aiotestking uk

400-251 Exam Questions - Online Test


400-251 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Event Store is a component of which IPS application?

A. SensorApp

B. InterfaceApp

C. MainApp

D. NotificationApp

E. AuthenticationApp

Answer: C

Q2. Which two answers describe provisions of the SOX Act and its international counterpart Acts? (Choose two.)

A. confidentiality and integrity of customer records and credit card information

B. accountability in the event of corporate fraud

C. financial information handled by entities such as banks, and mortgage and insurance brokers

D. assurance of the accuracy of financial records

E. US Federal government information

F. security standards that protect healthcare patient data

Answer: B,D

Q3. Which Two statement about the PCoIP protocol are true? (Choose two)

A. It support both loss and lossless compression

B. It is a client-rendered, multicast-codec protocol.

C. It is available in both software and hardware.

D. It is a TCP-based protocol.

E. It uses a variety of codec to support different operating system.

Answer: A,C

Q4. Which three statement about VRF-Aware Cisco Firewall are true? (Choose three)

A. It can run as more than one instance.

B. It supports both global and per-VRF commands and DoS parameters.

C. It can support VPN networks with overlapping address ranges without NAT.

D. It enables service providers to implement firewalls on PE devices.

E. It can generate syslog massages that are visible only to individual VPNs.

F. It enables service providers to deploy firewalls on customer devices.

Answer: A,D,E

Q5. If the ASA interfaces on a device are configured in passive mode, which mode must be configured on the remote device to enable EtherChannel?

A. standby

B. active

C. on

D. passive

Answer: B

Q6. What is the effect of the following command on Cisco IOS router? ip dns spoofing 1.1.1.1

A. The router will respond to the DNS query with its highest loopback address configured

B. The router will respond to the DNS query with 1.1.1.1 if the query id for its own hostname

C. The router will respond to the DNS query with the IP address of its incoming interface for any hostname query

D. The router will respond to the DNS query with the IP address of its incoming interface for

its own hostname

Answer: D

Q7. Refer to the exhibit. R1 and R2 are connected across and ASA with MD5 authentication. Which statement about eBGP peering between the routers could be true?

A. eBGP peering will fail because ASA is transit lacks BGP support.

B. eBGP peering will be successful.

C. eBGP peering will fail because the two routers must be directly connected to allow peering.

D. eBGP peering will fail because of the TCP random sequence number feature.

Answer: C

Q8. Refer to the exhibit. If R1 is connected upstream to R2 and R3 at different ISPs as shown, what action must be taken to prevent Unicast Reverse Path Forwarding (uRPF. from dropping asymmetric traffic?

A. Configure Unicast RPF Loose Mode on R2 and R3 only.

B. Configure Unicast RPF Loose Mode on R1 only.

C. Configure Unicast RPF Strict Mode on R1 only.

D. Configure Unicast RPF Strict Mode on R1,R2 and R3.

E. Configure Unicast RPF Strict Mode on R2 and R3 only.

Answer: E

Q9. DRAG DROP

Drag each OSPF security feature on the left to its description on the right.

Answer:

Explanation:

TTL security check:protects ospf neighbor sessions against CPU prefix length: protects the routers in an ospf neighbor session

Type0:Establishes OSPF sessions without authenthication Type1:Uses Clear-text authenthication to protect

Type2:Uses MD5 authenthication to protect

Q10. The computer at 10.10.10.4 on your network has been infected by a botnet that directs traffic to a malware site at 168.65.201.120. Assuming that filtering will be performed on a Cisco ASA, What command can you use to block all current and future connections from the infected host?

A. ip access-list extended BLOCK_BOT_OUT deny ip any host 10.10.10.4

B. shun 10.10.10.4 168.65.201.120 6000 80

C. ip access-list extended BLOCK_BOT_OUT deny ip host 10.10.10.4 host 168.65.201.120

D. ip access-list extended BLOCK_BOT_OUT deny ip host 168.65.201.120 host 10.10.10.4

E. shun 168.65.201.120 10.10.10.4 6000 80

Answer: C