Candidates of the CCIE Security certification need updated 400-251 exam dumps. DumpsSchool provides updated 400-251 exam dumps for stronger preparation. These 400-251 exam dumps explain each topic of designing, implementing, operating, and troubleshooting complex Cisco security technologies and solutions logically.
Which are the three remediation types that cannot be configured in stealth mode posture? (Choose three.)
Answer: A, C, D
Question No. 3
A customer has configured ISE to assign a Downloadable Access-list as a result of cusses full 802.1x authentication. When they check the switcher after a successful authentication, they do not see the DACL applied. They also notice that ISE logs do not contain the Framed-IP-Address value from the RADIUS exchange. What is the most likely fix?
Answer: B
Question No. 4
Which statement about the wireless security technologies is true?
Answer: B
Question No. 5
You are inspecting Cisco Email security Appliance (ESA) mail_logs, and find the following log lines:
Which two of the following statements are true (Choose two .)
Answer: B, D
Question No. 6
Which two statements about the Cisco FireAMP solution are true? (Choose two.)
Answer: A, C
Question No. 7
Which three statements correctly describe the encoding used by NETCONF and RESTCONF? {Choose three.)
Answer: B, E, F
Question No. 8
What are the advantages of using LDAP over AD?
Answer: C
Question No. 9
Which IPS deployment mode can blacklist traffic?
Answer: C
Question No. 10
Which statement is an advantage of network segmentation?
Answer: D
Question No. 11
What are three technologies that can be used to trace the source of an attack in a network environment
with multiple exit/entry points? (Choose three.)
Answer: A, D, E
Question No. 12
In to enable the Certificate Authority (CA) server feature using Simple Certificate Enrollment Protocol {SCEP} on an IOS device, which three of the following configuration steps are required1? (Choose three)
Answer: B, D, E
Question No. 13
Transmission control protocol, src port: 649999(64999), Dst Port:49086(49086),Seq:2,Ack:2,Len:
Refer to the exhibit.
Answer: D
Question No. 14
Which two statements about role-based access control are true? (Choose two.)