This CCNA Security 210-260 Practice Test consists of 21 questions and is free of cost and can be taken multiple times. If you are one who have scheduled the exam, then these CCNA practice test is for you! Give a try today!

Please enter your email:

1. What type of algorithm uses the same key to encrypt and decrypt data?

 
 
 
 

2. What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?

 
 
 
 

3. If a packet matches more than one class map in an individual feature type’s policy map, how does the ASA handle the packet?

 
 
 
 

4. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)

 
 
 
 
 
 

5. In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?

 
 
 
 

6. In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)

 
 
 
 
 
 

7. Which statement about Cisco ACS authentication and authorization is true?

 
 
 
 

8. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)

 
 
 
 
 
 

9. What type of packet creates and performs network operations on a network device?

 
 
 
 

10. Which three ESP fields can be encrypted during transmission? (Choose three.)

 
 
 
 
 
 

11. Which two authentication types does OSPF support? (Choose two.)

 
 
 
 
 
 

12. In which two situations should you use out-of-band management? (Choose two.)

 
 
 
 
 

13. What command can you use to verify the binding table status?

 
 
 
 
 
 

14. After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?

 
 
 
 

15. Which two statements about Telnet access to the ASA are true? (Choose two).

 
 
 
 
 

16. Which two statements about stateless firewalls are true? (Choose two.)

 
 
 
 
 

17. What are two default Cisco IOS privilege levels? (Choose two.)

 
 
 
 
 
 

18. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)

 
 
 
 
 
 

19. Which statement about communication over failover interfaces is true?

 
 
 
 

20. What is the purpose of the Integrity component of the CIA triad?

 
 
 
 

21. An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?

 
 
 
 

Question 1 of 21

$530

$317

Have a Query? Send it to us.