Dumpsdownload Cisco Exam 210-260 Dumps - PowerPoint PPT Presentation

Loading...

PPT – Dumpsdownload Cisco Exam 210-260 Dumps PowerPoint presentation | free to download - id: 8399cf-ZWE0M



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

Dumpsdownload Cisco Exam 210-260 Dumps

Description:

We are providing pdf files of Cisco 210-260 CCNA Security.Dumpsdownload providing real 210-260 exam question answers in PDF format.You can use our Dumpsdownload 210-260 dumps and pass your exam easily.We are providing 100% exam passing guarantee and money back guarantee. – PowerPoint PPT presentation

Number of Views:6

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Dumpsdownload Cisco Exam 210-260 Dumps


1
CCNA Security Exam 210-260 http//dumpsdownload.c
om/210-260-questions-pdf.html
2
  • Question 1
  • What type of packet creates and performs network
    operations on a network device?
  • control plane packets
  • data plane packets
  • management plane packets
  • services plane packets
  • Answer A
  • Question 2
  • What is an advantage of implementing a Trusted
    Platform Module for disk encryption?
  • It provides hardware authentication.
  • It allows the hard disk to be transferred to
    another device without requiring re- encryption.
    dis
  • It supports a more complex encryption algorithm
    than other disk- encryption technologies.
  • It can protect against single points of failure.
  • Answer A
  • Question 3

3
  • Question 4
  • What is the effect of the send-lifetime local
    235900 31 December 31 2013 infinite command?
  • It configures the device to begin transmitting
    the authentication key to other devices at
    000000 local time on January 1, 2014 and
    continue using the key indefinitely.
  • It configures the device to begin transmitting
    the authentication key to other devices at
    235900 local time on December 31, 2013 and
    continue using the key indefinitely.
  • It configures the device to begin accepting the
    authentication key from other devices
    immediately and stop accepting the key at
    235900 local time on December 31, 2013.
  • It configures the device to generate a new
    authentication key and transmit it to other
    devices at 235900 local time on December 31,
    2013.
  • It configures the device to begin accepting the
    authentication key from other devices at
    235900 local time on December 31, 2013 and
    continue accepting the key indefinitely.
  • It configures the device to begin accepting the
    authentication key from
  • other devices at 000000 local time on January
    1, 2014 and continue accepting the key
    indefinitely.
  • Answer B
  • Question 5
  • What type of algorithm uses the same key to
    encrypt and decrypt data?
  • a symmetric algorithm
  • an asymmetric algorithm
  • a Public Key Infrastructure algorithm
  • an IP security algorithm
  • Answer A

4
  • Question 6
  • What type of security support is provided by the
    Open Web Application Security Project?
  • Education about common Web site vulnerabilities.
  • A Web site security framework.
  • A security discussion forum for Web site
    developers.
  • Scoring of common vulnerabilities and exposures.
  • Answer A
  • Question 7
  • What is one requirement for locking a wired or
    wireless device from ISE?
  • The ISE agent must be installed on the device.
  • The device must be connected to the network when
    the lock command is executed.
  • The user must approve the locking action.
  • The organization must implement an acceptable use
    policy allowing device locking.
  • Answer A
  • Question 8

5
  • a public/private key pair
  • shared secret keys
  • an RSA nonce
  • an MD5 hash
  • Answer A
  • Question 10
  • Which statement about IOS privilege levels is
    true?
  • Each privilege level supports the commands at its
    own level and all levels below it.
  • Each privilege level supports the commands at its
    own level and all levels above it.
  • Privilege-level commands are set explicitly for
    each user.
  • Each privilege level is independent of all other
    privilege levels.
  • Answer A

CCNA Security Exam 210-260 http//dumpsdownload.c
om/210-260-questions-pdf.html
About PowerShow.com