Cisco 210-260 Implementing Cisco Network Security Online Training
Cisco 210-260 Online Training
The questions for 210-260 were last updated at Oct 12,2025.
- Exam Code: 210-260
- Exam Name: Implementing Cisco Network Security
- Certification Provider: Cisco
- Latest update: Oct 12,2025
Which two statements about stateless firewalls are true? (Choose two.)
- A . They compare the 5-tuple of each incoming packet against configurable rules.
- B . They cannot track connections.
- C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPS.
- D . Cisco IOS cannot implement them because the platform is stateful by nature.
- E . The Cisco ASA is implicitly stateless because it blocks all traffic by default.
Which three statements about host-based IPS are true? (Choose three.)
- A . It can view encrypted files.
- B . It can have more restrictive policies than network-based IPS.
- C . It can generate alerts based on behavior at the desktop level.
- D . It can be deployed at the perimeter.
- E . It uses signature-based policies.
- F . It works with deployed firewalls.
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
- A . deny attacker
- B . deny packet
- C . modify packet
- D . request block connection
- E . request block host
- F . reset TCP connection
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
- A . Deny the connection inline.
- B . Perform a Layer 6 reset.
- C . Deploy an antimalware system.
- D . Enable bypass mode.
What is an advantage of implementing a Trusted Platform Module for disk encryption?
- A . It provides hardware authentication.
- B . It allows the hard disk to be transferred to another device without requiring re-encryption.dis
- C . It supports a more complex encryption algorithm than other disk-encryption technologies.
- D . It can protect against single points of failure.
What is the purpose of the Integrity component of the CIA triad?
- A . to ensure that only authorized parties can modify data
- B . to determine whether data is relevant
- C . to create a process for accessing data
- D . to ensure that only authorized parties can view data
In a security context, which action can you take to address compliance?
- A . Implement rules to prevent a vulnerability.
- B . Correct or counteract a vulnerability.
- C . Reduce the severity of a vulnerability.
- D . Follow directions from the security appliance manufacturer to remediate a vulnerability.
Which type of secure connectivity does an extranet provide?
- A . other company networks to your company network
- B . remote branch offices to your company network
- C . your company network to the Internet
- D . new networks to your company network
Which tool can an attacker use to attempt a DDoS attack?
- A . botnet
- B . Trojan horse
- C . virus
- D . adware
What type of security support is provided by the Open Web Application Security Project?
- A . Education about common Web site vulnerabilities.
- B . A Web site security framework.
- C . A security discussion forum for Web site developers.
- D . Scoring of common vulnerabilities and exposures.
Hello. And Bye.