aiotestking uk

400-251 Exam Questions - Online Test


400-251 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You have configured a DMVPN hub and spoke a follows (assume the IPsec profile “dmvpnprofile” is configured correctly):

With this configuration, you notice that the IKE and IPsec SAs come up between the spoke and the hub, but NHRP registration fails. Registration will continue to fail until you do which of these?

A. Configure the ipnhrp cache non-authoritative command on the hub’s tunnel interface

B. Modify the NHRP hold times to match on the hub and spoke

C. Modify the NHRP network IDs to match on the hub and spoke

D. Modify the tunnel keys to match on the hub and spoke

Answer: D

Q2. Class -map nbar_rtp

Match protocol rtp payload-type “0,1,4-0x10, 10001b – 10010b,64”

The above NBAR configuration matches RTP traffic with which payload types? 

A)

B)

C)

D)

A. Option A

B. Option B

C. Option C

D. Option D

Answer: A

Q3. Which two OSPF network types support the concept of a designated router? (Choose two.)

A. broadcast

B. NBMA

C. point-to-multipoint

D. point-to-multipoint nonbroadcast

E. loopback

Answer: A,B

Q4. Refer to the exhibit . Which Statement about this configuration is true?

A. The ASA stops LSA type 7 packets from flooding into OSPF area 1.

B. The ASA injects a static default route into OSPF area 1.

C. The ASA redistributes routes from one OSPF process to another.

D. The ASA redistributes routes from one routing protocol to another.

E. The ASA injects a static default route into OSPF process 1.

Answer: C

Q5. Which three statements about the RSA algorithm are true? (Choose three.)

A. The RSA algorithm provides encryption but not authentication.

B. The RSA algorithm provides authentication but not encryption.

C. The RSA algorithm creates a pair of public-private keys that are shared by entities that perform encryption.

D. The private key is never sent across after it is generated.

E. The public key is used to decrypt the message that was encrypted by the private key.

F. The private key is used to decrypt the message that was encrypted by the public key.

Answer: C,D,F

Q6. DRAG DROP

Drag each SSI encryption algorithm on the left to the encryption and hashing values it uses on the Right?

Answer:

Explanation: 3DES-sha1: 168 bit encryption with 160 bit hash DES-sha1: 56 bit encryption with 160 bit hash Null sha1: 160 bit hash without encryption

RC4-md5: 128 bit with 128 bit hash RC4-sha1: 128 bit with 160 bit hash.

Q7. DRAG DROP

Drag each ISE probe on the left to the matching statement on the right.

Answer:

Q8. Which of the following best describes Chain of Evidence in the context of security forensics?

A. Evidence is locked down, but not necessarily authenticated.

B. Evidence is controlled and accounted for to maintain its authenticity and integrity.

C. The general whereabouts of evidence is known.

D. Someone knows where the evidence is and can say who had it if it is not logged.

Answer: B

Q9. Refer to the exhibit. A signature failed to compile and returned the given error messages. What is a possible reason for the problem?

A. The signature belongs to the IOS IPS Basic category.

B. The signature belongs to the IOS IPS Advanced category.

C. There is insufficient memory to compile the signature.

D. The signature is retired.

E. Additional signature must be complied during the compiling process.

Answer: C

Q10. DRAG DROP

Drag each IP transmission and fragmentation term on the left to the matching statement on the right?

Answer:

Explanation: DF bit: A value in the IP header that indicates whether packet fragmentation is permitted.

Fragment offset: A value in the IP packet that indicates the location of a fragment in the datagram.

MF bit: Indicates that this is last packet with the biggest offset.

MSS: The amount of data that the receiving host can accept in each TCP segment. MTU: A value representing the maximum acceptable length of a packet to be transmitted over a link. PMTUD: A technology used to prevent fragmentation as data travels between two end points.

Tunnel: A logical interface allows packet to be encapsulated inside a passenger protocol for transmission across a

different carrier protocol.