Question: 8
The common device configuration has been assigned to an IPv4 only phone. Which statement describes what happens when the phone attempts to register with Cisco unified Communications manager?
A. The IP phone displays the message 'registration rejected' because it cannot support IPv6
B. The IP phone invokes MTP to translate from ipv4 to IPv6
C. The IP phone ignores the settings and registers with the ipv4 address
D. The IP phone uses SLAAC to acquire an IPv6 address and override the limitation
Answer: A
Cisco 400-251 - Pass CCIE Security Written Exam
Friday, 8 December 2017
Tuesday, 14 November 2017
Cisco 400-251 Exam Questions
Question: 7
Which Two statement about the PCoIP protocol are true? (Choose two)
A. It support both loss and lossless compression
B. It is a client-rendered, multicast-codec protocol.
C. It is available in both software and hardware.
D. It is a TCP-based protocol.
E. It uses a variety of codec to support different operating system.
Answer: A,C
Which Two statement about the PCoIP protocol are true? (Choose two)
A. It support both loss and lossless compression
B. It is a client-rendered, multicast-codec protocol.
C. It is available in both software and hardware.
D. It is a TCP-based protocol.
E. It uses a variety of codec to support different operating system.
Answer: A,C
Thursday, 9 November 2017
Cisco 400-251 Exam Questions
Question: 6
Which encryption type is used by ESA for implementing the Email Encryption?
A. PKI.
B. S/MMIE Encryption.
C. Identity Based Encryption(IBE).
D. TLS.
E. SSL Encryption.
Answer: B
Which encryption type is used by ESA for implementing the Email Encryption?
A. PKI.
B. S/MMIE Encryption.
C. Identity Based Encryption(IBE).
D. TLS.
E. SSL Encryption.
Answer: B
Friday, 27 October 2017
Updated Cisco 400-251 Pdf And 400-251 Dumps
Question: 1
Which two statements about the AES algorithm are true? (Choose two)
A. The AES algorithm is an asymmetric block cipher.
B. The AES algorithm operates on a 128-bits block.
C. The AES algorithm uses a fixed length-key of 128 bits.
D. The AES algorithm does not give any advantage over 3DES due to the same key length.
E. The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption.
Answer: B,E
Question: 2
What are three pieces of data you should review in response to a suspected SSL MITM attack? (Choose three)
A. The IP address of the SSL server
B. The X.509 certificate of the SSL server
C. The MAC address of the attacker
D. The MAC address of the SSL server
E. The X.509 certificate of the attacker
F. The DNS name off the SSL server
Answer: A,B,F
Question: 3
You applied this VPN cluster configuration to n a Cisco ASA and the cluster failed to form. How do you edit the configuration to correct the problem?
A. Define the maximum allowable number of VPN connections.
B. Define the master/slave relationship.
C. Configure the cluster IP address.
D. Enable load balancing.
Answer: C
Question: 4
What are two of the valid IPv6 extension headers? (Choose two)
A. Protocol
B. Options
C. Authentication Header
D. Next Header
E. Mobility
F. Hop Limit
Answer: C,E
Question: 5
What security element must an organization have in place before it can implement a security audit and validate the audit results?
A. firewall
B. network access control
C. an incident response team
D. a security policy
E. a security operation center
Answer: D
Which two statements about the AES algorithm are true? (Choose two)
A. The AES algorithm is an asymmetric block cipher.
B. The AES algorithm operates on a 128-bits block.
C. The AES algorithm uses a fixed length-key of 128 bits.
D. The AES algorithm does not give any advantage over 3DES due to the same key length.
E. The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption.
Answer: B,E
Question: 2
What are three pieces of data you should review in response to a suspected SSL MITM attack? (Choose three)
A. The IP address of the SSL server
B. The X.509 certificate of the SSL server
C. The MAC address of the attacker
D. The MAC address of the SSL server
E. The X.509 certificate of the attacker
F. The DNS name off the SSL server
Answer: A,B,F
Question: 3
You applied this VPN cluster configuration to n a Cisco ASA and the cluster failed to form. How do you edit the configuration to correct the problem?
A. Define the maximum allowable number of VPN connections.
B. Define the master/slave relationship.
C. Configure the cluster IP address.
D. Enable load balancing.
Answer: C
Question: 4
What are two of the valid IPv6 extension headers? (Choose two)
A. Protocol
B. Options
C. Authentication Header
D. Next Header
E. Mobility
F. Hop Limit
Answer: C,E
Question: 5
What security element must an organization have in place before it can implement a security audit and validate the audit results?
A. firewall
B. network access control
C. an incident response team
D. a security policy
E. a security operation center
Answer: D
Cisco 400-251 PDF Real Exam Questions & Answers
Subscribe to:
Comments (Atom)