[Free] 2019(Nov) EnsurePass Cisco 400-251 Dumps with VCE and PDF 121-130

Get Full Version of the Exam

Question No.121

Which two statements about the Cisco FireAMP solution are true? (Choose two.)

  1. It can perform dynamic analysis in the Fire AMP Private Cloud.

  2. The FireAMP Connector can detect malware in network traffic and when files are downloaded.

  3. The FireAMP Private Cloud provides an on-premises option for file disposition lookups and retrospect generation.

  4. The FireAMP Connector is compatible with antivirus software on the endpoint, but you must configure exclusion to prevent the Connector form scanning the antivirus directory.

  5. The FireAMP Connector can provide information about potentially malicious network connections.

  6. The FireAMP Private cloud can act as an anonymized proxy to transport endpoint event data to the public cloud for disposition lookups.e

  7. When a FireAMP Connector detects malware in network traffic, it generates a malware event and a event.

Correct Answer: AC

Question No.122

Which option is a benefit of VRF Selection Using Policy-Based Routing for routing for packets to different VPNs?

  1. It suppprts more than one VPN per interface

  2. It allows bidirectional traffic flow between the service provider and the CEs

  3. It automatically enables fast switching on all directly connected interfaces

  4. It can use global routing tables to forward packets if the destination address matches the VRF configure on the interface

  5. Every PE router in the service provider MPLS cloud can reach every customer network

  6. It inreases the router performance when longer subnet masks are in use

Correct Answer: D

Question No.123

Which two statements about Cisco AMP for Web Security are true? (Choose two)

  1. It can detect and block malware and other anomalous traffic before it passes through the Web gateway.

  2. It can identify anomalous traffic passing through the Web gateway by comparing it to an established baseline of expected activity

  3. It can perform file analysis by sandboxing known malware and comparing unknown files to a local repository of threats

  4. It continues monitoring files after they pass the Web gateway

  5. It can prevent malicious data exfiltration by blocking critical files from exiting through the Web gateway

  6. It can perform reputation-based evaluation and blocking by uploading of incoming files to a cloud- based threat intelligence network

Correct Answer: DF

Question No.124

Your customer wants to implement Cisco Firepower IPS and 1 secure policy. However, a monitoring period of 2 weeks is applied against real traffic without causing an outage before going in to fu of the default policies as a base and set the policy action to ensure. Which two policies to achieve these requirements are true?

  1. Set IPs policy to trust

  2. Set IPs policy to Monitor

  3. Base the IPS policy on the default Advanced Security over Connection

  4. Base the IPS policy on the default Balanced Security and Connection

  5. Base the IPS policy on the default Connectivity over Security

  6. Base the IPS policy on the default Security over Connectivity

  7. Set IPS Policy to No Drop

Correct Answer: BD

Question No.125

Refer to the exhibit. Which statement about router R1 is true?


  1. Its NVRAM contains public and private crypto keys

  2. RMON is configured

  3. Its private-config is corrupt

  4. Its startup configuration is missing

  5. It running configuration is missing

Correct Answer: A


https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/50282- ios-caios.html

Question No.126

Which two statements about DTLS are true? (Choose two.)

  1. If DPD is enabled.DTLS can fall back to a TLS connection.

  2. It is disabled by default if you enable SSL VPN on the interface.

  3. It uses two simultaneous IPSec tunnels to carry traffic.

  4. If DTLS is disabled on an interface, then SSL VPN connections must use SSL/TLS tunnels.

  5. Because if requires two tunnels, it may experience more latency issues than SSL connections.

Correct Answer: AD

Question No.127

What technique can an attacker use to obfuscate a malware application payload, allowing it to bypass standard security mechanisms?

  1. Teredo tunneling

  2. A PE32 header

  3. Steganography

  4. BASE64

  5. Decryption

Correct Answer: D

Question No.128

Which three flow protocols can tie SealthWatch System use lo monitor potential security threats? (Choose two)

  1. OpenFlow

  2. Ntop

  3. IPFIX

  4. NetFlow

  5. sFlow

  6. Jflow

Correct Answer: CDE

Question No.129

In a Cisco ISR with cloud Web Security Connector deployment, which command can you enter on the Cisco ISR G2 to verify connectivity to the CWS tower?

  1. Show policy-map

  2. Show service-policy

  3. Show ip nbar

  4. Show sw-module

  5. Mtrace

  6. Show content-scan summary

Correct Answer: A

Question No.130

Which command sequence can you enter to enable IP multicast for WCCPv2?

  1. Router(config)#ip wccp web-cache group-address Router(config)# interface FastEthernet0/0

    Router(config-if)#ip wccp web-cache redirect out

  2. Router(config)#ip wccp web-cache group-list Router(config)# interface FastEthernet0/0 Router(config)# ip wccp web-cache group-listen

  3. Router(config)#ip wccp web-cache service-list Router(config)# interface FastEthernet0/0 Router(config)# ip wccp web-cache group-listen

  4. Router(config)#ip wccp web-cache group-address Router(config)# interface FastEthernet0/0

    Router(config)# ip wccp web-cache redirect in

  5. Router(config)#ip wccp web-cache group-address Router(config)# interface FastEthernet0/0

Router(config)# ip wccp web-cache group-listen

Correct Answer: E

Get Full Version of the Exam
400-251 Dumps
400-251 VCE and PDF

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com