Cisco 210-260 Implementing Cisco Network Security Online Training
Cisco 210-260 Online Training
The questions for 210-260 were last updated at Oct 13,2025.
- Exam Code: 210-260
- Exam Name: Implementing Cisco Network Security
- Certification Provider: Cisco
- Latest update: Oct 13,2025
What command can you use to verify the binding table status?
- A . show ip dhcp snooping database
- B . show ip dhcp snooping binding
- C . show ip dhcp snooping statistics
- D . show ip dhcp pool
- E . show ip dhcp source binding
- F . show ip dhcp snooping
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?
- A . STP root guard
- B . EtherChannel guard
- C . loop guard
- D . STP BPDU guard
Which statement about a PVLAN isolated port configured on a switch is true?
- A . The isolated port can communicate only with the promiscuous port.
- B . The isolated port can communicate with other isolated ports and the promiscuous port.
- C . The isolated port can communicate only with community ports.
- D . The isolated port can communicate only with other isolated ports.
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?
- A . The trunk port would go into an error-disabled state.
- B . A VLAN hopping attack would be successful.
- C . A VLAN hopping attack would be prevented.
- D . The attacked VLAN will be pruned.
What is a reason for an organization to deploy a personal firewall?
- A . To protect endpoints such as desktops from malicious activity.
- B . To protect one virtual network segment from another.
- C . To determine whether a host meets minimum security posture requirements.
- D . To create a separate, non-persistent virtual environment that can be destroyed after a session.
- E . To protect the network from DoS and syn-flood attacks.
Which statement about personal firewalls is true?
- A . They can protect a system by denying probing requests.
- B . They are resilient against kernel attacks.
- C . They can protect email messages and private documents in a similar way to a VPN.
- D . They can protect the network against attacks.
Refer to the exhibit.
What type of firewall would use the given configuration line?
- A . a stateful firewall
- B . a personal firewall
- C . a proxy firewall
- D . an application firewall
- E . a stateless firewall
What is the only permitted operation for processing multicast traffic on zone-based firewalls?
- A . Only control plane policing can protect the control plane against multicast traffic.
- B . Stateful inspection of multicast traffic is supported only for the self-zone.
- C . Stateful inspection for multicast traffic is supported only between the self-zone and the internal zone.
- D . Stateful inspection of multicast traffic is supported only for the internal zone.
How does a zone-based firewall implementation handle traffic between interfaces in the same zone?
- A . Traffic between two interfaces in the same zone is allowed by default.
- B . Traffic between interfaces in the same zone is blocked unless you configure the same-security permit command.
- C . Traffic between interfaces in the same zone is always blocked.
- D . Traffic between interfaces in the same zone is blocked unless you apply a service policy to the zone pair.
Which two statements about Telnet access to the ASA are true? (Choose two).
- A . You may VPN to the lowest security interface to telnet to an inside interface.
- B . You must configure an AAA server to enable Telnet.
- C . You can access all interfaces on an ASA using Telnet.
- D . You must use the command virtual telnet to enable Telnet.
- E . Best practice is to disable Telnet and use SSH.
Hello. And Bye.