[April-2018-New]Download 400-251 PDF Brain Dumps from Braindump2go[196-206]

2018 April New Cisco 400-251 Real Exam Dumps with PDF and VCE Just Updated Today! Following are some new 400-251 Real Exam Questions:

1.|2018 Latest 400-251 Exam Dumps (PDF & VCE) 359Q Download:

https://www.braindump2go.com/400-251.html

2.|2018 Latest 400-251 Exam Questions & Answers Download:

https://drive.google.com/drive/folders/0B75b5xYLjSSNcGJLWWtfdE96ZUU?usp=sharing

QUESTION 196
Refer to the exhibit. What type of attack is represented in the given Wireshark packet capture?

A. a SYN flood
B. spoofing
C. a duplicate ACK
D. TCP congestion control
E. a shrew attack

Answer: A

QUESTION 197
What message does the TACACS+ daemon send during the AAA authentication process to request additional authentication information?

A. ACCEPT
B. REJECT
C. CONTINUE
D. ERROR
E. REPLY

Answer: C

QUESTION 198
Refer to the exhibit.While troubleshooting a router issue, you executed the show ntp association command and it returned this output.
Which condition is indicated by the reach value of 357?

A. The NTP continuously received the previous 8 packets.
B. The NTP process is waiting to receive its first acknowledgement.
C. The NTP process failed to receive the most recent packet, but it received the 4 packets before the most recent packet.
D. The NTP process received only the most recent packet.

Answer: C

QUESTION 199
Which three IP resources is IANA responsible for? (Choose three.)

A. IP address allocation
B. detection of spoofed address
C. criminal prosecution of hackers
D. autonomous system number allocation
E. root zone management in DNS
F. BGP protocol vulnerabilities

Answer: ADE

QUESTION 200
Which three attributes may be configured as part of the Common Tasks panel of an authorization profile in the Cisco ISE solution? (Choose three.)

A. VLAN
B. voice VLAN
C. dACL name
D. voice domain permission
E. SGT

Answer: ACD

QUESTION 201
Which two statements about DTLS are true?(Choose two)

A. It uses two simultaneous IPSec tunnels to carry traffic.
B. If DPD is enabled, DTLS can fall back to a TLS connection.
C. Because it requires two tunnels, it may experience more latency issues than SSL connections.
D. If DTLS is disabled on an interface, then SSL VPN connections must use SSL/TLS tunnels.
E. It is disabled by default if you enable SSL VPN on the interface.

Answer: BD
Explanation:
Check the section “Configuring DTLS” in this document:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/vpn_anyconnect.html

QUESTION 202
Refer to the exhibit, which two Statements about the given Configuration are true? (Choose two)

A. It is an inbound policy.
B. It will allow 209.165.202.129 to connect to 202.165.200.225 on an IMAP port.
C. It will allow 209.165.202.129 to connect to 202.165.200.225 on an RDP port.
D. It will allow 202.165.200.225 to connect to 209.165.202.129 on an RDP port.
E. It will allow 202.165.200.225 to connect to 209.165.202.129 on a VNC port.
F. It is an outbound policy.

Answer: AC

QUESTION 203
What command can you use to protect a router from TCP SYN-flooding attacks?

A. ip igmp snooping
B. rate-limit input <bps><burst-normal><Burst-max>
C. ip tcp intercept list <access-list>
D. ip dns spoofing <ip-address>
E. police <bps>

Answer: C

QUESTION 204
Refer to the exhibit, what is the effect of the given configuration?

A. It will Drop all TTL packet with a value of 14 in the IP header field.
B. It will Drop all TTL packet with a TTL value less than 14.
C. It will Drop all TTL packet with a TTL value of 15 or more.
D. It will Drop all TTL packet with a TTL value of 14 or more.

Answer: B

QUESTION 205
If the ASA interfaces on a device are configured in passive mode, which mode must be configured on the remote device to enable EtherChannel?

A. standby
B. active
C. on
D. passive

Answer: B

QUESTION 206
Which three statements about the SHA-2 algorithm are true? (Choose three)

A. It provides a variable-length output using a collision-resistant cryptographic hash.
B. It provides a fixed-length output using a collision-resistant cryptographic hash.
C. It is used for integrity verification.
D. It generates a 160-bit message digest.
E. It is the collective term for the SHA-224, SHA-256, SHA-384, and SHA-512 algorithms.
F. It generates a 512-bit message digest.

Answer: BCE


!!!RECOMMEND!!!

1.|2018 Latest 400-251 Exam Dumps (PDF & VCE) 359Q Download:

https://www.braindump2go.com/400-251.html

2.|2018 Latest 400-251 Study Guide Video:

https://youtu.be/DH_ZfDVMWiU