[Free] 2017(Apr) Ensurepass Passguide Cisco 400-251 Latest Dumps 91-100

Ensurepass
2017 April Cisco Official New Released 400-251 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/400-251.html

CCIE Security Written Exam v5.1

QUESTION 91

You are developing an application to manage the traffic flow of a switch using an OpenDaylight controller. Knowing you use a Northbound REST API, which statement is true?

 

A.

Different applications, even in different languages, cannot use the same functions in a REST API at same time.

B.

The server retains client state records

C.

We must teach our applications about the Southbound protocol(s) used

D.

The applications are considered to be the clients, and the controller is considered to be the server

 

Correct Answer: D

 

 

QUESTION 92

Which option describes the purpose of Fog architecture in loT?

 

A.

To provide compute services at the network edge

B.

To provide intersensor traffic routing

C.

To provide centralized compute resources

D.

To provide highly available environmentally hardened network access

 

Correct Answer: A

 

 

QUESTION 93

What are feature that can stop man-in-the-middle attacks? (Choose two)

 

A.

ARP sniffing on specific ports

B.

ARP spoofing

C.

Dynamic ARP inspection

D.

DHCP snooping

E.

destination MAC ACLs

 

Correct Answer: CD

 

 

QUESTION 94

Which two statements about CoPP are true? (Choose two)

 

A.

When a deny rule in an access list is used for MQC is matched, classification continues on the next class

B.

It allows all traffic to be rate limited and discarded

C.

Access lists that are used with MQC policies for CoPP should omit the log and log-input keywords

D.

The mls qos command disables hardware acceleration so that CoPP handles all QoS

E.

Access lists that use the log keyword can provide information about the device’s CPU usage

F.

The policy-map command defines the traffic class

 

Correct Answer: AC

 

 

QUESTION 95

Refer to the exhibit. Which effect of this configuration is true?

 

clip_image002

 

A.

The WLC accepts self-signed certificates from the RADIUS server to authorize APs.

B.

The WLC adds the MAC addresses listed in the ssc ap-policy to its internal authorization list.

C.

The WLC adds the ssc access point to the auth-list internal authorization list.

D.

The WLC accepts the manufacture-installed certificate from the local access point.

E.

The WLC accepts self-signed certificates from devices added to itsa internal authorization list.

 

Correct Answer: D

 

 

QUESTION 96

DRAG DROP

Drag each IP transmission and fragmentation term on the left to the matching statement on the right.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 97

Which two network protocols can operate on the Application Layer? (Choose two)

 

A.

DNS

B.

UDP

C.

TCP

D.

NetBIOS

E.

DCCP

F.

SMB

 

Correct Answer: AF

 

 

QUESTION 98

Refer to the exhibit, which effect of this configuration is true?

 

clip_image008

 

A.

The PMTUD value sets itself to 1452 bytes when the interface MTU is set to 1492 bytes

B.

SYN packets carries 1452 bytes in the payload when the Ethernet MTU of the interface is set to 1492 bytes

C.

The maximum size of TCP SYN+ACK packets passing the transient host is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes

D.

The MSS to TCP SYN packets is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes

E.

The minimum size of TCP SYN+ACL packets passing the router is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes

 

Correct Answer: D

QUESTION 99

Which of the following statement is true about the ARP spoofing attack?

 

A.

Attacker sends the ARP request with the MAC address and IP address of the legitimate resource in the network.

B.

Attacker of ends the ARP request with MAC address and IP address of its own.

C.

ARP spoofing does not facilitate man in-the-middle attack for the attacker.

D.

Attacker sends the ARP request with its own MAC address and IP address of legitimate resource in the network.

 

Correct Answer: D

 

 

QUESTION 100

Which command can you enter to cause the locally-originated Multicast Source Discovery Protocol Source-Active to be prevented from going to specific peers?

 

A.

ip msdp mesh-group mesh-name {<peer-address>|<peer-name>}

B.

ip msdp redistribute [list <acl>][asn as-access-list][route-map <map>]

C.

ip msdp sa-filter out <peer> [list<acl>] [route-map<map>]

D.

ip msdp default-peer {<peer-address> | <peer-name>}[prefix-list<list>]

E.

< /td>

ip msdp sa-filter in <peer> [list<acl>][route-map <map>]

 

Correct Answer: C

100% Free Download!
—Download Free Demo:400-251 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 400-251 Full Exam PDF and VCE Q&As:315
—Get 10% off your purchase! Copy it:8GTC-8UIE-M1SC [2017.04.01-2017.04.30]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE

HOT EXAM!
Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com