210-260 CCNA Security - IINS Exam Questions with Answers - Q46 to Q60 Question 46. Which statement about personal firewalls is true? A. They can protect a system by denying probing requests. B. They are resilient against kernel attacks. C. They can protect email messages and private documents in a similar way to a VPN. D. They can protect the network against … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q31 to Q45
210-260 CCNA Security - IINS Exam Questions with Answers - Q31 to Q45 Question 31. Refer to the exhibit. What is the effect of the given command sequence? A. It configures IKE Phase 1. B. It configures a site-to-site VPN tunnel. C. It configures a crypto policy with a key size of 14400. D. It configures IPSec Phase 2. Correct Answer: A Section: … [Read more...]
210-260 CCNA Security – IINS Exam New Questions Added
210-260 CCNA Security - IINS Exam New Questions Added Question 1. Referring to CIA, where would a hash-only make more sense. A. Data at Rest B. ... C. ... D. ... Correct Answer: A Section: (none) Explanation Question 2. Phishing method on the phone. A. vishing B. ... C. ... D. ... Correct Answer: A Section: (none) Explanation Question 3. At which … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q226 to Q249
210-260 CCNA Security - IINS Exam Questions with Answers - Q226 to Q249 Question 226. When is “Deny all” policy an exception in Zone Based Firewall A. traffic traverses 2 interfaces in same zone B. traffic sources from router via self zone C. traffic terminates on router via self zone D. traffic traverses 2 interfaces in different zones E. traffic terminates on router … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q211 to Q225
210-260 CCNA Security - IINS Exam Questions with Answers - Q211 to Q225 Question 211. What encryption technology has broadest platform support A. hardware B. middleware C. Software D. File level Correct Answer: C Section: (none) Explanation Question 212. With which preprocesor do you detect incomplete TCP handshakes A. ? B. rate based prevention C. ? D. … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q196 to Q210
210-260 CCNA Security - IINS Exam Questions with Answers - Q196 to Q210 Question 196. Security well known terms Choose 2 A. Trojan B. Phishing C. Something LC D. Ransomware Correct Answer: BD Section: (none) Explanation BD The following are the most common types of malicious software: + Computer viruses + Worms + Mailers and mass-mailer worms + Logic … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q181 to Q195
210-260 CCNA Security - IINS Exam Questions with Answers - Q181 to Q195 Question 181. Which security term refers to a person, property, or data of value to a company? A. Risk B. Asset C. Threat prevention D. Mitigation technique Correct Answer: B Section: (none) Explanation BD This is an exact question from the Cisco Official Certification Guide … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q166 to Q180
210-260 CCNA Security - IINS Exam Questions with Answers - Q166 to Q180 Question 166. How can FirePOWER block malicious email attachments? A. It forwards email requests to an external signature engine. B. It scans inbound email messages for known bad URLs. C. It sends the traffic through a file policy. D. It sends an alert to the administrator to verify suspicious email … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q151 to Q165
210-260 CCNA Security - IINS Exam Questions with Answers - Q151 to Q165 Question 151. Which statement about IOS privilege levels is true? A. Each privilege level supports the commands at its own level and all levels below it. B. Each privilege level supports the commands at its own level and all levels above it. C. Privilege-level commands are set explicitly for each … [Read more...]
210-260 CCNA Security – IINS Exam Questions with Answers – Q136 to Q150
210-260 CCNA Security - IINS Exam Questions with Answers - Q136 to Q150 Question 136. Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover? (Choose two) A. advanced persistent threat B. targeted malware C. drive-by spyware D. … [Read more...]