This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Fri Nov 22 0:23:07 2024 / +0000 GMT ___________________________________________________ Title: [2017-New]Cisco 400-251 VCE PDF Dumps Free Download in Braindump2go[Q116-Q130] --------------------------------------------------- 2017 CISCO Official News: 350-018 Exam is Replaced by 400-251 Written Exam Now! 2017 New 400-251: CCIE Security Written Exam v5.1 PDF and VCE Dumps Just Released Today by Braindump2go.com! 1.|2017 NEW 400-251 Written Exam Dumps (PDF & VCE) 1106Q&As  Download:http://www.braindump2go.com/400-251.html 2.|2017 NEW 400-251 Written Exam Questions & Answers:http://www.braindump2go.com/400-251.html   QUESTION 116A server with Ip address 209.165.202.150 is protected behind the inside of a cisco ASA or PIX security appliance and the internet on the outside interface. User on the internet need to access the server at any time but the firewall administrator does not want to apply NAT to the address of the server because it is currently a public address, which three of the following command can be used to accomplish this? (Choose three) A.    static (inside,outside) 209.165.202.150 209.165.202.150 netmask 255.255.255.2"B.    nat (inside) 1 209.165.202.150 255.255.255.255C.    no nat-controlD.    nat (inside) 0 209.16S.202.150 255.255.255.255E.    static (outside.insid) 209.165.202.150 209.165.202.150 netmask 255.255.255.255F.    access-tist no-nat permit ip host 209.165.202.150 any nat (inside) 0 access-list no-nat Answer: ADF QUESTION 117Which three statements about RLDP are true? (Choose three) A.    It can detect rogue Aps that use WPA encryptionB.    It detects rogue access points that are connected to the wired networkC.    The AP is unable to serve clients while the RLDP process is activeD.    It can detect rogue APs operating only on 5 GHzE.    Active Rogue Containment can be initiated manually against rogue devices detected on the wired networkF.    It can detect rogue APs that use WEP encryption Answer: ABD QUESTION 118Which Cisco ASA firewall mode supports ASDM one-time-password authentication using RSA SecurID? A.    Network translation modeB.    Single-context routed modeC.    Multiple-context modeD.    Transparent mode Answer: B QUESTION 119Refer to the exhibit. A signature failed to compile and returned the given error messages.What is a possible reason for the problem?  A.    The signature belongs to the IOS IPS Basic category.B.    The signature belongs to the IOS IPS Advanced category.C.    There is insufficient memory to compile the signature.D.    The signature is retired.E.    Additional signature must be complied during the compiling process. Answer: C QUESTION 120Which command sequence can you enter to enable IP multicast for WCCPv2? A.    Router(config)#ip wccp web-cache service-list Router(config)#interface FastEthernet0/0Router(config)#ip wccp web-cache group-listenB.    Router(config)#ip wccp web-cache group-listRouter(config)#interface FastEthernet0/0Router(config)#ip wccp web-cache group-listenC.    Router(config)#ip wccp web-cache group-address 224.1.1.100 Router(config)#interface FastEthernet0/0Router(config)#ip wccp web-cache redirect inD.    Router(config)#ip wccp web-cache group-address 224.1.1.100 Router(config)#interface FastEthernet0/0Router(config)#ip wccp web-cache group-listenE.    Router(config)#ip wccp web-cache group-address 224.1.1.100 Router(config)#interface FastEthernet0/0Router(config)#ip wccp web-cache redirect out Answer: D QUESTION 121The computer at 10.10.10.4 on your network has been infected by a botnet that directs traffic to a malware site at 168.65.201.120. Assuming that filtering will be performed on a Cisco ASA.What command can you use to block all current and future connections from the infected host? A.    ip access-list extended BLOCK_BOT_OUT deny ip any host 10.10.10.4B.    shun 10.10.10.4 168.65.201.120 6000 80C.    ip access-list extended BLOCK_BOT_OUT deny ip host 10.10.10.4 host 168.65.201.120D.    ip access-list extended BLOCK_BOT_OUT deny ip host 168.65.201.120 host 10.10.10.4E.    shun 168.65.201.120 10.10.10.4 6000 80 Answer: C QUESTION 122IKEv2 provide greater network attack resiliency against a DoS attack than IKEv1 by utilizing which two functionalities?(Choose two) A.    with cookie challenge IKEv2 does not track the state of the initiator until the initiator respond with cookie.B.    Ikev2 perform TCP intercept on all secure connectionsC.    IKEv2 only allows symmetric keys for peer authenticationD.    IKEv2 interoperates with IKEv1 to increase security in IKEv1E.    IKEv2 only allows certificates for peer authenticationF.    An IKEv2 responder does not initiate a DH exchange until the initiator responds with a cookie Answer: AF QUESTION 123Which five of these are criteria for rule-based rogue classification of access points by the cisco Wireless LAN controller? (Choose five) A.    MAC address rangeB.    MAC address range number of clients it hasC.    open authenticationD.    whether it matches a user-configured SSIDE.    whether it operates on an authorized channelF.    minimum RSSIG.    time of day the rogue operatesH.    Whether it matches a managed AP SSID Answer: BCDFH QUESTION 124Which two statement about the DES algorithm are true?(Choose two) A.    It uses a 64-bit key block size and its effective key length is 65 bitsB.    It uses a 64-bits key block size and its effective key length is 56 bitsC.    It is a stream cripher that can be used with any size inputD.    It is more efficient in software implements than hardware implementations.E.    It is vulnerable to differential and linear cryptanalysisF.    It is resistant to square attacks Answer: BE QUESTION 125Which three types of addresses can the Botnet Traffic Filter feature of the Cisco ASA monitor? (Choose three)   A.    Ambiguous addressesB.    Known malware addressesC.    Listed addressesD.    Dynamic addressesE.    Internal addressesF.    Known allowed addresses Answer: ABF QUESTION 126Which Three statement about cisco IPS manager express are true? (Choose three) A.    It provides a customizable view of events statistics.B.    It Can provision policies based on risk rating.C.    It Can provision policies based on signatures.D.    It Can provision policies based on IP addresses and ports.E.    It uses vulnerability-focused signature to protect against zero-day attacks.F.    It supports up to 10 sensors. Answer: ABF QUESTION 127In Cisco Wireless LAN Controller (WLC. which web policy enables failed Layer 2 authentication to fall back to WebAuth authentication with a user name and password? A.    On MAC Filter FailureB.    Pass throughC.    Splash Page Web RedirectD.    Conditional Web RedirectE.    Authentication Answer: A QUESTION 128Drag and Drop QuestionDrag and drop each syslog facility code on the left onto its description on the right. Answer:   QUESTION 129Refer to the exhibit. What is the effect of the given configuration?  A.    It reset and logs FTP connection to all sites except cisco.com and hp.com.B.    FTP connections are unaffected.C.    It resets FTP connection to all sites except cisco.com and hp.com.D.    It resets and logs FTP connection to cisco.com and hp.com only.E.    It resets FPT connection to cisco.com and hp.com only Answer: A QUESTION 130What port has IANA assigned to the GDOI protocol ? A.    UDP 4500B.    UDP 1812aC.    UDP 500D.    UDP 848 Answer: D !!! RECOMMEND!!! 1.|2017 NEW 400-251 Exam Dumps (PDF & VCE) 1106Q&As  Download:http://www.braindump2go.com/400-251.html 2.|2017 NEW 400-251 Study Guide Video: YouTube Video: YouTube.com/watch?v=GSXnXKIh834 --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-02-15 06:52:10 Post date GMT: 2017-02-15 06:52:10 Post modified date: 2017-02-15 06:52:10 Post modified date GMT: 2017-02-15 06:52:10 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com