aiotestking uk

400-251 Exam Questions - Online Test


400-251 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. What are two characteristics of RPL, used in loT environments? (Choose two)

A. It is an Exterior Gateway Protocol

B. It is a Interior Gateway Protocol

C. It is a hybrid protocol

D. It is link-state protocol

E. It is a distance-vector protocol

Answer: B,E

Q2. What are three protocol that support layer 7 class maps and policy maps for zone based firewalls? (choose three)

A. IMAP

B. RDP

C. MME

D. ICQ

E. POP3

F. IKE

Answer: A,D,E

Q3. Which command can you enter to cause the locally-originated Multicast Source Discovery Protocol Source- Active to be prevented from going to specific peers?

A. ip msdp mesh-group mesh-name {<peer-address>|<peer-name>}

B. ip msdp redistribute [list <acl>][asn as-access-list][route-map <map>]

C. ip msdp sa-filter out <peer> [list<acl>] [route-map<map>]

D. ip msdp default-peer {<peer-address> | <peer-name>}[prefix-list<list>]

E. ip msdp sa-filter in <peer> [list<acl>][route-map <map>]

Answer: C

Q4. Which statement regarding the routing functions of the Cisco ASA is true running software version 9.2?

A. In a failover pair of ASAs, the standby firewall establishes a peer relationship with OSPF neighbors

B. The ASA supports policy-based routing with route maps

C. Routes to the Null0 interface cannot be configured to black-hole traffic

D. The translations table cannot override the routing table for new connections

Answer: C

Q5. Refer to the exhibit. 

After you configured routes R1 and R2 for IPv6 OSPFv3 authentication as shown, the OSPFv3 neighbor adjacency failed to establish. What is a possible reason for the problem?

A. R2 received a packet with an incorrect area form the loopback1 interface

B. OSPFv3 area authentication is missing

C. R1 received a packet with an incorrect area from the FastEthernet0/0 interface

D. The SPI and the authentication key are unencrypted

E. The SPI value and the key are the same on both R1 and R2

Answer: C

Q6. when a host initiates a TCP session, what is the numerical range into which the initial sequence number must fail?

A. 0 to 65535

B. 1 to 1024

C. 0 to 4,294,967,295

D. 1 to 65535

E. 1 to 4,294,967,295

F. 0 to 1024

Answer: C

Q7. What is the purpose of the vulnerability risk method for assessing risk?

A. It directs the actions an organization can take in response to a reported vulnerability

B. It evaluates the effectiveness and appropriateness of an organization’s current risk management activities

C. It directs the actions an organization can take to ensure perimeter security

D. It prevents and protects against security vulnerabilities in an organization

E. It establishes a security team to perform forensic examinations of known attacks

Answer: C

Q8. Which two statements about Network Edge Authentication Technology (NEAT) are true? (Choose two)

A. It requires a standard ACL on the switch port

B. It conflicts with auto-configuration

C. It allows you to configure redundant links between authenticator and supplicant switches

D. It supports port-based authentication on the authenticator switch

E. It can be configured on both access ports and trunk ports

F. It can be configured on both access ports and EtherChannel ports

Answer: D,E

Q9. What protocol does IPv6 Router Advertisement use for its messages?

A. TCP

B. ICMPv6

C. ARP

D. UDP

Answer: B

Q10. Refer to the exhibit 

Which as-path access-list regular expression should be applied on R2 as a neighbor filter list to only allow update with and origin of AS 65503?

A. _65509.?$ 

B. _65503$ 

C. ^65503.* 

D. ^65503$

E. _65503_

F. 65503

Answer: C