[Free] 2017(Apr) Ensurepass Passguide Cisco 400-251 Latest Dumps 31-40

Ensurepass
2017 April Cisco Official New Released 400-251 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/400-251.html

CCIE Security Written Exam v5.1

QUESTION 31

What is the effect of the following command on Cisco IOS router?

 

ip dns spoofing 1.1.1.1

 

A.

The router will respond to the DNS query with its highest loopback address configured

B.

The router will respond to the DNS query with 1.1.1.1 if the query id for its own hostname

C.

The router will respond to the DNS query with the IP address of its incoming interface for any hostname query

D.

The router will respond to the DNS query with the IP address of its incoming interface for its own hostname

 

Correct Answer: D

 

 

QUESTION 32

Which two options are differences between automation and orchestration? (Choose two.)

 

A.

Automation is to be used to replace human intervention

B.

Automation is focused on automating a single or multiple tasks

C.

Orchestration is focused on an end-to-end process or workflow

D.

Orchestration is focused on multiple technologies to be integrated together

E.

Automation is an IT workflow composed of tasks, and Orchestration is a technical task

 

Correct Answer: BC

 

 

QUESTION 33

Refer to the exhibit. What is the effect of the given configuration?

 

clip_image002

 

A.

It sets the duplicate address detection interval to 60 second and sets the IPv6 neighbor reachable time to 3600 milliseconds.

B.

It sets the number of neighbor solicitation massages to 60 and sets the retransmission interval to 3600 milliseconds.

C.

It sets the number of duplicate address detection attempts to 60 and sets the duplicate address detection interval to 3600 millisecond.

D.

It sets the number of neighbor solicitation massage to 60 and set the duplicate address detection interval to 3600 second.

E.

It sets the duplicate address detection interval to 60 second and set the IPv6 neighbor solicitation interval to 3600 millisecond.

 

Correct Answer: E

 

 

QUESTION 34

What are two characteristics of RPL, used in loT environments? (Choose two)

 

A.

It is an Exterior Gateway Protocol

B.

It is a Interior Gateway Protocol

C.

It is a hybrid protocol

D.

It is link-state protocol

E.

It is a distance-vector protocol

 

Correct Answer: BE

 

 

QUESTION 35

In a Cisco ASA multiple-context mode of operation configuration, what three session types are resource- limited by default when their context is a member of the default class? (Choose three)

 

A.

Telnet sessions

B.

ASDM sessions

C.

IPSec sessions

D.

SSH sessions

E.

TCP sessions

F.

SSL VPN sessions

 

Correct Answer: ABD

 

 

QUESTION 36

Which VPN technology is based on GDOI (RFC 3547)?

 

A.

MPLS Layer 3 VPN

B.

MPLS Layer 2 VPN

C.

GET VPN

D.

IPsec VPN

 

Correct Answer: CQUESTION 37

DRAG DROP

Drag each OSPF security feature on the left to its description on the right.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 38

Which of the following two statements apply to EAP-FAST? (Choose two.)< /font>

 

A.

EAP-FAST is useful when a strong password policy cannot be enforced and an 802.1X EAP type that does not require digital certificates can be deployed.

B.

EAP-FAST was developed only for Cisco devices and is not compliant with 802.1X and 802.11i.

C.

EAP-FAST provides protection from authentication forging and packet forgery (replay attack).

D.

EAP-FAST is a client/client security architecture.

 

Correct Answer: AC

 

 

QUESTION 39

On an ASA firewall in multiple context mode running version8.X .What is the default number of VPN site-to site tunnels per context?

 

A.

0 sessions

B.

2 sessions

C.

1 sessions

D.

4 sessions

 

Correct Answer: B

QUESTION 40

Which two statements about WPA 2 in enterprise mode are true? (Choose two)

 

A.

TKIP generates a MCI to provide data integrity for the wireless frame.

B.

The PMK is generated dynamically by the servers and passed to the access point.

C.

802.1x authentication is performed in the second of two authentication phases.

D.

It is commonly used in home environments as well as enterprises.

E.

802.1x authentication is performed in the first of two authentication phases.

F.

Session keys can be shared with multiple clients.

 

Correct Answer: BE

100% Free Download!
—Download Free Demo:400-251 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 400-251 Full Exam PDF and VCE Q&As:315
—Get 10% off your purchase! Copy it:8GTC-8UIE-M1SC [2017.04.01-2017.04.30]

Instant Download
Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Yes No No

2017 Ensurepass IT Certification PDF and VCE

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com