Approved 400-251 Dumps Questions 2021
Master the 400-251 dumps content and be ready for exam day success quickly with this 400-251 dumps. We guarantee it!We make it a reality and give you real 400-251 dumps in our Cisco 400-251 braindumps. Latest 100% VALID 400-251 dumps at below page. You can use our Cisco 400-251 braindumps and pass your exam.
Check 400-251 free dumps before getting the full version:
NEW QUESTION 1
Which statement is true about a SMURF attack?
- A. The attacker uses spoofed destination address to launch the attack
- B. It sends ICMP Echo Requests to a broadcast address of a subnet
- C. In order to mitigate the attack you need to enable IP directed broadcast on the router interface
- D. It sends ICMP Echo Replies to known IP addresses in a subnet
- E. It is used by the attackers to check if destination addresses are alive
- F. It exhausts the victim machine resources with large number of ICMP Echo Requests from a subnet
Answer: B
NEW QUESTION 2
Which statement is true regarding the wireless security technologies?
- A. WPA provides message integrity using AES
- B. WPA2-PSK mode allows passphrase to store locally on the device
- C. WEP is more secure than WPA2 because it uses AES for encryption
- D. WPA-ENT mode does not require RADIUS for authentication
- E. WPÁ2-PSK mode provides better security by having same passphrase across the network
- F. WPA2 is more secure than WPA because it uses TKIP for encryption
Answer: A
NEW QUESTION 3
Which of the following could be an evasion technique used by the attacker?
- A. Port access using Dot1x
- B. ACL implementation to drop unwanted traffic
- C. TELNET to launch device administration session
- D. Traffic encryption to bypass IPS detection
- E. URL filtering to block malicious sites
- F. NAT translations on routers and switches
Answer: D
NEW QUESTION 4
Refer to the exhibit.
Which two effects of this configuration are true? (Choose two)
- A. User five can execute the show run command.
- B. User five can view usernames and passwords.
- C. User superuser can change usernames and passwords.
- D. User superuser can view the configuration.
- E. User superuser can view usernames and passpords.
- F. User cisco can view usernames and passwords.
Answer: AD
NEW QUESTION 5
Which three statements about SCEP are true? (Choose three.)
- A. It supports online certification revocation.
- B. Cryptographically signed and encrypted messages are conveyed using PKCS#7
- C. It supports multiple cryptographic algorithms including RSA.
- D. The certificate request format uses PKCS#10.
- E. CRL retrieval is supported through CDP(Certificate Distribution Point) queries.
- F. It supports synchronous granting.
Answer: BDE
Explanation: Simple Certificate Enrollment Protocol
http://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/116167-technotescep-00.html
NEW QUESTION 6
196) Which four tasks are needed to configure RSA token authenticate
- A. Generate the sdconf.rec file on the RSA server for the authenticate
- B. Add the ACS server to the allowed ODBC query list on the server
- C. Define an OSBC client connection on the SRA server
- D. On the ACS server, define the ODBC connection and the s RSA server
- E. Define an authentication agent on the RSA server
- F. Add the RSA server as an external identity serve on ACS
- G. Define an accounting agent on the RSA server
- H. Upload the sdconf.rec to the ACS server
Answer: AEFH
NEW QUESTION 7
Refer to the exhibit.
Which two configurations must you perform to enable the device to use this class map? (Choose two)
- A. Configure PDLM
- B. Configure the ip nbar custom command
- C. Configure the ip nbar protocol discovery command
- D. Configure the transport hierarchy
- E. Configure the DSCP value
Answer: BC
NEW QUESTION 8
Exhibit:
Refer to the exhibit, what is the effect of the given service policy
- A. It blockscisco.com, msn.com, and facebct3k.com and permanant
- B. It blocks facebook.com, msn.com, cisco.com and google.com
- C. It blocks all domains except facebook.eom, msn.com, cisco
- D. It blocks all domains except cisco.com, msn, com; and facebook.com
Answer: D
NEW QUESTION 9
Which of the following is part of DevOps virtuous cycle?
- A. Lower Quality
- B. Increased Latency
- C. Slower Releases
- D. Improved Scalability
Answer: D
NEW QUESTION 10
Which statement correctly represents the ACI security principle of Object Model?
- A. It is logical representation of an application and its interdependencies in the network fabric
- B. It is policy placed at the intersection of a source and destination EPGs.
- C. It is defined by the policy applied between EPGs for communication.
- D. lt consists of one or more tenants having multiple contexts.
- E. These are rules and policies used by an EPG to communicate with other EPGs.
- F. It is collection of endpoints representing an application with in a context.
Answer: D
NEW QUESTION 11
Which two statements about DTLS are true? (Choose two.)
- A. If DPD is enabled.DTLS can fall back to a TLS connection.
- B. It is disabled by default if you enable SSL VPN on the interface.
- C. It uses two simultaneous IPSec tunnels to carry traffic.
- D. If DTLS is disabled on an interface, then SSL VPN connections must use SSL/TLS tunnels.
- E. Because if requires two tunnels, it may experience more latency issues than SSL connections.
Answer: AD
NEW QUESTION 12
In which three configurations can SSL VPN be implemented? (Choose three)
- A. CHAP
- B. WebVPN
- C. thin-client .
- D. L2TP over IPsec
- E. PVC tunnel mode
- F. interactive mode
- G. Cisco AnyConnect tunnel mode
- H. clientless
Answer: CGH
NEW QUESTION 13
What are the major components of a Firepower health monitor alert?
- A. The severity level, one or more alert responses, and a remediation policy.
- B. A health monitor, one or more alert responses, and a remediation policy.
- C. One of more health modules, the severity level, and an alert response.
- D. One of more health modules, one or more alert responses, and one or more alert actions.
- E. One health modules and one or more alert responses.
Answer: C
Explanation: Topic 2, Exam Pool B
NEW QUESTION 14
Which statement is true about Remote Triggered Black Hole Filtering feature (RTBH)?
- A. It drops malicious traffic at the customer edge router by forwarding it to a Null0 interface
- B. In RTBH filtering the trigger device redistributes static route to the iBGP peers
- C. The Null0 interface used for filtering is able to receive the traffic, but never forwards it
- D. It works in conjunction with QoS to drop the traffic that has less priority
- E. It helps mitigate DDoS attack based only on source address
- F. In FTBH filtering the trigger device is always an ISP edge router
Answer: B
NEW QUESTION 15
Which two statements about the Cisco FireAMP solution are true? (Choose two.)
- A. It can perform dynamic analysis in the Fire AMP Private Cloud.
- B. The FireAMP Connector can detect malware in network traffic and when files are downloaded.
- C. The FireAMP Private Cloud provides an on-premises option for file disposition lookups and retrospect generation.
- D. The FireAMP Connector is compatible with antivirus software on the endpoint, but you must configure exclusion to prevent the Connector form scanning the antivirus directory.
- E. The FireAMP Connector can provide information about potentially malicious network connections.
- F. The FireAMP Private cloud can act as an anonymized proxy to transport endpoint event data to the public cloud for disposition lookups.e
- G. When a FireAMP Connector detects malware in network traffic, it generates a malware event and a event.
Answer: AC
NEW QUESTION 16
Which OpenStack project has orchestration capabilities?
- A. Cinder
- B. Horizon
- C. Sahara
- D. Heat
Answer: D
NEW QUESTION 17
Which entity is responsible for the Stealthwatch Management Center to interact with ISE?
- A. FMC
- B. DNA
- C. pxGrid
- D. ASA
- E. Threat grid
- F. NGIPs
Answer: CF
NEW QUESTION 18
Which statement about SMTP authentication in a Cisco ESA deployment is true?
- A. It enables users at remote sites to retrieve their email messages via a secure client.
- B. When SMTP authentication with forwarding is performed by a second SMTP server, the second server also performs the transfer of queued messages.
- C. It enables user at remote sites to release email messages for spam quarantine.
- D. If an authentication user belongs to more one LDAP group, each with different user roles.AsyncOs grants permissions in accordance with the least restrictive user role.
- E. Clients can be authenticated with an LDAP bind or by fetching a passphrase attribute
Answer: E
P.S. 2passeasy now are offering 100% pass ensure 400-251 dumps! All 400-251 exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/400-251/ (414 New Questions)