Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 400-251
100% Free Download! 100% Pass Guaranteed!
CCIE Security Written Exam (v5.0)
Question No: 51 – (Topic 1)
Which two options are unicast address types for IPv6 addressing?(Choose two)
-
Link-local.
-
Established.
-
Global
-
Dynamic
-
Static
Answer: A,C
Question No: 52 – (Topic 1)
Which two options are benefits of the Cisco ASA transparent firewall mode?(Choose two)
-
It can establish routing adjacencies.
-
It can perform dynamic routing.
-
It can be added to an existing network without significant reconfiguration.
-
It supports extended ACLs to allow Layer 3 traffic to pass from higher lower security interfaces.
-
It provides SSL VPN support.
Answer: C,D
Question No: 53 – (Topic 1)
Which three statements about SXP are true?(Choose three)
-
It resides in the control plane, where connections can be initiated from a listener.
-
Packets can be tagged with SGTs only with hardware support.
-
Each VRF supports only one CTS-SXP connection.
-
To enable an access device to use IP device tracking to learn source device IP addresses,DHCP snooping must be configured.
-
The SGA ZBPF uses the SGT to apply forwarding decisions.
-
SeparateVRFs require different CTS-SXP peers, but they can use the same source IP addresses.
Answer: A,B,C
Question No: 54 – (Topic 1)
Which two statements about ping flood attacks are true?(Choose two)
-
They attack by sending ping requests to the return address of the network.
-
They use ICMP packets.
-
They attack by sending ping requests to the return address of the network.
-
The attack is intended to over whelm the CPU of the target victim.
-
They use SYN packets.
Answer: B,D
Question No: 55 – (Topic 1)
Refer to the exhibit.
After you applied this Ether Channel configuration to a Cisco ASA, the Ether Channel failed to come up. Which reason for the problem is the most likely?
-
The lacp system-priority and lacp port-priority values are the same.
-
The Ether Chanel requires three ports, and only two are configured.
-
The Ether Chanel is disabled.
-
The channel group modes are mismatched
Answer: D
Question No: 56 – (Topic 1)
Which three VSA attributes are present in a RADIUS WLAN Access-Accept packet? (Choose Three)
-
Tunnel-Private-Group-ID
-
Tunnel-Type
-
SSID
-
EAP-Message
-
LEAP Session-Key
-
Authorization-Algorithm-Type
Answer: A,B,C
Question No: 57 – (Topic 1)
Refer to the exhibit,
What are two functionalities of this configuration?(Choose two)
-
Traffic will not be able to pass on gigabit Ethernet 0/1.
-
The ingress command is used for an IDS to send a reset onvlan 3 only.
-
The source interface should always be a VLAN.
-
The encapsulation command is used to deep scan on dotlq encapsulated traffic.
-
Traffic will only be send to gigabit Ethernet 0/20
Answer: B,E
Question No: 58 – (Topic 1)
Which two statement about the Cisco Any Connect VPN Client are true?(Choose two)
-
To improve security, keep alives are disabled by default.
-
It can be configured to download automatically without prompting the user.
-
It can use an SSL tunnel and a DTLS tunnel simultaneously.
-
By default, DTLS connections can fall back to TLS.
-
It enable users to manage their own profiles.
Answer: B,C
Question No: 59 – (Topic 1)
Which effect of theip nhrp map multicast dynamic command is true?
-
It configures a hub router to automatically add spoke routers to multicast replication list of the hub.
-
It enables a GRE tunnel to operate without the IPsec peer or crypto ACLs.
-
It enables a GRE tunnel to dynamically update the routing tables on the devices at each end of the tunnel.
-
It configures a hub router to reflect the routes it learns from a spoke back to other spoke back to other spokes through the same interface.
Answer: A
Question No: 60 – (Topic 1)
Which two characteristics of DTLS are true? (Choose two)
-
It includes a congestion control mechanism
-
It supports long data transfers and connections data transfers
-
It completes key negotiation and bulk data transfer over a single channel
-
It is used mostly by applications that use application layer object-security protocols
-
It includes a retransmission method because it uses an unreliable datagram transport
-
It cannot be used if NAT exists along the path
Answer: A,E
100% Ensurepass Free Download!
–400-251 PDF
100% Ensurepass Free Guaranteed!
–400-251 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |