Get Full Version of the Exam
http://www.EnsurePass.com/210-260.html
Question No.11
Which three statements about Cisco host-based IPS solutions are true? (Choose three.)
-
It can view encrypted files.
-
It can have more restrictive policies than network-based IPS.
-
It can generate alerts based on behavior at the desktop level.
-
It can be deployed at the perimeter.
-
It uses signature-based policies.
-
It works with deployed firewalls.
Correct Answer: ABC
Question No.12
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
-
deny attacker
-
deny packet
-
modify packet
-
request block connection
-
request block host
-
reset TCP connection
Correct Answer: ABC
Question No.13
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
-
Deny the connection inline.
-
Perform a Layer 6 reset.
-
Deploy an antimalware system.
-
Enable bypass mode.
Correct Answer: A
Question No.14
What is an advantage of implementing a Trusted Platform Module for disk encryption?
-
It provides hardware authentication.
-
It allows the hard disk to be transferred to another device without requiring re-encryption.dis
-
It supports a more complex encryption algorithm than other disk-encryption technologies.
-
It can protect against single points of failure.
Correct Answer: A
Question No.15
What is the purpose of the Integrity component of the CIA triad?
-
to ensure that only authorized parties can modify data
-
to determine whether data is relevant
-
to create a process for accessing data
-
to ensure that only authorized parties can view data
Correct Answer: A
Question No.16
In a security context, which action can you take to address compliance?
-
Implement rules to prevent a vulnerability.
-
Correct or counteract a vulnerability.
-
Reduce the severity of a vulnerability.
-
Follow directions from the security appliance manufacturer to remediate a vulnerability.
Correct Answer: A
Question No.17
Which type of secure connectivity does an extranet provide?
-
other company networks to your company network
-
remote branch offices to your company network
-
your company network to the Internet
-
new networks to your company network
Correct Answer: A
Question No.18
Which tool can an attacker use to attempt a DDoS attack?
-
botnet
-
Trojan horse
-
virus
-
adware
Correct Answer: A
Question No.19
What type of security support is provided by the Open Web Application Security Project?
-
Education about common Web site vulnerabilities.
-
A Web site security framework.
-
A security discussion forum for Web site developers.
-
Scoring of common vulnerabilities and exposures.
Correct Answer: A
Question No.20
What type of attack was the Stuxnet virus?
-
cyber warfare
-
hacktivism
-
botnet
-
social engineering
Correct Answer: A
Get Full Version of the Exam
210-260 Dumps
210-260 VCE and PDF