Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
A. AES
B. 3DES
C. DES
D. MD5
E. DH-1024
F. SHA-384
Answer: A,F
Question No : 2
Drag the recommendations on the left to the Cryptographic Algorithms on the right. Options
will be used more than once.
Answer:
Explanation:
DES = Avoid
3DES = Legacy
MD5 = Avoid
SHA-1 = Legacy
HMAC-MD5 = Legacy
https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
Cisco 210-260 Exam 100% Passing Guarantee - Cisco 210-260 Study Tips Dumps4Download.us
Question No : 3
Which security measures can protect the control plane of a Cisco router? (Choose two.)
A. CCPr
B. Parser views
C. Access control lists
D. Port security
E. CoPP
Answer: A,E
Question No : 4
Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic
path?
A. Unidirectional Link Detection
B. Unicast Reverse Path Forwarding
C. TrustSec
D. IP Source Guard
Answer: B
Cisco 210-260 Certifications With 100% Passing - Cisco 210-260 Updated Dumps
Question No : 5
Refer to the exhibit.
All ports on switch 1 have a primary VLAN of 300. Which devices can host 1 reach?
A. Host 2
B. Server
C. Host 4
D. Other devices within VLAN 303
Answer: B
Question No : 6
Which two options are the primary deployment models for mobile device management? (Choose two)
A. Single-site
B. hybrid cloud-based
C. on-permises
D. Cloud based
E. Multisite
Answer: C,D
Explanation:
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_A
ccess/BYOD_Design_Guide/BYOD_MDM_Int.pdf
Preparing Tips For Cisco 210-260 Final Exam - 210-260 Dumps PDF Dumps4download
Question No : 7
Where OAKLEY and SKEME come to play?
A. IKE
B. ISAKMP
C. DES
Answer: A
Question No : 8
The stealing of confidential information of a company comes under the scope of
A. Reconnaissance
B. Spoofing attack
C. Social Engineering
D. Denial of Service
Answer: C
Pass 210-260 Exam In First Attempt - Cisco 210-260 Real Exam Questions
Question No : 9
Which two authentication types does OSPF support? (Choose two.)
A. plaintext
B. MD5
C. HMAC
D. AES 256
E. SHA-1
F. DES
Answer: A,B
Question No : 10
Which security term refers to a person, property, or data of value to a company?
A. Risk
B. Asset
C. Threat prevention
D. Mitigation technique
Answer: B






No comments:
Post a Comment