Friday, 8 December 2017

Latest Cisco 400-251 Questions

Question: 8

The common device configuration has been assigned to an IPv4 only phone. Which statement describes what happens when the phone attempts to register with Cisco unified Communications manager?

A. The IP phone displays the message 'registration rejected' because it cannot support IPv6
B. The IP phone invokes MTP to translate from ipv4 to IPv6
C. The IP phone ignores the settings and registers with the ipv4 address
D. The IP phone uses SLAAC to acquire an IPv6 address and override the limitation

Answer: A

Tuesday, 14 November 2017

Cisco 400-251 Exam Questions

Question: 7

Which Two statement about the PCoIP protocol are true? (Choose two)

A. It support both loss and lossless compression
B. It is a client-rendered, multicast-codec protocol.
C. It is available in both software and hardware.
D. It is a TCP-based protocol.
E. It uses a variety of codec to support different operating system.

Answer: A,C

Thursday, 9 November 2017

Cisco 400-251 Exam Questions

Question: 6

Which encryption type is used by ESA for implementing the Email Encryption?

A. PKI.
B. S/MMIE Encryption.
C. Identity Based Encryption(IBE).
D. TLS.
E. SSL Encryption.

Answer: B

Friday, 27 October 2017

Updated Cisco 400-251 Pdf And 400-251 Dumps

Question: 1

Which two statements about the AES algorithm are true? (Choose two)

A. The AES algorithm is an asymmetric block cipher.
B. The AES algorithm operates on a 128-bits block.
C. The AES algorithm uses a fixed length-key of 128 bits.
D. The AES algorithm does not give any advantage over 3DES due to the same key length.
E. The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption.

Answer: B,E

Question: 2

What are three pieces of data you should review in response to a suspected SSL MITM attack? (Choose three)
A. The IP address of the SSL server
B. The X.509 certificate of the SSL server
C. The MAC address of the attacker
D. The MAC address of the SSL server
E. The X.509 certificate of the attacker
F. The DNS name off the SSL server

Answer: A,B,F

Question: 3

You applied this VPN cluster configuration to n a Cisco ASA and the cluster failed to form. How do you edit the configuration to correct the problem?
A. Define the maximum allowable number of VPN connections.
B. Define the master/slave relationship.
C. Configure the cluster IP address.
D. Enable load balancing.
Answer: C

Question: 4

What are two of the valid IPv6 extension headers? (Choose two)

A. Protocol
B. Options
C. Authentication Header
D. Next Header
E. Mobility
F. Hop Limit

Answer: C,E

Question: 5

What security element must an organization have in place before it can implement a security audit and validate the audit results?

A. firewall
B. network access control
C. an incident response team
D. a security policy
E. a security operation center

Answer: D

Cisco 400-251 PDF Real Exam Questions & Answers