[Free] 2019(Nov) EnsurePass Cisco 400-251 Dumps with VCE and PDF 61-70

Get Full Version of the Exam
http://www.EnsurePass.com/400-251.html

Question No.61

Which two statements about ping flood attacks are true? (Choose two.)

  1. They attack by sending ping requests to the broadcast address of the network.

  2. They use SYN packets.

  3. The attack is intended to overwhelm the CPU of the target victim.

  4. They use UDP packets.

  5. They use ICMP packets.

  6. They attack by sending ping requests to the return address of the network.

Correct Answer: CE

Question No.62

What are two features that helps to mitigate man-in-the-middle attacks? (Choose two.)

  1. DHCP snooping

  2. ARP spoofing

  3. destination MAC ACLs

  4. dynamic ARP inspection

  5. ARP sniffing on specific ports

Correct Answer: AD

Question No.63

Which two statements about Cisco AMP for Web Security are true? (Choose two.)

  1. It can prevent malicious data exfiltration by blocking critical files from exiting through the Web gateway.

  2. It can perform reputation-based evaluation and blocking by uploading the fingerprint of incoming files to a cloud-based threat intelligence network.

  3. It can detect and block malware and other anomalous traffic before it passes through the Web gateway.

  4. It can perform file analysis by sandboxing known malware and comparing unknown files to a local repository of the threats.

  5. It can identify anomalous traffic passing through the Web gateway by comparing it to an established of expected activity.

  6. It continues monitoring files after they pass the Web gateway.

Correct Answer: BF

Question No.64

What are three technologies that can be used to trace the source of an attack in a network environment with multiple exit/entry points? (Choose three.)

  1. ICMP Unreachable messages

  2. Sinkholes

  3. A honey pot

  4. Remotely-triggered destination-based black holing

  5. Traffic scrubbing

Correct Answer: ADE

Question No.65

What are the most common methods that security auditors use to access an organization#39;s security processes? (Choose two.)

  1. physical observation

  2. social engineering attempts

  3. penetration testing

  4. policy assessment

  5. document review

  6. interviews

Correct Answer: AF

Question No.66

Which are two of the valid IPv6 extension headers? (Choose two.)

  1. Options

  2. Authentication Header

  3. Mobility

  4. Protocol

  5. Next Header

  6. Hop Limit

Correct Answer: BC

Question No.67

Which type of header attack is detected by Cisco ASA basic threat detection?

  1. denial by access list

  2. bad packet format

  3. failed application inspection

  4. connection limit exceeded

Correct Answer: B

Question No.68

Which three statements about RLDP are true? (Choose three.)

  1. It detects rogue access points that are connected to the wired network.

  2. It can detect rogue APs that use WPA encryption.

  3. It can detect rogue APs operating only on 5 GHz.

  4. It can detect rogue APs that use WEP encryption.

  5. The AP is unable to serve clients while the RLDP process is active.

  6. Active Rogue Containment can be initiated manually against rogue devices detected on the wired network.

Correct Answer: AEF

Explanation:

Rogue Location Discovery Protocol (RLDP)

http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/70987-rogue- detect.html

Question No.69

If an ASA device is configured as a remote access IPsec server with RADIUS authentication and password management enabled, which type of authentication will it use?

  1. RSA

  2. MS-CHAPv2

  3. MS-CHAPv1

  4. NTLM

  5. PAP

Correct Answer: B

Question No.70

You are considering using RSPAN to capture traffic between several switches. Which two configuration aspects do you need to consider? (Choose two.)

  1. All switches need to be running the same IOS version.

  2. All distribution switches need to support RSPAN.

  3. Not all switches need to support RSPAN for it to work.

  4. The RSPAN VLAN need to be blocked on all trunk interfaces leading to the destination RSPAN switch.

  5. The RSPAN VLAN need to be allow on all trunk interfaces leading to the destination RSPAN

switch.

Correct Answer: BE

Get Full Version of the Exam
400-251 Dumps
400-251 VCE and PDF

Leave a Reply