Get Full Version of the Exam
http://www.EnsurePass.com/210-260.html
Question No.91
Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end-user?
A. |
Trust |
B. |
Block |
C. |
Allow without inspection |
D. |
Monitor |
E. |
Allow with inspection |
Correct Answer: E
Explanation:
Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don鈥檛 exist.
Question No.92
Refer to the exhibit. With which NTP server has the router synchronized?
A. |
192.168.10.7 |
B. |
108.61.73.243 |
C. |
209.114.111.1 |
D. |
204.2.134.164 |
E. |
132.163.4.103 |
F. |
241.199.164.101 |
Correct Answer: A
Question No.93
Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?
A. |
Unidirectional Link Detection |
B. |
Unicast Reverse Path Forwarding |
C. |
TrustSec |
D. |
IP Source Guard |
Correct Answer: B
Question No.94
Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)
A. |
Port security |
B. |
DHCP snooping |
C. |
IP source guard |
D. |
Dynamic ARP inspection |
Correct Answer: BD
Question No.95
Which type of security control is defense in depth?
A. |
Threat mitigation |
B. |
Risk analysis |
C. |
Botnet mitigation |
D. |
Overt and covert channels |
Correct Answer: A
Question No.96
When a company puts a security policy in place, what is the effect on the company鈥檚 business?
A. |
Minimizing risk |
B. |
Minimizing total cost of ownership |
C. |
Minimizing liability |
D. |
Maximizing compliance |
Correct Answer: A
Question No.97
What is the primary purpose of a defined rule in an IPS?
A. |
to detect internal attacks |
B. |
to define a set of actions that occur when a specific user logs in to the system |
C. |
to configure an event action that is pre-defined by the system administrator |
D. |
to configure an event action that takes place when a signature is triggered |
Correct Answer: D
Explanation: http://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/sec urity_manager/4-1/user/guide/CSMUserGuide_wrapper/ipsevact.pdf
Question No.98
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?
A. |
STP elects the root bridge |
B. |
STP selects the root port |
C. |
STP selects the designated port |
D. |
STP blocks one of the ports |
Correct Answer: A
Question No.99
Which option describes information that must be considered when you apply an access list to a physical interface?
A. |
Protocol used for filtering |
B. |
Direction of the access class |
C. |
Direction of the access group |
D. |
Direction of the access list |
Correct Answer: C
Question No.100
In which type of attack does an attacker send email message that ask the recipient to click a link such ashttps://www.cisco.net.cc/securelogs?
A. |
pharming |
B. |
phishing |
C. |
solicitation |
D. |
secure transaction |
Correct Answer: B
Get Full Version of 210-260 Dumps