Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July VMware Official New Released 2V0-642
100% Free Download! 100% Pass Guaranteed!
CCIE Security Exam (v4.1)
Question No: 41 – (Topic 1)
A cloud service provider is designing a large multitenant data center to support thousands of tenants. The provider is concerned about the scalability the layer 2 network and providing layer 2 segmentation to potentially thousands of tenants .Which layer 2 technology is best suited in this scenario?
-
extended VLAN ranges
-
VXLAN
-
VRF
-
LDP
Answer: B
Question No: 42 – (Topic 1)
Which two statements about cisco ASA authentication using LDAP are ture:
-
it uses AD attribute maps to assign users to group policies configured under the webvpn contant.
-
It is a closed standard that manages directory-information services over distributed networks
-
It can assign a group policy to a user based on access credentials.
-
It uses attribute maps to map the AD member of attribute to the cisco ASA group policy attribute.
-
The cisco ASA can use more than one AD . member of attribute to match a user to multiple group policies.
-
It can combine AD attributes and LDAP attribute to configure group policies on the cisco ASA.
Answer: C,D
Question No: 43 – (Topic 1)
On an ASA firewall in multiple context mode running version 8.X, what is the default number of VPN site-to-site tunnels per context?
-
2 sessions
-
4 sessions
-
1 session
-
0 sessions
Answer: A
Question No: 44 – (Topic 1)
Refer to the exhibit.
Which command caused the above messages
-
neighbor 101.0.0.1 maximun-prefix 500 70 warning-only
-
neighbor 101.0.0.1 maximun-prefix 500 70
-
neighbor 101.0.0.1 maximun-prefix 500 80 warning-only
-
neighbor 101.0.0.1 maximun-prefix 500 90
Answer: B
Question No: 45 – (Topic 1)
Refer to the exhibit.
Which effect of this configuration is true ?
-
It configures the node to generate a link-locak group report when it joins the solicited- node multicast group
-
It enables local group membership for MLDv1 and MLDv2
-
It enables hosts to send MLD report messages for groups in 224.0.0.0/24
-
It enables MLD query messages for all link-local groups
-
It enables the host to send MLD report messages for nonlink local groups
Answer: C
Question No: 46 – (Topic 1)
The computer at 10.10.10.4 on your network has been infected by a bontnet that directs traffic to a malware site at 168.65.201.120 Assuming that filtering will be performed on a Cisco ASA,What command can you use to block all current and future connections from the infected host ?
A. B.shun 168.65.201.120 10.10.10.4 6000 80
B. C.ip access-list extended BLOCK_BOT_OUT deny ip host 10.10.10.4 host 168.65.201.120
C. D.shun 10.10.10.4 68.65.201.120 6000 80
Answer: B
Question No: 47 – (Topic 1)
Refer to the exhibit.
Which effect of this configuration is true ?
-
The MSS of TCP SYN packets is set to 1452 bytes and the IP MTU of the interface is set to 1942 bytes
-
The maximum size of TCP SYN ACK packets passing the transient host is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes
-
The PMTUD values sets itself to 1452 bytes when the interface MTU is set to 1492 bytes
-
SYN packets carries 1452 bytes in the payload when the Ethernet MTU of the interface is to 1492 bytes
-
The maximum size of TCP SYN ACK packets passing the router is set to 452 bytes and the IP MTU of the interface is set to 1492 bytes
Answer: A
Question No: 48 – (Topic 1)
Refer to the exhibit.
What type of attack is illustrated?
-
IP address spoofing
-
ICMP flood
-
CAM overflow
-
ARP spoofing
Answer: D
Question No: 49 – (Topic 1)
Which statement about remote procedure calls is true?
-
They can be invoked by the client and the server
-
They can emulate different hardware specifications on a single platform
-
They support synchronous and asynchronous requests
-
They use a special assembly instruction set to process remote code without conflicting with other remote processes
-
They support optimized data replication among multiple machines
Answer: D
Question No: 50 – (Topic 1)
What are two features that help to mitigate man-in-the-middle attacks?(Choose two)
-
DHCP snooping
-
dynamic ARP inspection
-
destination MAC ACLS
-
ARP sniffing on specific ports
-
ARP spoofing
Answer: A,B
100% Dumps4cert Free Download!
–Download Free Demo:2V0-642 Demo PDF
100% Dumps4cert Pass Guaranteed!
–2V0-642 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |