25 February, 2020
CCIE Security Written Exam 400-251 Item Pool
we provide 100% Correct Cisco 400-251 download which are the best for clearing 400-251 test, and to get certified by Cisco CCIE Security Written Exam. The 400-251 Questions & Answers covers all the knowledge points of the real 400-251 exam. Crack your Cisco 400-251 Exam with latest dumps, guaranteed!
Free 400-251 Demo Online For Cisco Certifitcation:
Question 1
- (Exam Topic 3)
In a large organization, with thousands of employees scattered across the globe, it is difficult to provision and onboard new employee device with the correct profiles and certificates. With ISE, it is possible to do that with client provided device. Which four conditions must be met? (Choose four.)
In a large organization, with thousands of employees scattered across the globe, it is difficult to provision and onboard new employee device with the correct profiles and certificates. With ISE, it is possible to do that with client provided device. Which four conditions must be met? (Choose four.)
Question 2
- (Exam Topic 2)
Which command on Cisco ASA you can enter to send debug messages to a syslog server?
Which command on Cisco ASA you can enter to send debug messages to a syslog server?
Question 3
- (Exam Topic 3)
Refer to the exhibit. Which two effects of this configuration are true? (Choose two.) Case Study Title (Case Study):
authentication priority dot1x mab authentication order dot1x mab authentication event fail action next-method authentication event server dead action reinitialize vlan 50 authentication host-mode multi-auth
authentication violation restrict
Refer to the exhibit. Which two effects of this configuration are true? (Choose two.) Case Study Title (Case Study):
authentication priority dot1x mab authentication order dot1x mab authentication event fail action next-method authentication event server dead action reinitialize vlan 50 authentication host-mode multi-auth
authentication violation restrict
Question 4
- (Exam Topic 2)
Which statement about Health Monitoring on the Firepower System is true?
Which statement about Health Monitoring on the Firepower System is true?
Question 5
- (Exam Topic 2)
Which three statements about VXLAN are true? (Choose three.)
Which three statements about VXLAN are true? (Choose three.)
Question 6
- (Exam Topic 2)
Which two statements about application protocol detectors in the Cisco Fire? (Choose two)
Which two statements about application protocol detectors in the Cisco Fire? (Choose two)
Question 7
- (Exam Topic 2)
Which description of configuring the port security feature true?
Which description of configuring the port security feature true?
Question 8
- (Exam Topic 1)
Which three statements about VRF-Aware Cisco Firewall are true? (Choose three.)
Which three statements about VRF-Aware Cisco Firewall are true? (Choose three.)
Question 9
- (Exam Topic 1)
Which two statements about the SeND protocol are true? (Choose two.)
Which two statements about the SeND protocol are true? (Choose two.)
Question 10
- (Exam Topic 2)
Which option is a benefit of VRF Selection Using Policy-Based Routing for routing for packets to different VPNs?
Which option is a benefit of VRF Selection Using Policy-Based Routing for routing for packets to different VPNs?
Question 11
- (Exam Topic 3)
In your ISE design, there are two TACACS profiles that are created for device administration: IOS_HelpDesk_Profile, and IOS_Admin_Profile. The HelpDesk profile should login the user with privilege 1, with ability to change privilege level to 15. The Admin profile should login the user with privilege 15 by default. Which two commands must the HelpDesk enter on the IOS device to access privilege level 15? (Choose two)
In your ISE design, there are two TACACS profiles that are created for device administration: IOS_HelpDesk_Profile, and IOS_Admin_Profile. The HelpDesk profile should login the user with privilege 1, with ability to change privilege level to 15. The Admin profile should login the user with privilege 15 by default. Which two commands must the HelpDesk enter on the IOS device to access privilege level 15? (Choose two)
Question 12
- (Exam Topic 3)
Refer the exhibit.
***Missing Exhibit***
ASA at 150.1.7.43 is configured to receive IP address to SGT mapping from ISE at 161.1.7.14. Which of the following is true regarding packet capture from wireshark?
Refer the exhibit.
***Missing Exhibit***
ASA at 150.1.7.43 is configured to receive IP address to SGT mapping from ISE at 161.1.7.14. Which of the following is true regarding packet capture from wireshark?
Question 13
- (Exam Topic 3)
Transmission control protocol, src port: 649999(64999), Dst Port:49086(49086),Seq:2,Ack:2,Len: Refer to the exhibit.
Refer to the exhibit. The ASA at 150.1.7.43 is configured to receive the IP address to SGT mapping from ISE at 161.1.7.14. Which statement about this packet capture from Wireshark is true?
Transmission control protocol, src port: 649999(64999), Dst Port:49086(49086),Seq:2,Ack:2,Len: Refer to the exhibit.
Refer to the exhibit. The ASA at 150.1.7.43 is configured to receive the IP address to SGT mapping from ISE at 161.1.7.14. Which statement about this packet capture from Wireshark is true?
Question 14
- (Exam Topic 2)
What are two characteristics of RPL, used in IoT environments?(Choose two)
What are two characteristics of RPL, used in IoT environments?(Choose two)
Question 15
- (Exam Topic 1)
If an ASA device is configured as a remote access IPsec server with RADIUS authentication and password management enabled, which type of authentication will it use?
If an ASA device is configured as a remote access IPsec server with RADIUS authentication and password management enabled, which type of authentication will it use?
Question 16
- (Exam Topic 1)
Which two options are benefits of the Cisco ASA transparent firewall mode? (Choose two)
Which two options are benefits of the Cisco ASA transparent firewall mode? (Choose two)
Question 17
- (Exam Topic 2)
Which statement about Cisco Firepower Advanced Malware
Which statement about Cisco Firepower Advanced Malware
Question 18
- (Exam Topic 2)
How does a Cisco ISE server determine whether a client supports EAP chaining?
How does a Cisco ISE server determine whether a client supports EAP chaining?
Question 19
- (Exam Topic 3)
What is the best description of a docker file?
What is the best description of a docker file?
Question 20
- (Exam Topic 2)
Which three Cisco attributes for LDAP authorization are supported on the ASA? (Choose three)
Which three Cisco attributes for LDAP authorization are supported on the ASA? (Choose three)
Question 21
- (Exam Topic 1)
Which two characteristics of DTLS are true? (Choose two.)
Which two characteristics of DTLS are true? (Choose two.)
Question 22
- (Exam Topic 2)
Which two statements about AMP. The Grid are true? (Choose two)
Which two statements about AMP. The Grid are true? (Choose two)
Question 23
- (Exam Topic 3)
Which of the following is part of DevOps virtuous cycle?
Which of the following is part of DevOps virtuous cycle?
Question 24
- (Exam Topic 3)
For your enterprise ISE deployment, you are looking to use certificate-based authentication for all your Windows machines. You have already gone through the exercise of pushing the machine and user certificates out to all the machines using GPO. Since certificate based authentication, by default, doesn't check the certificate against Active Directory or requires credentials from the user, this essentially means that no groups are returned as a part of the authentication request. What are the possible ways to authorize the user based on Active Directory group membership?
For your enterprise ISE deployment, you are looking to use certificate-based authentication for all your Windows machines. You have already gone through the exercise of pushing the machine and user certificates out to all the machines using GPO. Since certificate based authentication, by default, doesn't check the certificate against Active Directory or requires credentials from the user, this essentially means that no groups are returned as a part of the authentication request. What are the possible ways to authorize the user based on Active Directory group membership?
Question 25
- (Exam Topic 1)
Refer to the exhibit.
Which service of feature must be enabled on 209.165.200.255 to produce the given output?
Refer to the exhibit.
Which service of feature must be enabled on 209.165.200.255 to produce the given output?
Question 26
- (Exam Topic 2)
Which statement about encryption headers on the Cisco ESA is true?
Which statement about encryption headers on the Cisco ESA is true?
Question 27
- (Exam Topic 3)
Refer to the exhibit.
R1
ntp authentication-key 12 md5 cisco ntp authenticate
ntp trusted-key 12
ntp source GigabitEthernet ntp master 1
!i
nterface GigabitEthernet1
ip address 171.1.7.21 255.255.255.0 R2
ntp authentication-key 12 md5 cisco ntp authentication-key 102 md5 cisco ntp authenticate
ntp trusted-key 12
ntp trusted-key 102
ntp server 171.1.7.21 key 102
R2# ping 172.1.7.21
Type escape sequence to abort
Sending 5 100-byte ICMP Echos to 171.1.7.21, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 3/4/5 ms R2# sh ntp asso detail
171.1.7.21 configured ipv4, authenticated instance invalid, unsynced, stratum 6 ref ID INIT, time 00000000 0000000 (17:00:00.000 ccie Wed Dec 31, 2017)
R2 is getting time synchronized from NTP server R1. It has been reported that clock on R2 Is not able to associate with the NTP server R1. What could be the possible cause?
Refer to the exhibit.
R1
ntp authentication-key 12 md5 cisco ntp authenticate
ntp trusted-key 12
ntp source GigabitEthernet ntp master 1
!i
nterface GigabitEthernet1
ip address 171.1.7.21 255.255.255.0 R2
ntp authentication-key 12 md5 cisco ntp authentication-key 102 md5 cisco ntp authenticate
ntp trusted-key 12
ntp trusted-key 102
ntp server 171.1.7.21 key 102
R2# ping 172.1.7.21
Type escape sequence to abort
Sending 5 100-byte ICMP Echos to 171.1.7.21, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 3/4/5 ms R2# sh ntp asso detail
171.1.7.21 configured ipv4, authenticated instance invalid, unsynced, stratum 6 ref ID INIT, time 00000000 0000000 (17:00:00.000 ccie Wed Dec 31, 2017)
R2 is getting time synchronized from NTP server R1. It has been reported that clock on R2 Is not able to associate with the NTP server R1. What could be the possible cause?