What are the primary attack methods of VLAN hopping? (Choose two.)
A.
VoIP hopping
B.
Switch spoofing
C.
CAM-table overflow
D.
Double tagging
What are the primary attack methods of VLAN hopping? (Choose two.)
What are the primary attack methods of VLAN hopping? (Choose two.)
A.
VoIP hopping
B.
Switch spoofing
C.
CAM-table overflow
D.
Double tagging
Hello, 22th/11/2017 New 210-260 Exam Questions:
QUESTION
Which FirePOWER preprocessor engine is used to prevent SYN attacks?
A. Anomaly.
B. Rate-Based Prevention
C. Portscan Detection
D. Inline Normalization
Answer: B
QUESTION
What is the only permitted operation for processing multicast traffic on zone-based firewalls?
A. Stateful inspection of multicast traffic is supported only for the self-zone.
B. Stateful inspection of multicast traffic is supported only between the self-zone and the internal zone.
C. Only control plane policing can protect the control plane against multicast traffic.
D. Stateful inspection of multicast traffic is supported only for the internal zone
Answer: C
Explanation:
QUESTION
Which of encryption technology has the broadcast platform support to protect operating systems?
A. Middleware
B. Hardware
C. software
D. file-level
Answer: C
QUESTION
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?
A. holistic understanding of threats
B. graymail management and filtering
C. signature-based IPS
D. contextual analysis
Answer: D
QUESTION
Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user?
A. Trust
B. Block
C. Allow without inspection
D. Monitor
E. Allow with inspection
Answer: E
Explanation:
QUESTION
Which two next-generation encryption algorithms does Cisco recommends? (Choose two)
A. SHA-384
B. MD5
C. DH-1024
D. DES
E. AES
F. 3DES
Answer: AE
Explanation:
QUESTION
When an administrator initiates a device wipe command from the ISE, what is the immediate effect?
A. It requests the administrator to choose between erasing all device data or only managed corporate data.
B. It requests the administrator to enter the device PIN or password before proceeding with the operation
C. It immediately erases all data on the device.
D. It notifies the device user and proceeds with the erase operation
Answer: A
QUESTION
How does a device on a network using ISE receive its digital certificate during the new-device registration process?
A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server
B. The device request a new certificate directly from a central CA
C. ISE issues a pre-defined certificate from a local database
D. ISE issues a certificate from its internal CA server.
Answer: A
Explanation:
More: https://drive.google.com/drive/folders/0B75b5xYLjSSNV1RGaFJYZkxGWFk?usp=sharing