Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Microsoft Official New Released 77-601
100% Free Download! 100% Pass Guaranteed!
CCIE Security Exam (v4.1)
Question No: 341 – (Topic 4)
Which statement about the HTTP protocol is true?
-
The request method does not include the protocol version.
-
The proxy acts as an intermediary receiving agent in the request-response chain.
-
The tunnel acts as an intermediary relay agent in the request-response chain.
-
The gateway acts as an intermediary forwarding agent in the request-response chain.
-
The success and error codes are returned in the response message by the user-agent.
Answer: C
Question No: 342 – (Topic 4)
Refer to the exhibit.
What is the cause of the issue that is reported in this debug output?
-
The identity of the peer is not acceptable.
-
There is an esp transform mismatch.
-
There are mismatched ACLs on remote and local peers.
-
The SA lifetimes are set to 0.
Answer: C
Question No: 343 – (Topic 4)
Refer to the exhibit.
Which statement about this Cisco Catalyst switch 802.1X configuration is true?
-
If an IP phone behind the switch port has an 802.1X supplicant, MAC address bypass will still be used to authenticate the IP Phone.
-
If an IP phone behind the switch port has an 802.1X supplicant, 802.1X authentication will be used to authenticate the IP phone.
-
The authentication host-mode multi-domain command enables the PC connected behind the IP phone to bypass 802.1X authentication.
-
Using the authentication host-mode multi-domain command will allow up to eight PCs connected behind the IP phone via a hub to be individually authentication using 802.1X.
Answer: B
Question No: 344 – (Topic 4)
What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access IPsec VPNs? (Choose two.)
-
IKEv2 supports EAP authentication methods as part of the protocol.
-
IKEv2 inherently supports NAT traversal.
-
IKEv2 messages use random message IDs.
-
The IKEv2 SA plus the IPsec SA can be established in six messages instead of nine messages.
-
All IKEv2 messages are encryption-protected.
Answer: A,B
Question No: 345 – (Topic 4)
Which statement about the AH is true?
-
AH authenticates only the data.
-
AH authenticates only the IP header.
-
AH authenticates only the TCP-UDP header.
-
AH authenticates the entire packet and any mutable fields.
-
AH authenticates the entire packet except for any mutable fields.
Answer: E
Question No: 346 – (Topic 4)
Which two statements are correct regarding the AES encryption algorithm? (Choose two.)
-
It is a FIPS-approved symmetric block cipher.
-
It supports a block size of 128, 192, or 256 bits.
-
It supports a variable length block size from 16 to 448 bits.
-
It supports a cipher key size of 128, 192, or 256 bits.
-
The AES encryption algorithm is based on the presumed difficulty of factoring large integers.
Answer: A,D
Question No: 347 – (Topic 4)
Which protocol is superseded by AES?
-
DES
-
RSA
-
RC4
-
MD5
Answer: A
Question No: 348 – (Topic 4)
How does 3DES use the DES algorithm to encrypt a message?
-
encrypts a message with K1, decrypts the output with K2, then encrypts it with K3
-
encrypts a message with K1, encrypts the output with K2, then encrypts it with K3
-
encrypts K1 using K2, then encrypts it using K3, then encrypts a message using the output key
-
encrypts a message with K1, encrypts the output with the K2, then decrypts it with K3
Answer: A
Question No: 349 – (Topic 4)
Which three options correctly describe the AH protocol? (Choose three.)
-
The AH protocol encrypts the entire IP and upper layer protocols for security.
-
The AH protocol provides connectionless integrity and data origin authentication.
-
The AH protocol provides protection against replay attacks.
-
The AH protocol supports tunnel mode only.
-
The AH protocol uses IP protocol 51.
-
The AH protocol supports IPv4 only.
Answer: B,C,E
Question No: 350 – (Topic 4)
What is the purpose of the OCSP protocol?
-
checks the revocation status of a digital certificate
-
submits a certificate signing request
-
verifies a signature of a digital certificate
-
protects a digital certificate with its private key
Answer: A
100% Dumps4cert Free Download!
–Download Free Demo:77-601 Demo PDF
100% Dumps4cert Pass Guaranteed!
–77-601 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |