[Free] 2017(Nov) Dumps4cert Testinsides Cisco 400-251 Dumps with VCE and PDF Download 221-230

Dumps4cert 2017 Nov Cisco Official New Released 400-251
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/400-251.html

CCIE Security Written Exam (v5.0)

Question No: 221 – (Topic 2)

On Which encryption algorithm is CCMP based?

  1. IDEA

  2. BLOWFISH

  3. RCS

  4. 3DES

  5. AES

Answer: E

Question No: 222 – (Topic 2)

What are two feature that can be used to drop incoming traffic with spoofed bogon address? (Choose two)

  1. Unicast RPF

  2. ingress ACLs

  3. flexible ACLs

  4. egress ACLs

  5. reflexive ACLs

  6. Source Specific Multicast

Answer: A,B

Explanation: 859)During a DoS attacks all of the data is lost from a user’s laptop and the user must now rebuild the system Which

tool can the user use to extract the outlook PST file from the Microsoft server database?

  1. Eseutil. exe

  2. NTabackup.cex

  3. Exmerge.exe

  4. Ost2st.exe

Answer: C

Question No: 223 – (Topic 2)

What are the two mechanism that are used to authenticate OSPFv3 packets?(Choose two)

  1. MD5

  2. ESP

  3. PLAIN TEXT

  4. AH

  5. SHA

Answer: B,D

Question No: 224 – (Topic 2)

Which two statement about the multicast addresses query message are true?(choose two)

  1. They are solicited when a node initialized the multicast process.

  2. They are used to discover the multicast group to which listeners on a link are subscribed

  3. They are used to discover whether a specified multicast address has listeners

  4. They are send unsolicited when a node initializes the multicast process

  5. They are usually sent only by a single router on a link

  6. They are sent when a node discover a multicast group

Answer: B,C

Question No: 225 – (Topic 2)

Dumps4Cert 2017 PDF and VCE

Refer to the exhibit. What is the effect of the given configuration ?

  1. It reset and logs FTP connection to all sites except cisco.com and hp.com.

  2. FTP connections are unaffected.

  3. It resets FTP connection to all sites except cisco.com and hp.com.

  4. It resets and logs FTP connection to cisco.com and hp.com only.

  5. It resets FPT connection to cisco.com and hp.com only

Answer: A

Question No: 226 – (Topic 2)

Which two statements about the anti-replay feature are true? (Choose two)

  1. By default, the sender uses a single 1024-packet sliding window

  2. By default, the receiver uses a single 64-packet sliding window

  3. The sender assigns two unique sequence numbers to each clear-text packet

  4. The sender assigns two unique sequence numbers to each encrypted packet

  5. the receiver performs a hash of each packet in the window to detect replays

  6. The replay error counter is incremented only when a packet is dropped

Answer: B,D

Question No: 227 – (Topic 2)

When attempting to use basic Http authentication to authenticate a client,which type of HTTP massage should the server use?

  1. HTTP 200 with a WWW-authenticate header.

  2. HTTP 401 with a WWW-authenticate header.

  3. Http 302 with an authenticate header.

  4. HTTP 407.

Answer: B

Question No: 228 – (Topic 2)

From what type of server can you to transfer files to ASA’s internal memory ?

  1. SSH

  2. SFTP

  3. Netlogon

  4. SMB

Answer: D

Question No: 229 – (Topic 2)

Why is the IPv6 type 0 routing header vulnerable to attack?

  1. It allows the receiver of a packet to control its flow.

  2. It allows the sender to generate multiple NDP requests for each packet.

  3. It allows the sender of a packet to control its flow.

  4. It allows the sender to generate multiple ARP requests for each packet.

  5. It allows the receiver of a packet to modify the source IP address.

Answer: C

Question No: 230 – (Topic 2)

Which of the following statement is true about the ARP spoofing attack?

  1. Attacker sends the ARP request with the MAC address and IP address of the legitimate resource in the network.

  2. Attacker of ends the ARP request with MAC address and IP address of its own.

  3. ARP spoofing does not facilitate man in-the-middle attack for the attacker.

  4. Attacker sends the ARP request with its own MAC address and IP address of legitimate resource in the

network.

Answer: D

100% Free Download!
Download Free Demo:400-251 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert 400-251 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE