Cisco 210-260 Implementing Cisco Network Security Online Training
Cisco 210-260 Online Training
The questions for 210-260 were last updated at Nov 28,2025.
- Exam Code: 210-260
- Exam Name: Implementing Cisco Network Security
- Certification Provider: Cisco
- Latest update: Nov 28,2025
Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)
- A . Smart tunnels can be used by clients that do not have administrator privileges
- B . Smart tunnels support all operating systems
- C . Smart tunnels offer better performance than port forwarding
- D . Smart tunnels require the client to have the application installed locally
If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?
- A . The interface on both switches may shut down
- B . STP loops may occur
- C . The switch with the higher native VLAN may shut down
- D . The interface with the lower native VLAN may shut down
Which option describes information that must be considered when you apply an access list to a physical interface?
- A . Protocol used for filtering
- B . Direction of the access class
- C . Direction of the access group
- D . Direction of the access list
Which source port does IKE use when NAT has been detected between two VPN gateways?
- A . TCP 4500
- B . TCP 500
- C . UDP 4500
- D . UDP 500
Which of the following are features of IPsec transport mode? (Choose three.)
- A . IPsec transport mode is used between end stations
- B . IPsec transport mode is used between gateways
- C . IPsec transport mode supports multicast
- D . IPsec transport mode supports unicast
- E . IPsec transport mode encrypts only the payload
- F . IPsec transport mode encrypts the entire packet
Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?
- A . no switchport nonnegotiate
- B . switchport
- C . no switchport mode dynamic auto
- D . no switchport
Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)
- A . EAP
- B . ASCII
- C . PAP
- D . PEAP
- E . MS-CHAPv1
- F . MS-CHAPv2
Which type of IPS can identify worms that are propagating in a network?
- A . Policy-based IPS
- B . Anomaly-based IPS
- C . Reputation-based IPS
- D . Signature-based IPS
Which command verifies phase 1 of an IPsec VPN on a Cisco router?
- A . show crypto map
- B . show crypto ipsec sa
- C . show crypto isakmp sa
- D . show crypto engine connection active
Which command verifies phase 1 of an IPsec VPN on a Cisco router?
- A . show crypto map
- B . show crypto ipsec sa
- C . show crypto isakmp sa
- D . show crypto engine connection active
Hello. And Bye.