Cisco 400-251 - CCIE Security Written Exam Exam

Page:    1 / 62   
Total 307 questions

What are the two different modes in which Private AMP cloud can be deployed? (Choose two.)

  • A. Cloud-Proxy Mode
  • B. Internal Mode
  • C. Air Gap Mode
  • D. Hybrid Mode
  • E. Public Mode
  • F. External Mode


Answer : AC

Reference:
http://www.cisco.com/c/en/us/products/collateral/security/fireamp-private-cloud-virtual-appliance/datasheet-c78-733180.html

View the Exhibit.


Refer to the exhibit. Which two effects of this configuration are true? (Choose two.)

  • A. User five can view usernames and passwords
  • B. User superuser can view the configuration
  • C. User superuser can change usernames and passwords
  • D. User superuser can view usernames and passwords
  • E. User five can execute the show run command
  • F. User cisco can view usernames and passwords


Answer : BD

Explanation:

Which three commands can you use to configure VXLAN on a Cisco ASA firewall? (Choose three.)

  • A. default-mcast-group
  • B. set ip next-hop verify-availability
  • C. sysopt connection tcpmss
  • D. segment-id
  • E. inspect vxlan
  • F. nve-only


Answer : ADF

Explanation:

Which Cisco ISE profiler service probe can collect information about Cisco Discovery Protocol?

  • A. SNMP Query
  • B. DCHP SPAN
  • C. DCHP
  • D. HTTP
  • E. RADIUS
  • F. NetFlow


Answer : F

Explanation:

Which type of attack uses a large number of spoofed MAC addresses to emulate wireless clients?

  • A. DoS against an access point
  • B. DoS against a client station
  • C. chopchop attack
  • D. Airsnarf attack
  • E. device-probing attack
  • F. authentication-failure attack


Answer : A

Explanation:
DoS attacks against access points are typically carried out on the basis of the following assumptions:
-> Access points have limited resources. For example, the per-client association state table.
-> WLAN management frames and authentication protocols 802.11 and 802.1x have no encryption mechanisms.
Wireless intruders can exhaust access point resources, most importantly the client association table, by emulating large number of wireless clients with spoofed
MAC addresses. Each one of these emulated clients attempts association and authentication with the target access point but leaves the protocol transaction mid- way. When the access points resources and the client association table is filled up with these emulated clients and their incomplete authentication states, legitimate clients can no longer be serviced by the attacked access point. This creates a denial of service attack.
Reference:
http://www.cisco.com/c/en/us/td/docs/wireless/mse/8-0/MSE_wIPS/MSE_wIPS_8_0/
MSE_wIPS_7_5_appendix_0110.html#concept_E6770BF8F43241919859C16AE0077137

Page:    1 / 62   
Total 307 questions