[Full-Version!]Cisco 400-251 (CCIE Security) Exam Questions and Answers 1106q Instant Download in Braindump2go[Question46-Question55]
2017 CISCO Official News: 350-018 Exam is Replaced by 400-251 Written Exam Now! 2017 New 400-251: CCIE Security Written Exam v5.1 PDF and VCE Dumps Just Released Today by Braindump2go.com!
1.|2017 NEW 400-251 Written Exam Dumps (PDF & VCE) 1106Q&As Download:
2.|2017 NEW 400-251 Written Exam Questions & Answers:
Which two statement about IPv6 path MTU discovery are true? (Choose two)
A. The discover packets are dropped if there is congestion on the link.
B. the initial path MTU is the same as the MTU of the original node’s link layer interface
C. It can allow fragmentation when the minimum MTU is blow a configured value
D. During the discover process the DF bit is set to 1
E. If the source host receiver an ICMPv6 packet too BIG message from a router it reduces its path MTU
F. IF the destination host receives and ICMPv6 packet too Big message from a router it reduces its path MTU
Which two effects of configuring the tunnel path-mtu-discovery command on a GRE tunnel interface are true? (Choose two)
A. The maximum path MTU across the GRE tunnel is set to 65534 bytes.
B. If a lower MTU link between the IPsec peers is detected , the GRE tunnel MTU are changed.
C. The router adjusts the MTU value it sends to the GRE tunnel interface in the TCP SYN packet.
D. It disables PMTUD discovery for tunnel interfaces.
E. The DF bit are copied to the GRE IP header.
F. The minimum path MTU across the GRE tunnel is set to 1476 bytes.
Which option describes the purpose of the RADIUS VAP-ID attribute?
A. It specifies the ACL ID to be matched against the client
B. It specifies the WLAN ID of the wireless LAN to which the client belongs
C. It sets the minimum bandwidth for the connection
D. It sets the maximum bandwidth for the connection
E. It specifies the priority of the client
F. It identifies the VLAN interface to which the client will be associated
You are developing an application to manage the traffic flow of a switch using an OpenDaylight controller.
Knowing you use a Northbound REST API ,which statement is true?
A. Different applications, even in different languages, cannot use the same functions in a REST API at same time.
B. The server retains client state records
C. We must teach our applications about the Southbound protocol(s) used
D. The applications are considered to be the clients, and the controller is considered to be the server
Which option describes the purpose of Fog architecture in loT?
A. To provide compute services at the network edge
B. To provide intersensor traffic routing
C. To provide centralized compute resources
D. To provide highly available environmentally hardened network access
What are feature that can stop man-in-the-middle attacks? (Choose two)
A. ARP sniffing on specific ports
B. ARP spoofing
C. Dynamic ARP inspection
D. DHCP snooping
E. destination MAC ACLs
Which two statements about CoPP are true? (Choose two)
A. When a deny rule in an access list is used for MQC is matched, classification continues on the next class
B. It allows all traffic to be rate limited and discarded
C. Access lists that are used with MQC policies for CoPP should omit the log and log-input keywords
D. The mls qos command disables hardware acceleration so that CoPP handles all QoS
E. Access lists that use the log keyword can provide information about the device’s CPU usage
F. The policy-map command defines the traffic class
Refer to the exhibit. Which effect of this configuration is true?
A. The WLC accepts self-signed certificates from the RADIUS server to authorize APs.
B. The WLC adds the MAC addresses listed in the ssc ap-policy to its internal authorization list.
C. The WLC adds the ssc access point to the auth-list internal authorization list.
D. The WLC accepts the manufacture-installed certificate from the local access point.
E. The WLC accepts self-signed certificates from devices added to itsa internal authorization list.
Drag and Drop Question
Drag each ip transmission and Fragmentation term on the left to the matching statement on right
Which two network protocols can operate on the Application Layer?(Choose two)
1.|2017 NEW 400-251 Exam Dumps (PDF & VCE) 1106Q&As Download:
2.|2017 NEW 400-251 Study Guide Video: