aiotestking uk

400-251 Exam Questions - Online Test


400-251 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which two statements about the MD5 Hash are true? (Choose two.)

A. Length of the hash value varies with the length of the message that is being hashed.

B. Every unique message has a unique hash value.

C. Its mathematically possible to find a pair of message that yield the same hash value.

D. MD5 always yields a different value for the same message if repeatedly hashed.

E. The hash value cannot be used to discover the message.

Answer: B,E

Q2. Refer to the exhibit. 

What are two TLS inspection methods you could implement for outbond internet traffic that can prevent the given untrusted error? (Choose two)

Refer to the exhibit What are two TLS inspection methods you could implement for- outbound Internet traffic that can prevent the given error? (Choose two)

A. Add the self-signed CA certificate from the inspection appliance to the Trusted Root Certification Authority on the client

B. Apply an intermediate CA certificate from a trusted authority on the inspection appliance.

C. Download a copy of the private key from the content provider,

D. Update your organizational procedures to instruct users to click "I Understand the Risks" to accept the error and continue

E. Conditionally decrypt traffic based c$ trust level Store private keys in a FIPS Level 2 HSM on the inspection appliance

Answer: A,B

Q3. Which two statement about PVLAN port types are true? (Choose two)

A. A community port can send traffic to community port in other communities on its broadcast domain.

B. An isolated port can send and receive traffic only to and from promiscuous ports.

C. An isolated port can receive traffic from promiscuous port in an community on its broadcast domain, but can send traffic only to port in its own community.

D. A promiscuous port can send traffic promiscuous port in other communities on its broadcast domain.

E. A community port can send traffic to promiscuous port in other communities on its broadcast domain.

F. A Promiscuous port can send traffic to all ports within a broadcast domain.

Answer: B,F

Q4. Which two statement about router Advertisement message are true? (Choose two)

A. Local link prefixes are shared automatically.

B. Each prefix included in the advertisement carries lifetime information f Or that prefix.

C. Massage are sent to the miscast address FF02::1

D. It support a configurable number of retransmission attempts for neighbor solicitation massage.

E. Flag setting are shared in the massage and retransmitted on the link.

F. Router solicitation massage are sent in response to router advertisement massage

Answer: A,F

Q5. IANA is responsible for which three IP resources? (Choose three.)

A. IP address allocation

B. Detection of spoofed address

C. Criminal prosecution of hackers

D. Autonomous system number allocation

E. Root zone management in DNS

F. BGP protocol vulnerabilities

Answer: A,D,E

Q6. Which statement regarding the routing functions of the Cisco ASA is true running software version 9.2?

A. In a failover pair of ASAs, the standby firewall establishes a peer relationship with OSPF neighbors

B. The ASA supports policy-based routing with route maps

C. Routes to the Null0 interface cannot be configured to black-hole traffic

D. The translations table cannot override the routing table for new connections

Answer: C

Q7. What port has IANA assigned to the GDOI protocol ?

A. UDP 4500

B. UDP 1812

C. UDP 500

D. UDP 848

Answer: D

Q8. Which two statements about SOX are true? (Choose two.)

A. SOX is an IEFT compliance procedure for computer systems security.

B. SOX is a US law.

C. SOX is an IEEE compliance procedure for IT management to produce audit reports.

D. SOX is a private organization that provides best practices for financial institution computer systems.

E. Section 404 of SOX is related to IT compliance.

Answer: B,E

Q9. Refer to the exhibit after you implement ingress filter 101 to deny all icmp traffic on your perimeter router user complained of poor web performance and the router and the router display increase CPU load. The debug ipicmp command returned the given output Which configuration you make to the router configuration to correct the problem? 

A)

B)

C)

D)

A. Option A

B. Option B

C. Option C

D. Option D

Answer: D

Q10. Which three IP resources is the IANA responsible? (Choose three.)

A. IP address allocation

B. detection of spoofed address

C. criminal prosecution of hackers

D. autonomous system number allocation

E. root zone management in DNS

F. BGP protocol vulnerabilities

Answer: A,D,E