aiotestking uk

400-251 Exam Questions - Online Test


400-251 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which three fields are part of the AH header? (Choose three)

A. Destination address

B. Protocol ID

C. Packet ICV

D. SPI identifying SA

E. Next header

F. Application port

G. Source address

Answer: C,D,E

Q2. CCMP (CCM mode Protocol) is based on which algorithm?

A. 3DES

B. Blowfish

C. RC5

D. AES

E. IDEA

Answer: D

Q3. What are feature that can stop man-in-the-middle attacks? (Choose two)

A. ARP sniffing on specific ports

B. ARP spoofing

C. Dynamic ARP inspection

D. DHCP snooping

E. destination MAC ACLs

Answer: C,D

Q4. Why is the IPv6 type 0 routing header vulnerable to attack?

A. It allows the receiver of a packet to control its flow.

B. It allows the sender to generate multiple NDP requests for each packet.

C. It allows the sender of a packet to control its flow.

D. It allows the sender to generate multiple ARP requests for each packet.

E. It allows the receiver of a packet to modify the source IP address.

Answer: C

Q5. Which of the following statement is true about the ARP attack?

A. Attackers sends the ARP request with the MAC address and IP address of a legitimate resource in the network.

B. Attackers sends the ARP request with the MAC address and IP address of its own.

C. ARP spoofing does not facilitate man-in-the middle attack of the attackers.

D. Attackers sends the ARP request with its own MAC address and IP address of a legitimate resource in the network.

Answer: D

Q6. DRAG DROP

Drag and drop ESP header field on the left to the appropriate field length on the right

Answer:

Q7. What is the maximum pattern length supported by FPM searches within a packet ?

A. 256 bytes 

B. 1500 bytes

C. 512 bytes

D. 128 bytes

Answer: A

Q8. On which two protocols is VNC based?(Choose two)

A. Rdesktop

B. UDP

C. RFB

D. Terminal Services Client

E. CoRD

F. TCP

Answer: C,F

Q9. Which two statements about the MD5 Hash are true? (Choose two.)

A. Length of the hash value varies with the length of the message that is being hashed.

B. Every unique message has a unique hash value.

C. Its mathematically possible to find a pair of message that yield the same hash value.

D. MD5 always yields a different value for the same message if repeatedly hashed.

E. The hash value cannot be used to discover the message.

Answer: B,E

Q10. Which two options are disadvantages of MPLS layers 3 VPN services? (choose two)

A. They requires cooperation with the service provider to implement transport of non-IP traffic.

B. SLAs are not supported by the service provider.

C. It requires customers to implement QoS to manage congestion in the network.

D. Integration between Layers 2 and 3 peering services is not supported.

E. They may be limited by the technology offered by the service provider.

F. They can transport only IPv6 routing traffic.

Answer: D,E