getcertified4sure.com

Approved 400-251 Dumps Questions 2021




Master the 400-251 dumps content and be ready for exam day success quickly with this 400-251 dumps. We guarantee it!We make it a reality and give you real 400-251 dumps in our Cisco 400-251 braindumps. Latest 100% VALID 400-251 dumps at below page. You can use our Cisco 400-251 braindumps and pass your exam.

Check 400-251 free dumps before getting the full version:

NEW QUESTION 1
Which statement is true about a SMURF attack?

  • A. The attacker uses spoofed destination address to launch the attack
  • B. It sends ICMP Echo Requests to a broadcast address of a subnet
  • C. In order to mitigate the attack you need to enable IP directed broadcast on the router interface
  • D. It sends ICMP Echo Replies to known IP addresses in a subnet
  • E. It is used by the attackers to check if destination addresses are alive
  • F. It exhausts the victim machine resources with large number of ICMP Echo Requests from a subnet

Answer: B

NEW QUESTION 2
Which statement is true regarding the wireless security technologies?

  • A. WPA provides message integrity using AES
  • B. WPA2-PSK mode allows passphrase to store locally on the device
  • C. WEP is more secure than WPA2 because it uses AES for encryption
  • D. WPA-ENT mode does not require RADIUS for authentication
  • E. WPÁ2-PSK mode provides better security by having same passphrase across the network
  • F. WPA2 is more secure than WPA because it uses TKIP for encryption

Answer: A

NEW QUESTION 3
Which of the following could be an evasion technique used by the attacker?

  • A. Port access using Dot1x
  • B. ACL implementation to drop unwanted traffic
  • C. TELNET to launch device administration session
  • D. Traffic encryption to bypass IPS detection
  • E. URL filtering to block malicious sites
  • F. NAT translations on routers and switches

Answer: D

NEW QUESTION 4
Refer to the exhibit.
400-251 dumps exhibit
Which two effects of this configuration are true? (Choose two)

  • A. User five can execute the show run command.
  • B. User five can view usernames and passwords.
  • C. User superuser can change usernames and passwords.
  • D. User superuser can view the configuration.
  • E. User superuser can view usernames and passpords.
  • F. User cisco can view usernames and passwords.

Answer: AD

NEW QUESTION 5
Which three statements about SCEP are true? (Choose three.)

  • A. It supports online certification revocation.
  • B. Cryptographically signed and encrypted messages are conveyed using PKCS#7
  • C. It supports multiple cryptographic algorithms including RSA.
  • D. The certificate request format uses PKCS#10.
  • E. CRL retrieval is supported through CDP(Certificate Distribution Point) queries.
  • F. It supports synchronous granting.

Answer: BDE

Explanation: Simple Certificate Enrollment Protocol
http://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/116167-technotescep-00.html

NEW QUESTION 6
196) Which four tasks are needed to configure RSA token authenticate

  • A. Generate the sdconf.rec file on the RSA server for the authenticate
  • B. Add the ACS server to the allowed ODBC query list on the server
  • C. Define an OSBC client connection on the SRA server
  • D. On the ACS server, define the ODBC connection and the s RSA server
  • E. Define an authentication agent on the RSA server
  • F. Add the RSA server as an external identity serve on ACS
  • G. Define an accounting agent on the RSA server
  • H. Upload the sdconf.rec to the ACS server

Answer: AEFH

NEW QUESTION 7
Refer to the exhibit.
400-251 dumps exhibit
Which two configurations must you perform to enable the device to use this class map? (Choose two)

  • A. Configure PDLM
  • B. Configure the ip nbar custom command
  • C. Configure the ip nbar protocol discovery command
  • D. Configure the transport hierarchy
  • E. Configure the DSCP value

Answer: BC

NEW QUESTION 8
Exhibit:
400-251 dumps exhibit
Refer to the exhibit, what is the effect of the given service policy

  • A. It blockscisco.com, msn.com, and facebct3k.com and permanant
  • B. It blocks facebook.com, msn.com, cisco.com and google.com
  • C. It blocks all domains except facebook.eom, msn.com, cisco
  • D. It blocks all domains except cisco.com, msn, com; and facebook.com

Answer: D

NEW QUESTION 9
Which of the following is part of DevOps virtuous cycle?

  • A. Lower Quality
  • B. Increased Latency
  • C. Slower Releases
  • D. Improved Scalability

Answer: D

NEW QUESTION 10
Which statement correctly represents the ACI security principle of Object Model?

  • A. It is logical representation of an application and its interdependencies in the network fabric
  • B. It is policy placed at the intersection of a source and destination EPGs.
  • C. It is defined by the policy applied between EPGs for communication.
  • D. lt consists of one or more tenants having multiple contexts.
  • E. These are rules and policies used by an EPG to communicate with other EPGs.
  • F. It is collection of endpoints representing an application with in a context.

Answer: D

NEW QUESTION 11
Which two statements about DTLS are true? (Choose two.)

  • A. If DPD is enabled.DTLS can fall back to a TLS connection.
  • B. It is disabled by default if you enable SSL VPN on the interface.
  • C. It uses two simultaneous IPSec tunnels to carry traffic.
  • D. If DTLS is disabled on an interface, then SSL VPN connections must use SSL/TLS tunnels.
  • E. Because if requires two tunnels, it may experience more latency issues than SSL connections.

Answer: AD

NEW QUESTION 12
In which three configurations can SSL VPN be implemented? (Choose three)

  • A. CHAP
  • B. WebVPN
  • C. thin-client .
  • D. L2TP over IPsec
  • E. PVC tunnel mode
  • F. interactive mode
  • G. Cisco AnyConnect tunnel mode
  • H. clientless

Answer: CGH

NEW QUESTION 13
What are the major components of a Firepower health monitor alert?

  • A. The severity level, one or more alert responses, and a remediation policy.
  • B. A health monitor, one or more alert responses, and a remediation policy.
  • C. One of more health modules, the severity level, and an alert response.
  • D. One of more health modules, one or more alert responses, and one or more alert actions.
  • E. One health modules and one or more alert responses.

Answer: C

Explanation: Topic 2, Exam Pool B

NEW QUESTION 14
Which statement is true about Remote Triggered Black Hole Filtering feature (RTBH)?

  • A. It drops malicious traffic at the customer edge router by forwarding it to a Null0 interface
  • B. In RTBH filtering the trigger device redistributes static route to the iBGP peers
  • C. The Null0 interface used for filtering is able to receive the traffic, but never forwards it
  • D. It works in conjunction with QoS to drop the traffic that has less priority
  • E. It helps mitigate DDoS attack based only on source address
  • F. In FTBH filtering the trigger device is always an ISP edge router

Answer: B

NEW QUESTION 15
Which two statements about the Cisco FireAMP solution are true? (Choose two.)

  • A. It can perform dynamic analysis in the Fire AMP Private Cloud.
  • B. The FireAMP Connector can detect malware in network traffic and when files are downloaded.
  • C. The FireAMP Private Cloud provides an on-premises option for file disposition lookups and retrospect generation.
  • D. The FireAMP Connector is compatible with antivirus software on the endpoint, but you must configure exclusion to prevent the Connector form scanning the antivirus directory.
  • E. The FireAMP Connector can provide information about potentially malicious network connections.
  • F. The FireAMP Private cloud can act as an anonymized proxy to transport endpoint event data to the public cloud for disposition lookups.e
  • G. When a FireAMP Connector detects malware in network traffic, it generates a malware event and a event.

Answer: AC

NEW QUESTION 16
Which OpenStack project has orchestration capabilities?

  • A. Cinder
  • B. Horizon
  • C. Sahara
  • D. Heat

Answer: D

NEW QUESTION 17
Which entity is responsible for the Stealthwatch Management Center to interact with ISE?

  • A. FMC
  • B. DNA
  • C. pxGrid
  • D. ASA
  • E. Threat grid
  • F. NGIPs

Answer: CF

NEW QUESTION 18
Which statement about SMTP authentication in a Cisco ESA deployment is true?

  • A. It enables users at remote sites to retrieve their email messages via a secure client.
  • B. When SMTP authentication with forwarding is performed by a second SMTP server, the second server also performs the transfer of queued messages.
  • C. It enables user at remote sites to release email messages for spam quarantine.
  • D. If an authentication user belongs to more one LDAP group, each with different user roles.AsyncOs grants permissions in accordance with the least restrictive user role.
  • E. Clients can be authenticated with an LDAP bind or by fetching a passphrase attribute

Answer: E

P.S. 2passeasy now are offering 100% pass ensure 400-251 dumps! All 400-251 exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/400-251/ (414 New Questions)