PrepAway - Latest Free Exam Questions & Answers

One Comment on “What are the primary attack methods of VLAN hopping?

  1. Johanna Konig says:

    Hello, 22th/11/2017 New 210-260 Exam Questions:

    QUESTION
    Which FirePOWER preprocessor engine is used to prevent SYN attacks?

    A. Anomaly.
    B. Rate-Based Prevention
    C. Portscan Detection
    D. Inline Normalization

    Answer: B

    QUESTION
    What is the only permitted operation for processing multicast traffic on zone-based firewalls?

    A. Stateful inspection of multicast traffic is supported only for the self-zone.
    B. Stateful inspection of multicast traffic is supported only between the self-zone and the internal zone.
    C. Only control plane policing can protect the control plane against multicast traffic.
    D. Stateful inspection of multicast traffic is supported only for the internal zone

    Answer: C
    Explanation:

    QUESTION
    Which of encryption technology has the broadcast platform support to protect operating systems?

    A. Middleware
    B. Hardware
    C. software
    D. file-level

    Answer: C

    QUESTION
    Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attack?

    A. holistic understanding of threats
    B. graymail management and filtering
    C. signature-based IPS
    D. contextual analysis

    Answer: D

    QUESTION
    Which Sourfire secure action should you choose if you want to block only malicious traffic from a particular end-user?

    A. Trust
    B. Block
    C. Allow without inspection
    D. Monitor
    E. Allow with inspection

    Answer: E
    Explanation:

    QUESTION
    Which two next-generation encryption algorithms does Cisco recommends? (Choose two)

    A. SHA-384
    B. MD5
    C. DH-1024
    D. DES
    E. AES
    F. 3DES

    Answer: AE
    Explanation:

    QUESTION
    When an administrator initiates a device wipe command from the ISE, what is the immediate effect?

    A. It requests the administrator to choose between erasing all device data or only managed corporate data.
    B. It requests the administrator to enter the device PIN or password before proceeding with the operation
    C. It immediately erases all data on the device.
    D. It notifies the device user and proceeds with the erase operation

    Answer: A

    QUESTION
    How does a device on a network using ISE receive its digital certificate during the new-device registration process?

    A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server
    B. The device request a new certificate directly from a central CA
    C. ISE issues a pre-defined certificate from a local database
    D. ISE issues a certificate from its internal CA server.

    Answer: A
    Explanation:

    More: https://drive.google.com/drive/folders/0B75b5xYLjSSNV1RGaFJYZkxGWFk?usp=sharing




    0



    0

Leave a Reply