Home > Share your CCNA Security Experience

Share your CCNA Security Experience

November 5th, 2015 Go to comments

Please share with us your experience after taking the CCNA Security 210-260 exam, your materials, the way you learned, your recommendations…

Comments (100) Comments
Comment pages
1 11 12 13 14 15 22 675
  1. Bolo
    December 30th, 2019

    @Anton

    This question in my notes has the following exhibit:
    nat (inside,any) dynamic interface

  2. gabbar
    December 30th, 2019

    @Anton

    Thank you and Happy new year. Good luck for your exam.

  3. Anton
    December 30th, 2019

    @Gabbar – thanks a lot!
    @Bolo – does that mean the firewall would do dynamic PAT hiding any IPs behind the IP address of the inside interface?

  4. x7x
    December 30th, 2019

    Using a stateful Packet firewall and given an inside ACL entry of permit ip 192.16 1.0 0.0.0.255 any, what
    would be the resulting dynamically configured ACL for the return traffic on the outside ACL?
    A. permit tcp host 172.16.16.10 eq 80 host 192.168.1.11 eq 2300
    B. permit ip 172.16.16.10 eq 80 192.168.1.0 0.0.0.255 eq 2300
    C. permit tcp any eq 80 host 192 168.1.11 eq 2300
    D. permit ip host 172.16.16.10 eq 80 host 192.168.1.0 0.0.0.255 eq 2300
    Correct Answer: A OR C?

  5. x7x
    December 30th, 2019

    ^ question 310 on Youki

  6. Gabbar
    December 30th, 2019

    @x7x

    A.
    permit tcp host 172.16.16.10 eq 80 host 192.168.1.11 eq 2300

  7. x7x
    December 30th, 2019

    thanks gabbar. another one im confused about is the following:

    In which two situations should you use in-band management? (Choose two.)
    A. When a network device fails to forward packets
    B. When management applications need concurrent access to the device
    C. When you require administrator access from multiple locations
    D. When you require ROMMON access
    E. When the control plane fails to respond

    don’t think the dumps have the right answer for this.

  8. Bolo
    December 30th, 2019

    @Anton

    It’s nat ( real_interface, mapped_interface ). Think that real_ interface is your inside local address and mapped_interface is inside global address. For example:

    asa(config)# object network inside-network
    asa(config-network-object)# subnet 10.10.10.0 255.255.255.0
    asa(config-network-object)# nat (inside,outside) dynamic interface

    means that inside network 10.10.10.0/24 is behind the outside interface. Keyword ‘any’ that appears in the exhibit means that traffic going from inside to any interface will be translated.

  9. gabbar
    December 31st, 2019

    @x7x

    A. when management applications need concurrent access to the device
    B. when you require administrator access from multiple locations

    As per my understanding these are correct

  10. Exam4Lead
    December 31st, 2019

    Get latest CCNA 200-260 exam real questions answers from https://www.exam4lead.com/cisco/210-2600-dumps.html and pass your exam in first attempt with 100% money back assurance.

  11. Anonymous
    December 31st, 2019

    thank you so much Exam4Lead i am passed in 210-260. :)

  12. Anton
    December 31st, 2019

    @Bolo – thank you for explaining

    From Yako pdf:
    Q2 Which three statements about host-based IPS are true? (Choose three)
    A. It can view encrypted files
    B. It can be deployed at the perimeter
    C. It uses signature-based policies
    D. It can have more restrictive policies than network-based IPS
    E. It works with deployed firewalls
    F. It can generate alerts based on behaviour at the desktop level.
    Answer: A, D, F

    Are these answers correct?

  13. NAZ
    December 31st, 2019

    my exam will be 6th January please if any information about 210-260(ccna security) exam questions, please update me.

  14. Anonymous
    January 1st, 2020

    dumps say BDF. But someone here suggested IPS is mentioned in best practice in the OCG and DHCP-snooping as additional security. can someone clarify?

    In which three cases does the ASA firewall permit inbound HTTP GET requests during normal operations? (Choose three)
    A. When matching ACL entries are configured
    B. when matching NAT entries are configured
    C. When the firewall requires strict HTTP inspection
    D. When the firewall reqdwauires HTTP inspection
    E. When Firewall Recieves a FIN packet
    F. When the firewall already has a TCP connection

    ABF?

  15. Anonymous
    January 1st, 2020

    Valid cisco dumps

    khagen.site

  16. x7x
    January 1st, 2020

    Passed the exam today with 981! Coachgreece and Anubis should be enough. but beware, dumps have many wrong answers. so go through the comments here and do your own research to get the right answers!

    @Bolo you deserve a special thanks man! bless you! happy new year!

  17. Harikrishnan A
    January 1st, 2020

    Hi

    Can anyone please share the coachgreece dump. i have anubis with me.

  18. Harikrishnan A
    January 1st, 2020

    @x7x – please share the coachgreece dump

  19. Harikrishnan A
    January 1st, 2020

    @Bolo – please share the coachgreece dump

  20. Anton
    January 1st, 2020

    @x7x – congrats and Happy New Year!!!
    @Harikrishnan A – the link has been shared few pages ago

    PassLeader [Oct-2019]:
    Q526 What is the main purpose of Control Plane Policing?
    A. to prevent exhaustion of route-processor resources
    B. to organise the egress packet queues
    C. to define traffic classes
    D. to maintain the policy map
    Answer: A

    C0achGreece:
    Q56 What is the main purpose of Control Plane Policing?
    A. to prevent exhaustion of route-processor resources.
    B. to define traffic classes.
    C. to organise the egress packet queues.
    D. to maintain the policy map.
    Answer: B

    I’m guessing there is a mistake in c0achGreece dump and the answer should be “A”?

  21. x7x
    January 1st, 2020

    Q526 What is the main purpose of Control Plane Policing?
    A. to prevent exhaustion of route-processor resources
    B. to organise the egress packet queues
    C. to define traffic classes
    D. to maintain the policy map

    A is the correct answer

  22. steve
    January 1st, 2020

    Bolo, you are just a wonderful and good fellow to be associated with, I read through most of the post here as regards the CCNA Security exam, despite the way people are asking same questions over and over again, you still took time to respond and still give them the right answers without you referring them to your previous post, I really commend you for such a great sacrifice and effort you put into this, it so amazing the way you have been assisting and advising people all around the world as regards this. You are a shinning star. keep it up bro.

  23. steve
    January 2nd, 2020

    same goes to Coach’s dump and all other good fellow on this site, that are helping out in anyform.

  24. Anonymous
    January 2nd, 2020

    Youki, you doing a great job out there do, appreciate all the time and effort you guys are putting into this.

  25. Hector
    January 2nd, 2020

    Hi, can anyone help me with these questions? Your help will be much appreciated. Thanks!

    Question 1
    Which statement about an ASA in transparent mode is true?
    A. It allows the use of dynamic NAT.
    B. It requires an IP address for each interface.
    C. It requires a management IP address.
    D. It supports OSPF.

    Question 2
    Which statements about smart tunnels on a Cisco firewall are true? (Choose two)
    A. Smart tunnels can be used by clients that do not have administrator privileges
    B. Smart tunnels support all operating systems
    C. Smart tunnels offer better performance than port forwarding
    D. Smart tunnels require the client to have the application installed locally

    Question 3
    Which IDS/IPS state misidentifies acceptable behavior as an attack?
    A. False positives
    B. False negative
    C. True positive
    D. True negative

    Question 4
    Which NAT type allows only objects or groups to reference an IP address?
    A. dynamic NAT
    B. dynamic PAT
    C. static NAT
    D. identity NAT

    Question 5
    If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two)
    A. The user will be prompted to authenticate using the enable password
    B. Authentication attempts to the router will be denied
    C. Authentication will use the router`s local database
    D. Authentication attempts will be sent to the TACACS+ server

  26. Rance
    January 2nd, 2020

    Anyone know whats the answer for this question?

    What is the maximum number of methods that can a single method list can contain?
    A. 4
    B. 3
    C. 2
    D. 5

  27. Anton
    January 2nd, 2020

    @x7x – thanks for confirming! I heard Anubis pdf has many incorrect answers which have been corrected in Youki’s pdf

    @Rance – answer A (have a look at CCNA Security 210-260 Official Cert Guide page48)

  28. Bolo
    January 2nd, 2020

    @Anton

    Yes, ADF. Answers are based on the book “Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)” from 2009, a guide for old version of this certification. There’s a chapter there talking about Cisco Security Agent – a host IPS solution that’s dead since 2010.

  29. Bolo
    January 2nd, 2020

    @x7x
    Congrats on passing!

    @Hector
    Q.1: A
    Q.2: AD – You will see AC answers too, but my answer is AD. Tunnels have better performance than plugins – not port forwarding. Also, smart tunnels are specifically configured for locally installed applications, so…
    Q.3: A
    Q.4: A
    Q.5: widely disputed question. We even labbed it. Depending on how you understand “server returns an error”, the answer is AD or BD.

  30. Anton
    January 2nd, 2020

    With regards to Q5 – that’s what I have found online:

    https://community.cisco.com/t5/other-security-subjects/what-is-in-method-list/td-p/52803

    ###########################################################
    The method list is the defined ways that you will try to authenticate/authorize/account for your users. In the example you list above, your method list contains tacacs+. Since you used the keyword default, this method list will be applied to any ppp connections terminating on this router. If you would have used a name, say dial-up, you would have to manually apply the method list to each interface for the ppp connections.

    Sometimes the tacacs+ server is not available and you do not want to just disconnect the user without trying some other way to authenticate the user. The following example will try tacacs+ first, then RADIUS, then local for authentication.

    aaa authentication ppp default tacacs+ radius local

    If tacacs+ returns a “error” message, it will move to the next method. It will not go to the next method if it returns “fail”.
    ###########################################################

    It appears to me there is a clear difference between “error” and “fail” and the Q5 is asking about “error” therefore the authentication would failover to the second method on the default list which is enable password.

  31. Anton
    January 2nd, 2020

    Therefore, if we understand the “error” as an issue with the TACACS server, it would be answer “A” but I’m not sure how shall I understand the answer “D”?

    Tacacs already returned the “error” so why would the authentication attempts be sent to TACACS+ server (answer D)? Unless I should assume that because the “group” is configured, there will be more than one TACACS+ servers available?

  32. Bolo
    January 2nd, 2020

    @Anton

    On page 251 you can read about this question, see the labs we did and all that. There are Cisco materials that say that fallback method is only used if AAA server is not available. What you posted also mentions it: “Sometimes the tacacs+ server is not available and you do not want to just disconnect the user without trying some other way to authenticate the user. ”
    Based on this, and that the question says “server returned an error” – which means it is available, you could decide that enable method will not be used – so answers are BD. Also, interpreting the question like that is the only way to have 2 answers correct.

    If you assume that it’s literally an ERROR message returned by TACACS daemon because server is not available/reachable, then the enable would be used. In this case I agree with you – the only good answer is really A. But since 2 answers have to be provided, and BC makes no sense at all if you assume ERROR answer, D is picked.
    Again, I agree with you – understanding the question this way only the answer A is correct. But apparently have to pick 2…

    The question is probably copied with errors, or only 1 answer is needed. The way we see this question in dumps does not really allow for a convincing 100% answer without some ‘extra’ interpretation.

  33. Anton
    January 2nd, 2020

    @Bolo – thank you for your brief explanation.

    @x7x – do you remember seeing this question during your exam?

    Question 5
    If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two)
    A. The user will be prompted to authenticate using the enable password
    B. Authentication attempts to the router will be denied
    C. Authentication will use the router`s local database
    D. Authentication attempts will be sent to the TACACS+ server

  34. Jan
    January 2nd, 2020

    Which path do you follow to enable AAA through the SDM?
    A. Configure > Additional Tasks > AAA
    B. Configure > AAA
    C. Configure > Authentication > AAA
    D. Configure > Additional Authentication > AAA
    E. Configure > Tasks > AAA

    Is the answer A? https://www.youtube.com/watch?v=K8KykDQxQf8 (I refer to this video)
    However, a lot of people said its B?

  35. Anton
    January 2nd, 2020

    @Jan – Yes, the correct answer is “A. Configure > Additional Tasks > AAA”

  36. Jan
    January 2nd, 2020

    Thanks Anton! I have one more question..

    Which two attack types can be prevented with the implementation of a Cisco IPS solution? (Choose two)
    A. VLAN hopping
    B. DDos
    C. ARP spoofing
    D. Worms
    E. Man-in-the-middle

    Is the answer BD or DE?

  37. Don
    January 2nd, 2020

    You have just deployed SNMPv3 in your environment. Your manager asks you make sure that
    your agents can only talk to the SNMP Manager.
    What would you configure on your SNMP agents to satisfy this request?
    A. Routing Filter with the SNMP managers in it applied outbound
    B. A SNMP View containing the SNMP managers
    C. A standard ACL containing the SNMP managers applied to the SNMMP configuration.
    D. A SNMP Group containing the SNMP managers

    C or D?

  38. Undfnd
    January 2nd, 2020

    Just passed this morning

    9XX
    67q,
    1 DND(protect, shutdown vlan, restrict, shutdown),
    MC Sim with 4q’s
    k h a g e n s i t e . c o m

    Everything is word for word from his site. Idk who he is but its free prepaway and another valid questions which i got.

    Word for Word

  39. Rhys
    January 3rd, 2020

    A CCNP dump and CCIE dump that guarantees you pass the exam by February 23, 2020
    At the same time, we have also started the preparation of CCIE Enterprise. Once a stable dump appears, we will update it as soon as possible.
    (This is a website domain name)
    forums.delphiforums.com/happy2020/messages/1/1

  40. Rhys IS FAKE FAKE FAKE FAKE
    January 3rd, 2020

    Rhys IS FAKE FAKE FAKE FAKE

    Rhys IS FAKE FAKE FAKE FAKE

  41. Harikrishnan A
    January 3rd, 2020

    @x7x – @Anton – That coachgreece link is invalid now. Please share it again,am planning to take it on feb 1st week. Please do ASAP.

  42. supp
    January 3rd, 2020

    Anyone got a CCNA Secuirty Dump ? latest

  43. Andy
    January 3rd, 2020

    Hi Guys, I pass the exam today. Score 963. All the 67 questions came from coachgreece, October&Novmber PL paper and what Bolo and Anonymou are publishing in this form. I want to say a MASSIVE thank you to Bolo as I considered all his answers in the to all confusing ones. Basically, I created own document which included the last 5 pages of this website and followed Bolo answers to pick the right ones. The Sim was selecting 4 answers for the usual diagram and one D&D for ports security selections. You don’t need to pass the exam more than the last few pages of the form. Thank you guys again for this wonderful page.

  44. vengean
    January 3rd, 2020

    @Bolo
    On an ASA, which maps are used to identify traffic?
    A.Policy maps
    B.Class maps
    C.Route maps
    D.Service maps

    I think A .but dump answer is B. What is your idea?

  45. Anton
    January 3rd, 2020

    @Andy – congrats mate and thanks for sharing your experience!!!

  46. Undfnd
    January 3rd, 2020

    @Harikrishnan A

    @supp

    Trust me k h a g e n s i t e . c o m

    free valid questions and its from the exams

  47. jagar
    January 3rd, 2020

    Hello guys

    I need to pre-test the ccna sec 210-260 exam and I do not have the question dump, if anyone had the kindness to send it to me, I will be totally grateful, j a g a r c i 8 4 1 1 @ h or t m a i l. com

    thank you very much for your help

  48. Bolo
    January 3rd, 2020

    @Jan
    BD

    @Don
    C

    @Andy
    Grats! And thanks. Anonymous is just some repeat spammer bot or smth.

    @vengean
    B – Class maps identify traffic. Policy maps specify actions to be taken on the traffic ‘filtered’ by a class map.

  49. BOLO QUIZ
    January 3rd, 2020

    @BOLO DID YOU DO YOUR TEST?

  50. Bolo
    January 3rd, 2020

    @BOLO QUIZ

    Long time ago.

  51. primal
    January 3rd, 2020

    k h a g e n s i t e . c o m dumps had lots of wrong answers , youki is better IMO

  52. Anonymous
    January 3rd, 2020

    @ Andy
    Can you please upload the document you created.

  53. Harikrishnan A
    January 4th, 2020

    Can anyone share the drag and drop question answer.specifically for port,shutdown,restrict,protect,shutdownvlan.

    @Bolo @x7x

  54. Theo
    January 4th, 2020

    Hi all,
    can anyone answer the below-confused questions?
    As I found diferent answers from dumps

    @Bolo
    1
    In which two situations should you use out-of-band management? (Choose two.)
    A. when a network device fails to forward packets
    B. when you require ROMMON access
    C. when management applications need concurrent access to the device
    D. when you require administrator access from multiple locations
    E. when the control plane fails to respond
    2

    A clientless SSL VPN user who is connecting on a Windows Vista computer is missing the menu option for Remote Desktop
    Protocol on the portal web page. Which action should you take to begin troubleshooting?
    A. Ensure that the RDP2 plug-in is installed on the VPN gateway
    B. Reboot the VPN gateway
    C. Instruct the user to reconnect to the VPN gateway
    D. Ensure that the RDP plug-in is installed on the VPN gateway
    3
    Which Firepower Management Center feature detects and blocks exploits and hack attempts?
    A. advanced malware protection
    B. intrusion prevention
    C. file control
    D. content blocker
    4
    What are two challenges when deploying host-level IPS? (Choose two.)
    A. It is unable to determine the outcome of every attack that it detects.
    B. It is unable to provide a complete network picture of an attack.
    C. The deployment must support multiple operating systems.
    D. It does not provide protection for offsite computers.
    E. It is unable to detect fragmentation attacks.

    5
    Which two actions does an IPS perform? (Choose two.)
    A. It reconfigures a device to block the traffic
    B. It reflects the traffic back to the sender
    C. It encrypts the traffic
    D. It terminates the user session or connection of the attacker
    E. It spans the traffic
    6
    What are two challenges of using a network-based IPS? (Choose two.)
    A. It requires additional storage and processor capacity on syslog servers
    B. As the network expands, it requires you to add more sensors
    C. It is unable to determine whether a detected attack was successful
    D. It must support multiple operating systems
    E. It is unable to detect attacks across the entire network
    7
    Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)
    A. Smart tunnels can be used by clients that do not have administrator privileges
    B. Smart tunnels require the client to have the application installed locally
    C. Smart tunnels offer better performance than port forwarding
    D. Smart tunnels support all operating systems
    8
    If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events
    will occur when the TACACS+ server returns an error? (Choose two.)
    A. Authentication attempts to the router will be denied
    B. The user will be prompted to authenticate using the enable password
    C. Authentication will use the router’s local database
    D. Authentication attempts will be sent to the TACACS+ server
    9
    In which two situations should you use in-band management? (Choose two.)
    A. When a network device fails to forward packets
    B. When management applications need concurrent access to the device
    C. When you require administrator access from multiple locations
    D. When you require ROMMON access
    E. When the control plane fails to respond
    10
    What information does the key length provide in an encryption algorithm?
    A. the packet size
    B. the number of permutations
    C. the hash block size
    D. the cipher block size
    11
    What are two challenges faced when deploying host-level IPS? (Choose Two)
    A. The deployment must support multiple operating systems.
    B. It does not provide protection for offsite computers.
    C. It is unable to provide a complete network picture of an attack.
    D. It is unable to determine the outcome of every attack that it detects.
    E. It is unable to detect fragmentation attacks.

    12 )Which Firepower Management Center feature detects and blocks exploits and hack attempts?
    A. intrusion prevention
    B. advanced malware protection (AMP)
    C. content blocker
    D. file control

    13
    Which security principle has been violated if data is altered in an unauthorized manner?
    A. accountability
    B. availability
    C. confidentiality
    D. integrity
    14
    Which security principle has been violated if data is altered in an unauthorized manner?
    A. accountability
    B. availability
    C. confidentiality
    D. integrity
    15
    Which security principle has been violated if data is altered in an unauthorized manner?
    A. accountability
    B. availability
    C. confidentiality
    D. integrity

    16
    Which security principle has been violated if data is altered in an unauthorized manner?
    A. accountability
    B. availability
    C. confidentiality
    D. integrity
    17

    18

    19
    Which two actions does an IPS perform? (Choose two.)
    A. It reconfigures a device to block the traffic
    B. It reflects the traffic back to the sender
    C. It encrypts the traffic
    D. It terminates the user session or connection of the attacker
    E. It spans the traffic

  55. Luay
    January 4th, 2020

    Can you please help ..

    Which two configurations can prevent VLAN hopping attack from attackers at VLAN 10? (Choose two.)

    A. using switchport mode access command on all host ports
    B. enabling BPDU guard on all access ports
    C. creating VLAN 99 and using switchport trunk native vlan 99 command on trunk ports
    D. applying ACL between VLANs
    E. using switchport trunk native vlan 10 command on trunk ports
    F. using switchport nonegotiate command on dynamic desirable ports

  56. Anton
    January 4th, 2020

    @Luay – A&C

    @Harikrishnan A

    shutdown – the interface is error-disabled

    shutdown vlan – the virtual Layer2 segment is disabled

    restrict – when the number of secure MAC addresses o the port reaches a specified maximum limit, the port drops packets and send an SNMP trap

    protect – when the number of secure MAC addresses o the port reaches a specified maximum limit, the port drops packets without notification

  57. naz
    January 5th, 2020

    Monday will be exam anyone latest material about dumps, please share google drive link
    or mail s.nazuohatgmail thanks

  58. Luay
    January 5th, 2020

    @Anton …
    Thank you So much

  59. NAZ
    January 5th, 2020

    1.Q09 Which action does standard antivirus software perform as part of the file‐analysis process?
    A. execute the file in a simulated environment to examine its behavior
    B. examine the execution instructions in the file
    C. flag the unexamined file as a potential threat
    D. create a backup copy of the file Answer: Aor B

    which one is the correct answer.

  60. NAZ
    January 5th, 2020

    What does the policy map do in CoPP?
    A. defines the action to be performed
    B. defines packet selection parameters
    C. defines the packet filter
    D. defines service parameters
    answer please

  61. naz
    January 5th, 2020

    Q43 What are two major considerations when choosing between a SPAN and a TAP when
    implementing IPS? (Choose two.)
    A. the amount of bandwidth available
    B. the way in which dropped packets will be handled
    C. the type of analysis the IPS will perform
    D. whether RX and TX signals will use separate ports
    E. the way in which media errors will be handled

  62. Anonymous
    January 5th, 2020

    4 Which information can you display by executing the show crypto ipsec sa command?
    A. proxy information for the connection between two peers
    B. IPsec SAs established between two peers
    C. recent changes to the IP address of a peer router
    D. ISAKMP SAs that are established between two peers
    some place answer is B and other place C
    which one is correct answer

  63. Anonymous
    January 5th, 2020

    What is the main purpose of Control Plane Policing?
    A. to prevent exhaustion of route-processor resources.
    B. to define traffic classes.
    C. to organize the egress packet queues.
    D. to maintain the policy map.
    A or B
    Please, anyone, Identify the correct answer

  64. Anonymous
    January 5th, 2020

    Which term is most closely aligned with the basic purpose of a SIEM solution?
    A. Causality
    B. Accountability
    C. Non-Repudiation
    D. Repudiation
    answer identify please B or C

  65. Anonymous
    January 5th, 2020

    Which type of firewall can perform deep packet inspection?
    A. stateless firewall
    B. packet-filtering firewall
    C. application firewall
    D. personal firewall
    identify the correct answer
    B or C

  66. Anton
    January 5th, 2020

    @NAZ
    Q09 – B
    QCoPP – A
    Q43 – A&C

    @Anonymous
    Q4 – B
    Qx – A
    Qy – B
    Qz – C

  67. Bolo
    January 5th, 2020

    @Taz

    1: AB
    2: A
    3: B
    4: BC
    5: AD
    6: BC
    7: AB
    8: Not C. AD, BD, only B – make your pick. We can’t agree on 100% correct answer.
    9: BC
    10: B
    11: repeated
    12: repeated
    13-16: D. If you have doubts about the question that is basically answered on page 1 of every cybersecurity book in the world, maybe rethink your exam choices?
    19: repeated

  68. Bolo
    January 5th, 2020

    That post above is @Theo.
    Not sure how i made it ‘Taz’ there…..

  69. BA7RANI
    January 5th, 2020

    Passed 9XX end of December,

    thank you very much MR.Bolo , your corrections is correct.

    All MCQ as dump + Bolo correction , one LAB as same dump, one DND ( port security)

    Good luck all

  70. Anonymous
    January 5th, 2020

    Q43 What are two major considerations when choosing between a SPAN and a TAP when
    implementing IPS? (Choose two.)
    A. the amount of bandwidth available
    B. the way in which dropped packets will be handled
    C. the type of analysis the IPS will perform
    D. whether RX and TX signals will use separate ports
    E. the way in which media errors will be handled

  71. Anton
    January 5th, 2020

    @Anonymous – I have literally provided the answer to your question few posts back… scroll up!

    Q43 What are two major considerations when choosing between a SPAN and a TAP when
    implementing IPS? (Choose two.)
    A. the amount of bandwidth available
    B. the way in which dropped packets will be handled
    C. the type of analysis the IPS will perform
    D. whether RX and TX signals will use separate ports
    E. the way in which media errors will be handled
    Answer: A, C

  72. Anonymous
    January 5th, 2020

    Which two services define cloud networks? (Choose two):
    A. Infrastructure as a Service
    B. Platform as a Service
    C. Security as a Service
    D. Compute as a Service
    E. Tenancy as a Service

    What are the correct answers here guys?

  73. n2k
    January 6th, 2020

    Hi @Bolo, thanks for your great work here, it’s an excellent help for everyone.

    What resources would you use to prepare for the exam if you had to take the exam in a couple of weeks?

    I got some documents but I’m not sure if they are up to date or if they are reliable.
    Do you think it is worth buying a VCE? Where would you buy it?

    my email is {email not allowed}, if you (or any good guy) can share any updated documents or resources with me I would really appreciate it.

  74. n2k
    January 6th, 2020

    nakhan3 @ protonmail . com

  75. rexter
    January 6th, 2020

    @Bolo where can i get the dump ?

  76. Rediat Asfaw
    January 6th, 2020

    Congratulations!

    Passed the 210-260 exam recently (3/Jan/2020)!

    67 questions
    1 Simulation
    1 Drag and Drop (Shutdown, Restrict, Protect)

    I mainly learned the PassLeader 210-260 dumps (553q NEW version), all questions are available in PassLeader.

    Really helpful.

    P.S.

    Part of PassLeader 210-260 dumps are available here FYI:

    drive.google.com/drive/folders/0B-ob6L_QjGLpM1dfWVNVZ3Z5dzg

    (553q~~~NEW VERSION DUMPS Updated Recently!!!)

    Good luck, all!

    [copy that link and open it in your web browser]

  77. Rediat Asfaw
    January 6th, 2020

    And,

    Part of PassLeader 210-260 IINS new questions (FYI):

    [Get the download link at the end of this post]

    NEW QUESTION 546
    Which statement about TACACS+ is true?

    A. Passwords are transmitted between the client and server using MD5 hasing.
    B. TACACS_ is flexible than RADIUS because it separates all AAA into individual processes.
    C. TACACS_ is used for access to network resources more than administrator access to network devices.
    D. TACACS_ server listens UDP port 1813 for accounting.
    E. All data that is transmitted between the client and TACACS+ server is cleartext.

    Answer: C

    NEW QUESTION 547
    Which effect of the secure boot-image command is true?

    A. It configure the device to boot to the secure IOS image.
    B. It archives a secure copy of the device configuration.
    C. It archives a secure copy of the IOS image.
    D. It displays the status of the bootset.

    Answer: C

    NEW QUESTION 548
    Which two statements about an IPS in tap mode are true? (Choose two.)

    A. It requires an synchronous routing configuration for full traffic analysis.
    B. The device forwards all traffic, regardless of its source or destination.
    C. It directly analyzes the actual packets as they pass through the system.
    D. It can analyze events without impacting network efficiency.
    E. It is unable to drop packets in the main flow.

    Answer: BC

    NEW QUESTION 549
    How will a stateful firewall handle an inbound packet that it receives and cannot match in its state table?

    A. Passes the traffic.
    B. Drops the traffic.
    C. Broadcasts the traffic.
    D. Looks for an ACL, and acts based upon the ACL.

    Answer: C

    NEW QUESTION 550
    Which 802.1x component enforces the network access policy?

    A. authentication server
    B. authenticator
    C. RADIUS server
    D. supplicant

    Answer: A

    NEW QUESTION 551
    Drag and Drop
    Drag and drop the each port-security violation mode from the left onto the corresponding action on the right.

    Answer:

    NEW QUESTION 552
    ……

    Download more NEW PassLeader 210-260 dumps from Google Drive here:

    drive.google.com/drive/folders/0B-ob6L_QjGLpM1dfWVNVZ3Z5dzg

    (553q~~~NEW VERSION DUMPS Updated Recently!!!)

    Good luck, all!

    [copy that link and open it in your web browser]

  78. Anonymous
    January 6th, 2020

    @Rediat Asfaw.There is no new questions 552 and 553 on the link you provided.

  79. Anton
    January 6th, 2020

    QUESTION 30
    What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?
    A. split tunnelling
    B. hair-pinning
    C. tunnel mode
    D. transparent mode
    Answer: A

    Shouldn’t this be “B”? When split tunneling is enabled it would only route specified prefixes through the VPN and everything else directly through the Internet.

  80. luay
    January 6th, 2020

    @Anton
    Yes . The correct answer is B.
    . My exam is today.. wish me luck

  81. krissy
    January 6th, 2020

    good luck, hope you makeit.

  82. Anton
    January 6th, 2020

    @luay – good luck mate! Please try to remember as much as you can and share you post exam experience with us.

    I’m really wondering if C0achGreece and Nov/Oct PassLeader are enough or you actually need to study Youki dump too.

  83. Primal
    January 6th, 2020

    Anton, The answer IS A. Hairpinning is when traffic enters and exits the same interface.

  84. Primal
    January 6th, 2020

    Also , TONS of wrong answers in passleader. I would study youki. It has been the most accurate by far. Even C)achGreece has a few wrong. I’m not just memorizing the dumps but researching and learnign the concepts as I go along.

  85. SNEW
    January 6th, 2020

    Hello, coachgrease has only 67 quiz… is it the file you guys are using?

  86. Anton
    January 6th, 2020

    @Primal – thanks for you comments

    I have my own version with corrected answers for question from c0achgreece and PL (Oct/Nov).

    Is Youki all correct or there are some obvious mistakes we are aware of?

    Also, can you elaborate on your answer for the below question please?

    QUESTION 30
    What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?
    A. split tunnelling
    B. hair-pinning
    C. tunnel mode
    D. transparent mode

  87. pass
    January 6th, 2020

    Help here

    Which two services define cloud networks? (Choose two.)
    A. Infrastructure as a Service
    B. Platform as a Service
    C. Security as a Service
    D. Compute as a Service
    E. Tenancy as a Service

  88. primal
    January 6th, 2020

    Youki is mostly correct and it has lots of explanations so you can actually learn the concepts so I like it. As far as hairpinning on the ASA. lets say the ASA is my default gateway. my traffic goes to the inside interface and the ASA and the ASA has a route to the host I want to get to on the same inside interface. It has to send it out the same inter face it came in on. That is hair-pinning (U-turn). As a side note the ASA wont allow this by default you have to give the Same-security traffic intra-interface command.

    Split-tunneling is when you are in a VPN session and the ASA allows traffic to unsecured networks eg. Public internet sites to use your internet connection locally and not go through the secure tunnel. Does that make sense?

  89. Anton
    January 6th, 2020

    @Primal – thanks for your explanation.

    I was a little bit confused as the question is asking for a feature which allows Internet traffic to go through the same Interface as local LAN/WAN traffic – isn’t this configured by default (split tunneling disabled) and if you would like to force the Internet traffic to go through you local breakout, instead of going through the VPN, you need to enable the split tunneling?

  90. Primal
    January 6th, 2020

    @Anton. Agreed the question is worded strange. Who know who translated it. You have to enable split tunneling. Without split tunneling ALL your traffic is going through the VPN tunnel. With split tunneling only the traffic to secured networks (your internal company network) would go over the VPN tunnel.

  91. no name because i passed the exam
    January 6th, 2020

    I passed my exam 996/1000 .

    I study the PL 550 questions , all the question in the test is word by word as PL file.
    The last 50 questions in PL has some wrong answers . So i collected the right answers from following @Bolo and @X7X in the last 3 pages in the form .
    – 1 sim : Connection less VPN , 4 questions as PL, the same answers .
    – D&D : Drag and drop the each port-security violation
    – 1 new qustion : in my word : what is true about STP attack :
    answers: A,B
    A- the attacker installed swich to become root bridge
    B- its kind of man – in -the middle attak.
    c- XXXX not related
    d- XXXX not related .

    wish u guys best of luck

    Thank you Bolo

    Bolo … you are the man … Thank you so much and God bless u

  92. Primal
    January 6th, 2020

    @noname. Can I get a link to the 550 question PL. The one that I have has lots of wrong answers. OR can anyone link to it please.

  93. no name because i passed the exam
    January 6th, 2020

    @ Primal … all the questions in this form. if u collect all questions , it will be more than 67 questions , that what u will see in the test. correct for correct anserws just follow Bolo answers .

  94. no name because i passed the exam
    January 6th, 2020

    or send ur questions , and i will help u

  95. vengean
    January 6th, 2020

    Does anybody have questions 536 and 537 from PassLeader October?

  96. andy138
    January 6th, 2020

    Any good SIM material out there?

  97. nlnl
    January 7th, 2020

    After about 40 days, Cisco will have major changes, and the exam will not be easy. Now is the best time to take the exam. Our questions and answers will help you pass the CCNA, CCNP and CCIE exams quickly during this time. Now is the last chance to pass the exam quickly. Free updates for one year. This is our website ↓↓↓
    forums.delphiforums.com/happy2020/messages/1/1

  98. check this
    January 7th, 2020

    Hi, check below links from both quizlet and dumps.. confirm as per your study experience if they are of benefit or if one can use them for preparations.
    https : // www . brainscape.com/flashcards/210-260-dump-6457876/packs/10114503

    https: // quizlet . com/425564687/ccna-security-092019-flash-cards/

  99. EMK
    January 7th, 2020

    Good Morning hope everyone is fine. Kindly assist on some questions here that have some queries?

    How is management traffic isolated on a Cisco ASR 1002?
    A. Traffic is isolated based upon how you configure routing on the device.
    B. There is no management traffic isolation on a Cisco ASR 1002.
    C. The management interface is configured in a special VRF that provides traffic isolation from the default routing table.
    D. Traffic isolation is done on the VLAN level.

    Which type of social engineering attack targets top executives?
    A. baiting
    B. vishing
    C. whaling
    D. spear phishing

    Which two actions can an end user take to manage a lost or stolen device in Cisco ISE? (Choose two.)
    A. Reinstate a device that the user previously marked as lost or stolen.
    B. Activate Cisco ISE Endpoint protection Services to quarantine the device.
    C. Request revocation of the digital certificate of the device.
    D. Add the MAC address of the device to a list of blacklisted devices.
    E. Force the device to be locked with a PIN.

    Which command do you enter to verify the Phase 1 status of a VPN connection?
    A. debug crypto isakmp
    B. sh crypto session
    C. sh crypto isakmp sa
    D. sh crypto ipsec sa

    in passleader they are saying sh crypto ipsec sa but i think the answer should be sh crypto isakmp sa in ccna security official guide page 230 says its c

  100. EMK
    January 7th, 2020

    Refer to the exhibit. Which area represents the data center? some dumps are saying A while others are saying C


  101. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 11 12 13 14 15 22 675
Add a Comment