Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Microsoft Official New Released 77-427
100% Free Download! 100% Pass Guaranteed!
CCIE Security Exam (v4.1)
Question No: 251 – (Topic 4)
Which two statements describe GRE? (Choose two.)
-
GRE acts as passenger protocol for a Layer 3 transport protocol.
-
GRE acts as a tunneling protocol and encapsulates other protocols.
-
GRE provides data confidentiality.
-
Packet MTU must be adjusted to accommodate GRE overhead.
-
GRE does not allow multicast to be sent across the tunnel.
-
The GRE tunnel interface remains down until it can see the remote tunnel end.
Answer: B,D
Question No: 252 – (Topic 4)
Refer to the exhibit.
Which option describes the behavior of this configuration?
-
Traffic from the 30.30.0.0/16 network to the 10.10.0.0/32 network will be translated.
-
Traffic from the 30.30.0.0/32 network to the 10.10.0.0/16 network will not be translated.
-
Traffic from the 10.10.0.0/16 network to the 30.30.30.0/24 network will not be translated.
-
Traffic from the 10.10.0.0/32 network to the 30.30.30.0/16 network will be translated.
Answer: C
Question No: 253 – (Topic 4)
What are two uses of an RSA algorithm? (Choose two.)
-
Data encryption
-
Digital signature verification
-
Shared key generation
-
Message hashing
Answer: A,B
Question No: 254 – (Topic 4)
Which statement about PVLAN setup is true?
-
The host that is connected to the community port can communicate with a host that is connected to a different community port.
-
The host that is connected to the community port cannot communicate with hosts that are connected to the promiscuous port.
-
The host that is connected to the community port cannot communicate with hosts that are connected to the isolated port.
-
The host that is connected to the community port can only communicate with hosts that are connected to the same community port.
Answer: C
Question No: 255 – (Topic 4)
Which configuration implements an ingress traffic filter on a dual-stack ISR border router to prevent attacks from the outside to services such as DNSv6 and DHCPv6?
-
!
ipv6 access-list test deny ipv6 FF05::/16 any deny ipv6 any FF05::/16
! output omitted permit ipv6 any any
!
-
!
ipv6 access-list test permit ipv6 any FF05::/16
! output omitted deny ipv6 any any
!
-
!
ipv6 access-list test
deny ipv6 any any eq dns deny ipv6 any any eq dhcp
! output omitted permit ipv6 any any
!
-
!
ipv6 access-list test
deny ipv6 any 2000::/3
! output omitted permit ipv6 any any
!
-
!
ipv6 access-list test deny ipv6 any FE80::/10
! output omitted permit ipv6 any any
!
Answer: A
Question No: 256 – (Topic 4)
The address of an inside client is translated from a private address to a public address by a NAT router for access to an outside web server. What term describes the destination address (client) after the outside web server responds, and before it hits the NAT router?
-
inside local
-
inside global
-
outside local
-
outside global
Answer: B
Question No: 257 – (Topic 4)
When you compare WEP to WPA (not WPA2), which three protections are gained? (Choose three.)
-
a message integrity check
-
AES-based encryption
-
avoidance of weak Initialization vectors
-
longer RC4 keys
-
a rekeying mechanism
Answer: A,C,E
Question No: 258 – (Topic 4)
Which three steps are required to rekey the routers on a link without dropping OSPFv3 protocol packets or disturbing the adjacency? (Choose three.)
-
For every router on the link, create an additional inbound SA for the interface that is being rekeyed using a new SPI and the new key.
-
For every router on the link, replace the original outbound SA with one that uses the new SPI and key values.
-
For every router on the link, remove the original inbound SA.
-
For every router on the link, create an additional outbound SA for the interface that is being rekeyed using a new SPI and the new key.
-
For every router on the link, replace the original inbound SA with one that uses the new SPI and key values.
-
For every router on the link, remove the original outbound SA.
Answer: A,B,C
Question No: 259 – (Topic 4)
Which four attributes are identified in an X.509v3 basic certificate field? (Choose four.)
-
key usage
-
certificate serial number
-
issuer
-
subject name
-
signature algorithm identifier
-
CRL distribution points
-
subject alt name
Answer: B,C,D,E
Question No: 260 – (Topic 4)
Which three features describe DTLS protocol? (Choose three.)
-
DTLS handshake does not support reordering or manage loss packets.
-
DTLS provides enhanced security, as compared to TLS.
-
DTLS provides block cipher encryption and decryption services.
-
DTLS is designed to prevent man-in-the-middle attacks, message tampering, and message forgery.
-
DTLS is used by application layer protocols that use UDP as a transport mechanism.
-
DTLS does not support replay detection.
Answer: C,D,E
100% Dumps4cert Free Download!
–Download Free Demo:77-427 Demo PDF
100% Dumps4cert Pass Guaranteed!
–77-427 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |