Get Full Version of the Exam
http://www.EnsurePass.com/210-260.html
Question No.11
Which three statements about Cisco host-based IPS solutions are true? (Choose three.)
A. |
It can view encrypted files. |
B. |
It can have more restrictive policies than network-based IPS. |
C. |
It can generate alerts based on behavior at the desktop level. |
D. |
It can be deployed at the perimeter. |
E. |
It uses signature-based policies. |
F. |
It works with deployed firewalls. |
Correct Answer: ABC
Question No.12
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
A. |
deny attacker |
B. |
deny packet |
C. |
modify packet |
D. |
request block connection |
E. |
request block host |
F. |
reset TCP connection |
Correct Answer: ABC
Question No.13
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
A. |
Deny the connection inline. |
B. |
Perform a Layer 6 reset. |
C. |
Deploy an antimalware system. |
D. |
Enable bypass mode. |
Correct Answer: A
Question No.14
What is an advantage of implementing a Trusted Platform Module for disk encryption?
A. |
It provides hardware authentication. |
B. |
It allows the hard disk to be transferred to another device without requiring re-encryption.dis |
C. |
It supports a more complex encryption algorithm than other disk-encryption technologies. |
D. |
It can protect against single points of failure. |
Correct Answer: A
Question No.15
What is the purpose of the Integrity component of the CIA triad?
A. |
to ensure that only authorized parties can modify data |
B. |
to determine whether data is relevant |
C. |
to create a process for accessing data |
D. |
to ensure that only authorized parties can view data |
Correct Answer: A
Question No.16
In a security context, which action can you take to address compliance?
A. |
Implement rules to prevent a vulnerability. |
B. |
Correct or counteract a vulnerability. |
C. |
Reduce the severity of a vulnerability. |
D. |
Follow directions from the security appliance manufacturer to remediate a vulnerability. |
Correct Answer: A
Question No.17
Which type of secure connectivity does an extranet provide?
A. |
other company networks to your company network |
B. |
remote branch offices to your company network |
C. |
your company network to the Internet |
D. |
new networks to your company network |
Correct Answer: A
Question No.18
Which tool can an attacker use to attempt a DDoS attack?
A. |
botnet |
B. |
Trojan horse |
C. |
virus |
D. |
adware |
Correct Answer: A
Question No.19
What type of security support is provided by the Open Web Application Security Project?
A. |
Education about common Web site vulnerabilities. |
B. |
A Web site security framework. |
C. |
A security discussion forum for Web site developers. |
D. |
Scoring of common vulnerabilities and exposures. |
Correct Answer: A
Question No.20
What type of attack was the Stuxnet virus?
A. |
cyber warfare |
B. |
hacktivism |
C. |
botnet |
D. |
social engineering |
Correct Answer: A
Get Full Version of 210-260 Dumps