Category: Cisco >> 210-260 v.2
How is management traffic isolated on a Cisco ASR 1002? Question: How is management traffic isolated on a Cisco ASR 1002? Options: Traffic is isolated based upon how you configure routing on the device...
Which type of attack can exploit design flaws in the implementation of an application without going noticed? Question: Which type of attack can exploit design flaws in the implementation of an application without going...
Which statement about Cisco ACS authentication and authorization is true?The ACS console server provides the scalability, reliability and security a company requires to control and manage servers and other networked devices.Reference: http://www.uk.insight.com/content/dam/insight/EMEA/uk/shop/emerson/advanced-console-server.pdf (page 2)...
Which feature filters CoPP packets?Access control lists (ACLs) cannot be applied directly to the control plane subinterfaces. Instead, ACLs are used within the MQC policies (that is, class maps) and the service policy is...
Which wildcard mask is associated with a subnet mask of /27?On Cisco router, wildcard subnet mask is used in the following occasion* Defining subnet in ACL* Defining subnet member in OSPF areaReference: http://www.dslreports.com/faq/15216 Question:...
Which command do you enter to verify the status and settings of an IKE Phase 1 tunnel? Question: Which command do you enter to verify the status and settings of an IKE Phase 1...
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?This action prevents the attacker from communicating with the victim on any port. However, the attacker could...
An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?The BPDU guard feature is designed to allow network designers to keep the active...
What does the policy map do in CoPP? Question: What does the policy map do in CoPP? Options: defines service parameters defines the packet filter defines packet selection parameters defines the action to be...
In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon? Question: Which type of attack does an attacker send email messages that...