approved connections that users must access for business purposes. Which action can you take to retain the blacklist while allowing users to access the approved sites?
A. Disable the dynamic blacklist and create a static blacklist in its place.
B. Create a whitelist and manually add the approved addresses.
C. Disable the dynamic blacklist and deny the specific address on a whitelist while permitting the others
D. Edit the dynamic blacklist to remove the approved addresses.
Answer:
B
Which two configuration can prevent VLAN hopping attack from attackers at VLAN 10? (Choose two)
A. Creating VLAN99 and using switchport trunk native vlan99 command on trunk ports
B. Enabling BPDU guard on all access ports
C. Using switchport trunk native vlan 10 command on trunk ports
D. Using switchport nonegotiate command on dynamic desirable ports
E. Applying ACL between VLANs
F. Using switchport mode access command on all host ports
Answer:
AF
What is a limitation of network-based IPS?
A. It is unable to monitor attacks across the entire network
B. It is most effective at the individual host level
C. It must be individually configured to support every operating system on the network
D. Large installations require numerous sensors to fully protect the network
Answer:
D
Which statement represents a difference between an access list on an ASA versus an access list on a router?
A. The ASA does not support extended access list
B. The ASA does not support number access list
C. The ASA does not ever use a Wildcard mask
D. The ASA does not support standard access list
Answer:
C
Which three descriptions of Radius are true? (Choose three)
A. It supports multiple transport protocols
B. It uses TCP as its transport protocol.
C. Only the password is encrypted
D. It uses UDP as its transport protocol.
E. It separates authentication, authorization and accounting
F. It combines authentication and authorization
Answer:
CDF
Which two models of ASA tend to be used in a data center? (Choose two) A. 5555X B. ASA services module C. 5585X D. 5540 E. 5520 F. 5512X
Answer:
BC
Which statement about interface and global access rules is true?
A. Interface access rules are processed before global access rules.
B. The implicit allow is processed after both the global and interface access rules
C. If an interface access rule is applied, the global access rule is ignored
D. Global access rules apply only to outbound traffic, but interface access rules can be applied in either direction
Answer:
A
Which security term refers to the likelihood that a weakness will be exploited to cause damage to an asset? A. Threat B. Vulnerability C. Risk D. Countermeasure
Answer:
C
Which two descriptions of TACACS+ are true? (Choose two)
A. It uses TCP as its transport protocol
B. It combines authentication and authorization
C. Only the password is encrypted
D. The TACACS+ header is unencrypted
E. It uses UDP as its transport protocol
Answer:
AD
Which terms refer to the electromagnetic interference that can radiate from network cables? A. Emanations B. Multimode distortion C. Gaussian distributions D. Doppler waves
Answers:
A
Which mitigation technology for web-based threats prevent the removal of confidential data from the network? A. AMP B. DLP C. DCA D. CTA
Answer:
B
What are two limitations of the self-zones policies on a zone-based firewall? (Choose two)
A. They restrict SNMP traffic
B. They are unable to implement application inspection
C. They are unable to block HTTPS traffic
D. They are unable to support HTTPS traffic
E. They are unable to perform rate limiting
Answer:
BE