Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 400-251
100% Free Download! 100% Pass Guaranteed!
CCIE Security Written Exam (v5.0)
Question No: 31 – (Topic 1)
Which option best describes RPL?
-
RPL stands for Routing over low priority links that use distance vector DOGAG to determine the best route between two border routes
-
RPL stands for Routing over low-power Lossy Networks that use distance vector DOGAGA to determine the best route between leaves and the root border router.
-
RPL stands for Routing over low priority links that use link-state LSAs to determine the best route between two root border routers.
-
RPL stands for Routing over low-power Lossy Networks that use link-state LSAs to determine the best route between leaves 3nd the root border router.
Answer: B
Question No: 32 – (Topic 1)
Which two statements about SCEP are true? (Choose two)
-
CA Servers must support GetCACaps response messages in order to implement extended functionality.
-
The GetCRL exchange is signed and encrypted only in the response direction.
-
It is vulnerable to downgrade attacks on its cryptographic capabilities.
-
The GetCert exchange is signed and encrypted only in the response direction.
-
The GetCACaps response message supports DES encryption and the SHA-128 hashing algorithm.
Answer: A,C
Question No: 33 – (Topic 1)
Which two statements about Cisco URL Filtering on Cisco IOS Software are true?(Choose two)
-
It supports Websense and N2H2 filtering at the same time.
-
It supports local URL lists and third-party URL filtering servers.
-
By default, it uses ports 80 and 22.
-
It supports HTTP and HTTP traffic.
-
By default, it allows all URLs when the connection to the filtering server is down.
-
It requires minimal CPU time.
Answer: A,B
Question No: 34 – (Topic 1)
Which two statements about Net Flow Secure Event Logging on a Cisco ASA are true?(Choose two)
-
It tracks configured collectors over TCP.
-
It is supported only in single-context mode.
-
It can export templates through NetFlow.
-
It can be used without collectors.
-
It supports one event type per collector
-
It can log different event types on the same device to different collectors.
Answer: C,F
Question No: 35 – (Topic 1)
Which two statements about 802.1x components are true?(Choose two)
-
The access layer switchis the policy enforcement point.
-
The certificates that are used in the client-server authentication process are stored on the access switch.
-
The RADIUS server is the policy enforcement point.
-
The RADIUS server is the policy informant point.
-
The RADIUS server is the policy decision point.
-
An LADP server can server as the policy enforcement point.
Answer: A,E
Question No: 36 – (Topic 1)
Which WEP configuration can be exploited by a weak IV attack?
-
When the static WEP password has been stored without encryption.
-
When a per-packet WEP key is in use.
-
When a 64-bit key is in use.
-
When the static WEP password has been given away.
-
When a 40-bit key is in use.
-
When the same WEP key is used to create every packet.
Answer: E
Question No: 37 – (Topic 1)
Which three statements about Cisco Any Connect SSL VPN with the ASA are true?(Choose three)
-
DTLS can fail back to TLS without enabling dead peer detection.
-
By default, the VPN connection connects with DTLS.
-
Real-time application performance improves if DTLS is implemented.
-
Cisco Any Connect connections use IKEv2 by default when it is configured as the primary protocol on the client.
-
By default, the ASA uses the Cisco Any Connect Essentials license.
-
The ASA will verify the remote HTTPS certificate.
Answer: B,C,D
Question No: 38 – (Topic 1)
How does Scavenger-class QOS mitigate DOS and worm attacks?
-
It monitors normal traffic flow and drops burst traffic above the normal rate for a single host.
-
It matches traffic from individual hosts against the specific network characteristics of known attack types.
-
It sets a specific intrusion detection mechanism and applies the appropriate ACL when matching traffic is detected.
-
It monitors normal traffic flow and aggressively drops sustained abnormally high traffic streams from multiple hosts.
Answer: D
Question No: 39 – (Topic 1)
Which three authorization technologies does Cisco Trust Sec support?(Choose three)
A. 802.1x.
-
SGACL.
-
DACL.
-
MAB.
-
SGT.
-
VLAN.
Answer: A,D,F
Question No: 40 – (Topic 1)
Which two options are benefits of global ACLs?(Choose two)
-
They only operate on logical interfaces.
-
They are more efficient because they are processed before interface access rules.
-
They server memory because they work without being replicated on each interface
-
They can be applied to multiple interface
-
They are flexible because they match source and destination IP addresses for packets that arrive on any interface
Answer: B,D
100% Ensurepass Free Download!
–400-251 PDF
100% Ensurepass Free Guaranteed!
–400-251 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |