Cisco CCNA Security 210-260
Questions with Correct Answers
Your company executives are very excited about new encryption technologies that exist and they
want you to make sure your organization is featuring the latest and greatest techniques in this area.
What part of CIA are they addressing?
A. Confidentiality
B. Integrity
C. Accounting
D. Availability - ANSWER✔✔-A
You have just discovered that some data transferred between your data centers was changed in
transit. This is a breach of what?
A. Confidentiality
B. Availability
C. Integrity
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
,D. Certification - ANSWER✔✔-C
A DoS attack is most often attempting to breach which aspect of security?
A. Integrity
B. Availability
C. Accounting
D. Confidentiality - ANSWER✔✔-B
Forbidding the use of plain text based protocols like Telnet are an excellent way to enhance
confidentiality. True or false? - ANSWER✔✔-T
What is one of the goals of a CAM table overflow attack?
A. To have the switch experience a buffer overflow error
B. To have the switch forget legitimate MAC addresses
C. To have the switch run out of RAM resources
D. To have the switch only memorize the MAC address of the attacker - ANSWER✔✔-B
What is the default port security violation mode?
A. Silence
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
,B. Restrict
C. Shutdown
D. Protect - ANSWER✔✔-C
What port security violation mode does not alert us that there has been a violation?
A. Silence
B. Shutdown
C. Protect
D. Restrict - ANSWER✔✔-C
What is the port security option that would provide the largest amount of administrative overhead?
A. Sticky
B. Static
C. Hybrid
D. Dynamic - ANSWER✔✔-B
Port security works with dynamically or statically configured trunks or access ports. True or false? -
ANSWER✔✔-F
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 3
, What is the command that you can use to ensure you are seeing console messages for your Cisco
device that you have telnetted to? - ANSWER✔✔-terminal monitor
What is the full command to ensure that a switch port is statically configured for access mode? -
ANSWER✔✔-switchport mode access
Enter the full port-security command to set the maximum MAC addresses on the port to 5. -
ANSWER✔✔-switchport port-security maximum 5
If you are not going to use the default shutdown violation mode with port security, what method
would Cisco recommend?
A. Sticky
B. Protect
C. Restrict
D. Silence - ANSWER✔✔-C
What command do you use to actually turn on the port security feature? - ANSWER✔✔-switchport
port-security
What is the status for port-security when it is properly engaged?
A. Enabled
B. Shutdown
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 4
Questions with Correct Answers
Your company executives are very excited about new encryption technologies that exist and they
want you to make sure your organization is featuring the latest and greatest techniques in this area.
What part of CIA are they addressing?
A. Confidentiality
B. Integrity
C. Accounting
D. Availability - ANSWER✔✔-A
You have just discovered that some data transferred between your data centers was changed in
transit. This is a breach of what?
A. Confidentiality
B. Availability
C. Integrity
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
,D. Certification - ANSWER✔✔-C
A DoS attack is most often attempting to breach which aspect of security?
A. Integrity
B. Availability
C. Accounting
D. Confidentiality - ANSWER✔✔-B
Forbidding the use of plain text based protocols like Telnet are an excellent way to enhance
confidentiality. True or false? - ANSWER✔✔-T
What is one of the goals of a CAM table overflow attack?
A. To have the switch experience a buffer overflow error
B. To have the switch forget legitimate MAC addresses
C. To have the switch run out of RAM resources
D. To have the switch only memorize the MAC address of the attacker - ANSWER✔✔-B
What is the default port security violation mode?
A. Silence
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
,B. Restrict
C. Shutdown
D. Protect - ANSWER✔✔-C
What port security violation mode does not alert us that there has been a violation?
A. Silence
B. Shutdown
C. Protect
D. Restrict - ANSWER✔✔-C
What is the port security option that would provide the largest amount of administrative overhead?
A. Sticky
B. Static
C. Hybrid
D. Dynamic - ANSWER✔✔-B
Port security works with dynamically or statically configured trunks or access ports. True or false? -
ANSWER✔✔-F
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 3
, What is the command that you can use to ensure you are seeing console messages for your Cisco
device that you have telnetted to? - ANSWER✔✔-terminal monitor
What is the full command to ensure that a switch port is statically configured for access mode? -
ANSWER✔✔-switchport mode access
Enter the full port-security command to set the maximum MAC addresses on the port to 5. -
ANSWER✔✔-switchport port-security maximum 5
If you are not going to use the default shutdown violation mode with port security, what method
would Cisco recommend?
A. Sticky
B. Protect
C. Restrict
D. Silence - ANSWER✔✔-C
What command do you use to actually turn on the port security feature? - ANSWER✔✔-switchport
port-security
What is the status for port-security when it is properly engaged?
A. Enabled
B. Shutdown
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 4