1 / 13

400-251 Questions Answers

Free Cisco 400-251 Sample questions are available on examcollection free of cost. If you want to pass any Cisco Certifications exam or you have cleared any exam in India or anywhere in world. Then Examcollection 400-251 VCE Download is for you. Here you can download free examcollection vce dumps or also post your Cisco vce braindumps. You can prepare your Cisco Exams with the help of our free Questions and answers. Our questions are 100% reliable and accurate for all students all over the world. Here you can prepare your 400-251 Cisco exam without any payment.<br>http://examcollection.in/400-251-vce-download.html

caleb905
Download Presentation

400-251 Questions Answers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Question: 1 Which three statements about the Cisco IPS sensor are true? (Choose three.) A. You cannot pair a VLAN with itself. B. For a given sensing interface, an interface used in a VLAN pair can be a member of another inline interface pair. C. For a given sensing interface, a VLAN can be a member of only one inline VLAN pair, however, a given VLAN can be a member of an inline VLAN pair on more than one sensing interface. D. The order in which you specify the VLANs in a inline pair is significant. E. A sensing interface in inline VLAN pair mode can have from 1 to 255 inline VLAN pairs. Answer: A, C, E

  2. Question: 2 According ISO27001 ISMS, which of the following are mandatory documents? (Cho ose 4) A. ISMS Policy B. Corrective Action Procedure C. IS Procedures D. Risk Assessment Reports E. Complete Inventory of all information assets Answer: A, B, C, D

  3. Question: 3 Which two statements describe the Cisco TrustSec system correctly? (Choose two.) A. The Cisco TrustSec system is a partner program, where Cisco certifies third-party security products as extensions to the secure infrastructure. B. The Cisco TrustSec system is an approach to certifying multimedia and collaborati on applications as secure. C. The Cisco TrustSec system is an Advanced Network Access Control System that le verages enforcement intelligence in the network infrastructure. D. The Cisco TrustSec system tests and certifies all products and product versions th at make up the system as working together in a validated manner. Answer: C, D

  4. Question: 4 Which three attributes may be configured as part of the Common Tasks panel of an authorization profile in the Cisco ISE solution? (Choose three.) A. VLAN B. voice VLAN C. dACL name D. voice domain permission E. SGT Answer: A, C, D

  5. Question: 5 Which three statements about Cisco Flexible NetFlow are true? (Choose three.) A. The packet information used to create flows is not configurable by the user. B. It supports IPv4 and IPv6 packet fields. C. It tracks all fields of an IPv4 header as well as sections of the data payload. D. It uses two types of flow cache, normal and permanent. E. It can be a useful tool in monitoring the network for attacks. Answer: B, C, E

  6. Question: 6 Which three statements are true regarding RFC 5176 (Change of Authorization)? (C hoose three.) A. It defines a mechanism to allow a RADIUS server to initiate a communication inb ound to a NAD. B. It defines a wide variety of authorization actions, including "reauthenticate." C. It defines the format for a Change of Authorization packet. D. It defines a DM. E. It specifies that TCP port 3799 be used for transport of Change of Authorization p ackets. Answer: A, C, D

  7. Question: 7 Which two certificate enrollment methods can be completed without an RA and re quire no direct connection to a CA by the end entity? (Choose two.) A. SCEP B. TFTP C. manual cut and paste D. enrollment profile with direct HTTP E. PKCS#12 import/export Answer: C, E

  8. Question: 8 Which two statements about the AES algorithm are true? (Choose two) A. The AES algorithm is an asymmetric block cipher. B. The AES algorithm operates on a 128-bits block. C. The AES algorithm uses a fixed length-key of 128 bits. D. The AES algorithm does not give any advantage over 3DES due to the same key l ength. E. The AES algorithm consist of four functions. Three functions provide confusion-dif fusion and one provides encryption. Answer: B, E

  9. Question: 9 Which two statements about the RC4 algorithm are true? (Choose two.) A. The RC4 algorithm is an asymmetric key algorithm. B. The RC4 algorithm is a symmetric key algorithm. C. The RC4 algorithm is slower in computation than DES. D. The RC4 algorithm is used with wireless encryption protocols. E. The RC4 algorithm uses fixed-length keys. Answer: B, D

  10. Question: 10 Which two statements about the MD5 Hash are true? (Choose two.) A. Length of the hash value varies with the length of the message that is being hash ed. B. Every unique message has a unique hash value. C. Its mathematically possible to find a pair of message that yield the same hash val ue. D. MD5 always yields a different value for the same message if repeatedly hashed. E. The hash value cannot be used to discover the message. Answer: B, E

More Related