[Free] 2019(Nov) EnsurePass Cisco 400-251 Dumps with VCE and PDF 101-110

Get Full Version of the Exam

Question No.101

Refer to the exhibit. Which type of packet can trigger the rate hmrter m the given configurator?


  1. Only DSCP 8000 packets

  2. Only DSCP 1 packets

  3. Only DSCP 1500 packets

  4. DSCP 1, 1500, 3000, and 8000 packets

  5. Only DSCP 3000 packets

Correct Answer: A

Question No.102

Refer to the exhibit. Customer has opened a case with Cisco TAC reporting issue client supposed to login to the network using MAB is no longer able to access a Looking at the configuration of the switch, what could be the possible cause of?


  1. AAA authorization is incorrectly configured

  2. Switch configuration is properly configured and the issue is on the radius

  3. Incorrect CTS configuration on switch

  4. Issue with CoA configuration

  5. Dot 1x should be globally disabled for the MAC to work

  6. Issue with the DHCP pool. configuration

  7. Authentication port G1/0/9 is not configured to perform MAB

Correct Answer: G

Question No.103

Which two benefits of the Stealth Watch Flow Collector are true? (Choose two)

  1. It can be deployed with hardware appliances or as virtual machines

  2. It provides round trip time and server-response time calculations to optimizes UDP

  3. Connections

  4. When deployed in a routed network its multiple flow sensors can aggregate data to provide full network visibility Layer 1 to Layer 7

  5. It eliminates the need for separate flow sensors and flow collections

  6. It management console provides numerous drill-down tools to help administrators isolate the cause of an incident

  7. It integrates with Cisco Outbreak intelligence for full zero-day threat protection

  8. It can be configured and managed with the stealth watch management console which is an Intultive web interface, and a powerful CLI.

Correct Answer: AB

Question No.104

Which two protocols are supported when using TACACS ? (Choose two)

  1. MS-CHAP

  2. CHAP

  3. NASI

  4. HDLC

  5. AppleTalk

Correct Answer: CE

Question No.105

Which command is used to enable 802.1x authorization on an interface?

  1. authentication open

  2. aaa authorization auth-proxy default

  3. authentication control-direction both

  4. aaa authorization network default group tacacs

  5. authentication port-control auto

Correct Answer: D

Question No.106

Which statement about deploying policies with the Firepower Management Center is true?

  1. Deploy tasks can be scheduled to deploy policies automatically.

  2. All policies are deployed on-demand when the administration triggers them.

  3. Policies are deployed automatically when the administration saves them.

  4. The leaf domain can deploy change store all sub domains simultaneously.

  5. The global domain can deploy changes to individual subdomains.

Correct Answer: A

Question No.107

Which three statements about the SHA-2 algorithm are true? (Choose three.)

  1. It provides a fixed-length output using a collision-resistant cryptographic hash.

  2. It provides a variable-length output using a collision-resistant cryptographic hash.

  3. It generates a 512-bit message digest.

  4. It generates a 160-bit message digest.

  5. It is used for integrity verification

  6. It is the collective term for the SHA-224, SHA-256, SHA-384, and SHA-512 algorithms.

Correct Answer: AEF

Question No.108

Which two design options are best to reduce security concerns when adopting loT into an organization? (Choose two.)

  1. Ensure that application can gather and analyze data at the edge.

  2. Implement video analytics on IP cameras.

  3. Encrypt sensor data in transit.

  4. Segment the Field Area Network from the Data Center network.

  5. Encrypt data at rest on all devices in the loT network.

Correct Answer: CD

Question No.109

AMP for Endpoint is supported on which of these platforms?

  1. Windows, MAC, ANDROID



  4. Windows, ANDROID, LINUX (REDHA, CentOS), MAC

Correct Answer: D

Question No.110

Which command is used to enable 802.1x authentication on an interface?

  1. authentication port-control auto

  2. aaa authorization auth-proxy default

  3. aaa authorization network default group tacacs

  4. authentication control-direction both

  5. authentication open

Correct Answer: A

Get Full Version of the Exam
400-251 Dumps
400-251 VCE and PDF