This CCNA Security 210-260 Practice Test consists of 21 questions and is free of cost and can be taken multiple times. If you are one who have scheduled the exam, then these CCNA practice test is for you! Give a try today!

Please enter your email:

1. Which two statements about Telnet access to the ASA are true? (Choose two).

 
 
 
 
 

2. What is the purpose of the Integrity component of the CIA triad?

 
 
 
 

3. Which statement about communication over failover interfaces is true?

 
 
 
 

4. What command can you use to verify the binding table status?

 
 
 
 
 
 

5. What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?

 
 
 
 

6. If a packet matches more than one class map in an individual feature type’s policy map, how does the ASA handle the packet?

 
 
 
 

7. What are two default Cisco IOS privilege levels? (Choose two.)

 
 
 
 
 
 

8. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)

 
 
 
 
 
 

9. An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?

 
 
 
 

10. In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)

 
 
 
 
 
 

11. Which three ESP fields can be encrypted during transmission? (Choose three.)

 
 
 
 
 
 

12. Which two authentication types does OSPF support? (Choose two.)

 
 
 
 
 
 

13. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)

 
 
 
 
 
 

14. After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?

 
 
 
 

15. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)

 
 
 
 
 
 

16. What type of packet creates and performs network operations on a network device?

 
 
 
 

17. In which two situations should you use out-of-band management? (Choose two.)

 
 
 
 
 

18. Which two statements about stateless firewalls are true? (Choose two.)

 
 
 
 
 

19. What type of algorithm uses the same key to encrypt and decrypt data?

 
 
 
 

20. In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?

 
 
 
 

21. Which statement about Cisco ACS authentication and authorization is true?

 
 
 
 

Question 1 of 21