This CCNA Security 210-260 Practice Test consists of 21 questions and is free of cost and can be taken multiple times. If you are one who have scheduled the exam, then these CCNA practice test is for you! Give a try today!

Please enter your email:

1. Which three ESP fields can be encrypted during transmission? (Choose three.)

 
 
 
 
 
 

2. Which two statements about stateless firewalls are true? (Choose two.)

 
 
 
 
 

3. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)

 
 
 
 
 
 

4. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)

 
 
 
 
 
 

5. What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?

 
 
 
 

6. What is the purpose of the Integrity component of the CIA triad?

 
 
 
 

7. After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?

 
 
 
 

8. An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?

 
 
 
 

9. In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)

 
 
 
 
 
 

10. Which statement about communication over failover interfaces is true?

 
 
 
 

11. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)

 
 
 
 
 
 

12. What are two default Cisco IOS privilege levels? (Choose two.)

 
 
 
 
 
 

13. If a packet matches more than one class map in an individual feature type’s policy map, how does the ASA handle the packet?

 
 
 
 

14. What type of algorithm uses the same key to encrypt and decrypt data?

 
 
 
 

15. In which two situations should you use out-of-band management? (Choose two.)

 
 
 
 
 

16. Which two authentication types does OSPF support? (Choose two.)

 
 
 
 
 
 

17. What type of packet creates and performs network operations on a network device?

 
 
 
 

18. Which statement about Cisco ACS authentication and authorization is true?

 
 
 
 

19. Which two statements about Telnet access to the ASA are true? (Choose two).

 
 
 
 
 

20. What command can you use to verify the binding table status?

 
 
 
 
 
 

21. In what type of attack does an attacker virtually change a device’s burned-in address in an attempt to circumvent access lists and mask the device’s true identity?

 
 
 
 

Question 1 of 21