400-101 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Examhttp://www.EnsurePass.com/400-101.html Question No.1Which two options are reasons for TCP starvation? (Choose two.)A.The use of tail dropB.The use of WREDC.Mixing TCP and UDP traffic in the same traffic classD.The use of TCP congestion controlCorrect Answer: CDExplanation:It is a general best practice to not mix TCP-based traffic with UDP-based traffic (especially Streaming-Video) within a single service-provider class because of the behaviors of these protocols during Read more […]

210-260 Real Exam Dumps Questions and answers 91-100

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.91Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end-user?A.TrustB.BlockC.Allow without inspectionD.MonitorE.Allow with inspectionCorrect Answer: EExplanation:Allow with Inspection allows all traffic except for malicious traffic from a particular end-user. The other options are too restrictive, too permissive, or don鈥檛 exist. Question No.92Refer to the Read more […]

210-260 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.81You have been tasked with blocking user access to websites that violate company policy, but the site use dynamic IP Addresses. What is the best practice URL filtering to solve the problem?A.Enable URL filtering and create a blacklist to block the websites that violate company policy.B.Enable URL filtering and create a whitelist to allow only the websites the company policy allow users to access.C.Enable URL filtering Read more […]

210-260 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.71What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?A.5 secondsB.10 secondsC.15 secondsD.20 secondsCorrect Answer: A Question No.72How does PEAP protect the EAP exchange?A.It encrypts the exchange using the client certificate.B.It validates the server-supplied certificate and then encrypts the exchange using the client certificate.C.It Read more […]

210-260 Real Exam Dumps Questions and answers 61-70

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.61A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.A.Enable URL filtering on the perimeterrouter and add the URLs you want to block to the router#39;s local URL list.B.Enable URL filtering on the perimeter firewall and add the URLs you want to allow to the router#39;s local URL list.C.Enable URL filtering Read more […]

210-260 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.51Which statement about communication over failover interfaces is true?A.All information that is sent over the failover and stateful failover interfaces is sent as clear text by default.B.All information that is sent over the failover interface is sent as clear text, but the stateful failover link is encrypted by default.C.All information that is sent over the failover and stateful failover interfaces is encrypted by Read more […]

210-260 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.31Refer to the exhibit. What is the effect of the given command sequence?A.It configures IKE Phase 1.B.It configures a site-to-site VPN tunnel.C.It configures a crypto policy with a key size of 14400.D.It configures IPSec Phase 2.Correct Answer: A Question No.32Refer to the exhibit. What is the effect of the given command sequence?A.It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination of Read more […]

210-260 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.21What type of algorithm uses the same key to encrypt and decrypt data?A.a symmetric algorithmB.an asymmetric algorithmC.a Public Key Infrastructure algorithmD.an IP security algorithmCorrect Answer: A Question No.22Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A.9B.6C.4D.3E.2Correct Answer: A Question No.23Refer to the exhibit. Which statement about the device time is Read more […]

210-260 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.11Which three statements about Cisco host-based IPS solutions are true? (Choose three.)A.It can view encrypted files.B.It can have more restrictive policies than network-based IPS.C.It can generate alerts based on behavior at the desktop level.D.It can be deployed at the perimeter.E.It uses signature-based policies.F.It works with deployed firewalls.Correct Answer: ABC Question No.12What three actions are limitations Read more […]

210-260 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Examhttp://www.EnsurePass.com/210-260.html Question No.1Which two services define cloud networks? (Choose two.)A.Infrastructure as a ServiceB.Platform as a ServiceC.Security as a ServiceD.Compute as a ServiceE.Tenancy as a ServiceCorrect Answer: AB Question No.2In which two situations should you use out-of-band management? (Choose two.)A.when a network device fails to forward packetsB.when you require ROMMON accessC.when management applications need concurrent access to Read more […]

210-255 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Examhttp://www.EnsurePass.com/210-255.html Question No.51Which type of analysis allows you to see how likely an exploit could affect your network?A.descriptiveB.casualC.probabilisticD.inferentialCorrect Answer: C Question No.52You receive an alert for malicious code that exploits Internet Explorer and runs arbitrary code on the site visitor machine. The malicous code is on an external site that is being visited by hosts on your network. Which user agent in the HTTP headers Read more […]

210-255 Real Exam Dumps Questions and answers 41-50

Get Full Version of the Examhttp://www.EnsurePass.com/210-255.html Question No.41Which process is being utilized when IPS events are removed to improve data integrity?A.data normalizationB.data availabilityC.data protectionD.data signatureCorrect Answer: A Question No.42Which description of a retrospective malvare detection is true?A.You use Wireshark to identify the malware source.B.You use historical information from one or more sources to identify the affected host or file.C.You use information Read more […]

210-255 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Examhttp://www.EnsurePass.com/210-255.html Question No.31Which regular expression matches quot;colorquot; and quot;colourquot;?A.col[0-9] ourB.colo?urC.colou?rD.]a-z]{7}Correct Answer: C Question No.32Which option is a misuse variety per VERIS enumerations?A.snoopingB.hackingC.theftD.assaultCorrect Answer: B Question No.33When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?A.HTTPS trafficB.TCP trafficC.HTTP Read more […]

210-255 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Examhttp://www.EnsurePass.com/210-255.html Question No.21What information from HTTP logs can be used to find a threat actor?A.refererB.IP addressC.user-agentD.URLCorrect Answer: B Question No.22Which two HTTP header fields relate to intrusion analysis? (Choose two).A.user-agentB.hostC.connectionD.languageE.handshake typeCorrect Answer: AB Question No.23During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve Read more […]

Pages: Prev 1 2 3 4 5 6 7 8 9 10 ... 1312 1313 1314 Next
Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com