Download CCIE Security Written Exam v5-1.realtests.400-251.2019-10-22.1e.222q.vcex

Download Dump

File Info

Exam CCIE Security Written Exam v5.1
Number 400-251
File Name CCIE Security Written Exam v5-1.realtests.400-251.2019-10-22.1e.222q.vcex
Size 5.09 Mb
Posted October 22, 2019
Downloads 25



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
View the Exhibit. 

  

Refer to the exhibit. Which two effects of this configuration are true? (Choose two.)

  • A: User five can view usernames and passwords
  • B: User superuser can view the configuration
  • C: User superuser can change usernames and passwords
  • D: User superuser can view usernames and passwords
  • E: User five can execute the show run command
  • F: User cisco can view usernames and passwords



Question 2
Which three commands can you use to configure VXLAN on a Cisco ASA firewall? (Choose three.)

  • A: default-mcast-group
  • B: set ip next-hop verify-availability
  • C: sysopt connection tcpmss
  • D: segment-id
  • E: inspect vxlan
  • F: nve-only



Question 3
Which type of attack uses a large number of spoofed MAC addresses to emulate wireless clients?

  • A: DoS against an access point
  • B: DoS against a client station
  • C: chopchop attack
  • D: Airsnarf attack
  • E: device-probing attack
  • F: authentication-failure attack



Question 4
Which option best describes RPL?

  • A: RPL stands for Routing over Low-power Lossy Networks that use link-state LSAs to determine the best route between leaves and the root border router.
  • B: RPL stands for Routing over Low-power Lossy Networks that use distance vector DOGAG to determine the best route leaves and the root border router.
  • C: RPL stands for Routing over low priority links that use link-state LSAs to determine the best route between two root border routers.
  • D: RPL stands for Routing overlow priority links that use distance vector DOGAG to determine the best route between two root border routers.



Question 5
Which WEP configuration can be exploited by a weak IV attack?

  • A: When the static WEP password has been given away
  • B: When the static WEP password has been stored without encryption
  • C: When a per-packet WEP key is in use
  • D: When a 40-bit key is in use
  • E: When the same WEP key is used to create every packet
  • F: When a 64-bit key is in use



Question 6
Which OpenStack project has orchestration capabilities?

  • A: Heat
  • B: Cinder
  • C: Horizon
  • D: Sahara



Question 7
Which two options are benefits of global ACLs? (Choose two.)

  • A: The only operate on logical interfaces.
  • B: They are more efficient because they are processed before interface access rules.
  • C: They can be applied to multiple interfaces.
  • D: They are flexible because they match source and destination IP addresses for packets that arrive on any interface.
  • E: They save memory because they work without being replicated on each interface.



Question 8
Which three statements about 802.1x multiauthentication mode are true? (Choose three.)

  • A: It can be deployed in conjunction with MDA functionality on voice VLANs.
  • B: It requires each connected client to authenticate individually.
  • C: Each multiauthentication port can support only one voice VLAN.
  • D: It is recommended for auth-fail VLANs.
  • E: On non-802.1x devices, it can support only one authentication method on a single port.
  • F: It is recommended for guest VLANs.



Question 9
View the Exhibit. 

  

Refer to the exhibit. Which three additional configuration elements must you apply to complete a functional FlexVPN deployment? (Choose three.)

  • A:
      
  • B:
      
  • C:
      
  • D:
      
  • E:
      
  • F:
      



Question 10
View the Exhibit. 

  

Refer to the exhibit Which effect of this configuration is true?

  • A: If the RADIUS server is unreachable, SSH users cannot authenticate.
  • B: All commands are validated by the RADIUS server before the device executes them.
  • C: Users accessing the device via SSH and those accessing enable mode are authenticated against the RADIUS server.
  • D: Users must be in the RADIUS server to access the serial console.
  • E: Only SSH users are authenticated against the RADIUS server.









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset