Cisco 400-251 Exam Dumps 2019

400-251 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!

Download 400-251 Dumps Free

Product Description:
Exam Number/Code: 400-251
Exam name: CCIE Security Written Exam
n questions with full explanations
Certification: Cisco Certification

HOW TO GET 400-251 Exam PDF Collection Free?

Proper study guides for 400-251 CCIE Security Written Exam certified begins with 400-251 dumps preparation products which designed to deliver the 400-251 dumps by making you pass the 400-251 test at your first time. Try the free 400-251 dumps right now.

Check 400-251 free dumps before getting the full version:

If multiple contexts share an ingress interface, which would be the criteria used by ASA for packet classification?

  • A. Destination IP address
  • B. ASA ingress interface IP address
  • C. ASA ingress interface unique MAC address
  • D. ASA NAT configuration
  • E. Policy based routing on ASA
  • F. ASA egress interface IP address
  • G. Destination MAC address

Answer: C

Refer to the exhibit.
400-251 dumps exhibit
What is the effect of the given command?
control-plane host
management-interface FastEhternet 0/0 allow ssh snmp

  • A. It enables CoPP on the FastEthernet 0/0 interface for SSH and SNMP management traffic.
  • B. It enables QoS policing on the control plane of the FastEthernet 0/0 interface.
  • C. It enables MPP on the FastEthernet 0/0 interface, allowing only SSH and SNMP management traffic.
  • D. It enables MPP on the FastEthernet 0/0 interface by enforcing rate-limiting for SSH and SNMP management traffic.
  • E. It enables MPP on the FastEthernet 0/0 interface for SNMP management traffic and CoPP for all other protocols.

Answer: C

Which two statements about the TTL value in an IPv4 header are true? (Choose two)

  • A. It is a 4-bit value.
  • B. It can be used for traceroute operations.
  • C. When it reaches 0, the router sends an ICMP Type 11 message to the originator.
  • D. Its maximum value is 128.
  • E. It is a 16-bit value.

Answer: BC

Which three statements about RLDP are true? (Choose three.)

  • A. It detects rogue access points that are connected to the wired network.
  • B. It can detect rogue APs that use WPA encryption.
  • C. It can detect rogue APs operating only on 5 GHz.
  • D. It can detect rogue APs that use WEP encryption.
  • E. The AP is unable to serve clients while the RLDP process is active.
  • F. Active Rogue Containment can be initiated manually against rogue devices detected on the wired network.

Answer: AEF

Explanation: Rogue Location Discovery Protocol (RLDP)

Which statement is correct regarding password encryption and integrity on a Cisco IOS device?

  • A. With “enable secret” missing in the configuration the console session cannot get privilege access using console password due to missing encryption
  • B. The “enable password” is preferred over “enable secret” as it uses a stronger encryption algorithm
  • C. The “service password-encryption” global command encrypts all the passwords except the CHAP secret
  • D. The “username <name> secret <password>” command encrypts the password with SHA-256 hashing
  • E. The “enable secret” uses MD5 for the password hashing
  • F. The “service password-encryption” global command performs both encryption and hashing of all the passwords

Answer: E

Which two types of IPv6 capabilities does Cisco ISE release 2.0 support? (Choose two.)

  • A. Enable DHCP for IPv6
  • B. Ability to add IPv6 addresses in host local table
  • C. Ability to only detect IPv6 traffic from endpoint
  • D. Ability to traceroute IPv6
  • E. Ability to configure IPv6 static routes

Answer: BE

In a large organization, with thousands of employees scattered across the globe, it is difficult to provision and onboard new employee device with the correct profiles and certificates. With ISE, it is possible to do that with client provided device. Which four conditions must be met? (Choose four.)

  • A. Endpoint operating system should be supported
  • B. Client provisioning is enabled on ISE
  • C. The pxGrid controller should be enabled on ISE
  • D. Device MAC addresses are added to the Endpoint Identity Group
  • E. Profiling is enabled on ISE
  • F. SCEP Proxy is enabled on ISE
  • G. Microsoft windows server is configured with certificate services
  • H. ISE should be configured as SXP listener to push SGT-to-IP mapping to network access devices
  • I. Network access device and ISE should have the PAC provisioning for CTS environment authentication

Answer: BDEF

On a Cisco Wireless LAN Controller (WLC), which web policy enables failed Layer 2 authentication to fall back to WebAuth authentication with a user name and password?

  • A. On MACFilter Failure
  • B. Passthrough
  • C. Splash Page Web Redirect
  • D. Conditional Web Redirect
  • E. Authentication

Answer: A

Refer to the exhibit.
400-251 dumps exhibit
A user authenticates to the NAS , which communicates to the TACACS+ sever for
authentication. The TACACS+ server then accesses the Active Directory Server through the firewall to validate the user credentials. Which protocol-port pair must be allow access through the ASAFirewall?

  • A. SMB over TCP 455
  • B. DNS over UDP 53
  • C. LDAP over UDP 389
  • D. global catalog over UDP 3268
  • E. TACACS+ over TCP 49
  • F. DNS over TCP 53

Answer: C

Which two statements about a wireless access point configured with the guest-mode command are true? (Choose two.)

  • A. It can support more than one guest-mode SSID.
  • B. It supports associations by clients that perform passive scans.
  • C. It allows clients configured without SSIDs to associate.
  • D. It allows associated clients to transmit packets using its SSID.
  • E. If one device on a network is configure in guest-mode, clients can use the guest-mode SSID to connect to any device in the same network.

Answer: BC

Which two statements about the MACsec security protocol are true? (Choose two.)

  • A. When switch-to-switch link security is configured in manual mode, the SAP operation mode must be set to GCM.
  • B. MACsec is not supported in MDA mode.
  • C. Stations broadcast an MKA heartbeat that contains the key server priority.
  • D. MKA heartbeats are sent at a default interval of 3 seconds.
  • E. The SAK is secured by 128 bit AES-GCM by default.

Answer: CE

Which statement about the Cisco AMP Virtual Private Cloud Appliance is true for deployments in cloudproxy mode?

  • A. The appliance can perform disposition lookups against the Protect DB without an internet connection
  • B. The amp-sync tool syncs the threat-intelligence repository on the appliance on the AMP public cloud through the Update Host
  • C. The appliance can automatically download threat-intelligence updates directly from the AMP public cloud
  • D. The updates Host automatically downloads updates and deploys them to the Protect DB on a daily basis
  • E. The appliance communicates directly with the endpoint connectors only

Answer: C

Which statement about the Traffic Substitution and Insertion attack is true?

  • A. It substitutes by performing action slower than normal not exceeding threshol
  • B. It is used for reconnaissance
  • C. It substitutes payload data in a different format but has the same meaning
  • D. It is form of a DoS attack
  • E. It substitutes payload data in the same format but has different meaning
  • F. It substitutes by performing action faster than normal not exceeding threshold
  • G. It is a from pivoting in the network

Answer: C

Refer to the exhibit.
***Missing Exhibit***
AMP cloud is configured to report AMP connector scan events from windows machine
belonging to "Audit" group to FMC, but the scanned events are not showing up in FMC. What could be the possible cause?

  • A. AMP cloud is pointing to incorrect FMC address
  • B. Possible issues with certificate download form AMP cloud fro FMC integration
  • C. Incorrect group is selected for the events export in AMP cloud for FMC
  • D. Event should be viewed as "Malware" event in FMC
  • E. DNS address is misconfigured on FMC
  • F. FMC is pointing to incorrect AMP cloud address

Answer: D

Within Platform as a Service, which two components are managed by the customer? (Choose two.)

  • A. Data
  • B. networking
  • C. middleware
  • D. applications
  • E. operating system

Answer: AD

Which IPS deployment mode is most reliant on the Automatic Application Bypass feature?

  • A. Passive
  • B. Strict
  • C. transparent
  • D. switched
  • E. tap
  • F. inline

Answer: F

P.S. Surepassexam now are offering 100% pass ensure 400-251 dumps! All 400-251 exam questions have been updated with correct answers: (414 New Questions)

[TRY FREE] BUY 400-251 Full version( pdf+software ):