[Free] 2018(Aug) Ensurepass Cisco 400-251 Dumps with VCE and PDF 1-10

August 12, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 400-251
100% Free Download! 100% Pass Guaranteed!

CCIE Security Written Exam (v5.0)

Question No: 1 – (Topic 1)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which two effects of this configuration are true?(Choose two)

  1. IGMPv2 leave group messages are stored in the switch CAM table for faster processing.

  2. Hosts send leave group messages to the all-router multicast address when they want to stop data for that group

  3. It improves the processing time of CGMP leave messages

  4. Hosts send leave group messages to the Solicited-Node Address multicast address FF02::1 :ff00:0000/104

  5. It optimizes the use of network bandwidth on the LAN segment.

  6. It allows the switch to detect IGMPv2 leave group messages.

Answer: E,F

Question No: 2 – (Topic 1)

Which three statement about 802.1x multiauthentication mode are true?(Choose three)

  1. It requires each connected client to authenticate individually.

  2. Each multiauthentication port can support only one voice VLAN.

  3. It can be deployed in conjunction with MDA functionality on voice VLANs.

  4. It is recommended for auth-fail VLANS.

  5. It is recommended for guest VLANs.

  6. On non-802.1x devices, it can support only one authentication method on a single port.

Answer: A,B,C

Question No: 3 – (Topic 1)

Which three messages are part of the SSL protocol?(Choose three)

  1. Alert.

  2. Handshake.

  3. Record.

  4. CipherSpec.

  5. Message Authorization.

  6. Change CipherSpec.

Answer: A,B,F

Question No: 4 – (Topic 1)

Refer to the exhibit .

Ensurepass 2018 PDF and VCE

Which data format is used in this script?

  1. API

  2. JavaScript

  3. JSON

  4. YANG

  5. XML

Answer: E

Question No: 5 – (Topic 1)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which two effects of this configuration are true?(Choose two)

  1. User five can execute the show run command.

  2. User fivecan view usernames and passwords.

  3. User superusercan change usernames and passwords.

  4. User superuser can view the configuration.

  5. User superuser can view usernames and password.

  6. User cisco canview usernames and password.

Answer: A,D

Question No: 6 – (Topic 1)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which two effects of this configuration are true?(Choose two)

  1. If the TACACS server is unreachable ,the switch places hosts on critical ports in VLAN 50.

  2. If the authentication priority is changed, the order in switch authentication is performed also changes.

  3. If multiple hosts have authenticated to the same port, each can be in their own assigned VLAN

  4. The port attempts 802.1x authentication first, and. then falls back to MAC authentication bypass.

  5. The device allows multiple authenticated sessions for a single MAC address in the voice domain.

  6. The switch periodically sends an EAP-Identity-Request to the endpoint supplicant.

Answer: D,E

Question No: 7 – (Topic 1)

What are the two different modes in which Private AMP cloud can be deployed?(Choose two )

  1. Air Gap Mode.

  2. External Mode.

  3. Internal Mode.

  4. Public Mode.

  5. Could Mode.

  6. Proxy Mode.

Answer: A,E

Question No: 8 – (Topic 1)

Which two statements about Botnet Traffic Filter snooping are true?(Choosetwo)

  1. It requires DNS packet inspection to be enabled to filter domain names in the dynamic database.

  2. It requires the Cisco ASA DNS server to perform DNS lookups.

  3. It can inspect both IPV4 and IPV6 traffic.

  4. It can log and block suspicious connections from previously unknown bad domains and IP addresses.

  5. It checks inbound traffic only.

  6. It checks inbound and outbound traffic.

Answer: A,F

Question No: 9 – (Topic 1)

Which two statements about uRPF are true?(Choose two)

  1. The administrator can configurethe allow-defaultcommand to force the routing table to use only the default .

  2. It is not supported on the Cisco ASA security appliance.

  3. The administrator can configure the ip verify unicast source reachable-via any command to enable the RPF check to work through HSRP touting groups.

  4. The administrator can use thes how cef interface command to determine whether uRPF is enabled.

  5. In strict mode, only one routing path can be available to reach network devices on a subnet..

Answer: D,E

Question No: 10 – (Topic 1)

Which command on Cisco ASA you can enter to send debug messages to a syslog server?

  1. Loggingdebug-trace

  2. Logging host

  3. Logging traps

  4. Logging syslog

Answer: B

100% Ensurepass Free Download!
400-251 PDF
100% Ensurepass Free Guaranteed!
400-251 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No