[Free] 2018(July) Dumps4cert VMware 2V0-651 Dumps with VCE and PDF Download 201-210

By | July 25, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July VMware Official New Released 2V0-651
100% Free Download! 100% Pass Guaranteed!

CCIE Security Exam (v4.1)

Question No: 201 – (Topic 2)

Which statement about SOX is true?

  1. Section 404 of SOX is related to non IT compliance.

  2. It is a US law.

  3. It is an IEFT compliance procedure for computer systems security.

  4. It is an IEEE compliance procedure for IT management to produce audit reports.

  5. It is a private organization that provides best practices for financial institution computer systems.

Answer: B Explanation:

The Sarbanes-Oxley Act of 2002 (Pub.L. 107-204, 116 Stat. 745, enacted July 30, 2002), also known as the quot;Public Company Accounting Reform and Investor Protection Actquot; (in the Senate) and quot;Corporate and Auditing Accountability and Responsibility Actquot; (in the House) and more commonly called Sarbanes-Oxley, Sarbox or SOX, is a United States federal law that set new or expanded requirements for all U.S. public company boards, management and public accounting firms. There are also a number of provisions of the Act that also apply to privately held companies, for example the willful destruction of evidence to impede a Federal investigation.

Reference: https://en.wikipedia.org/wiki/Sarbanes–Oxley_Act

Question No: 202 – (Topic 2)

What is an example of a stream cipher?

  1. RC5

  2. DES

  3. RC4

  4. Blowfish

Answer: C

Topic 4, Exam Set C

Question No: 203 – (Topic 4)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which statement best describes the problem?

  1. Context vpn1 is not inservice.

  2. There is no gateway that is configured under context vpn1.

  3. The config has not been properly updated for context vpn1.

  4. The gateway that is configured under context vpn1 is not inservice.

Answer: A

Question No: 204 – (Topic 4)

Which command is required in order for the Botnet Traffic Filter on the Cisco ASA appliance to function properly?

  1. dynamic-filter inspect tcp/80

  2. dynamic-filter whitelist

  3. inspect botnet

  4. inspect dns dynamic-filter-snoop

Answer: D

Question No: 205 – (Topic 4)

Which group of devices is represented by the IPv6 address ff02::1?

  1. All PIM routers on the local network.

  2. All the routers running RIP on the local network.

  3. All nodes on the local network.

  4. All NTP servers on the local network.

Answer: C

Question No: 206 – (Topic 4)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

The client is protected by a firewall. An IPv6 SMTP connection from the client to the server on TCP port 25 will be subject to which action?

  1. pass action by the HTTP_CMAP

  2. inspection action by the TCP_CMAP

  3. inspection action by the SMTP_CMAP

  4. drop action by the default class

  5. pass action by the HTTP_CMAP

Answer: C

Question No: 207 – (Topic 4)

Which three statements describe the security weaknesses of WEP? (Choose three.)

  1. Key strength is weak and non-standardized.

  2. The WEP ICV algorithm is not optimal for cryptographic integrity checking.

  3. There is no key distribution mechanism.

  4. Its key rotation mechanism is too predictable.

  5. For integrity, it uses MD5, which has known weaknesses.

Answer: A,B,C

Question No: 208 – (Topic 4)

Which three types of traffic are processed by CoPP configured on the device? (Choose three.)

  1. tansient traffic

  2. routing protocol traffic

  3. IPsec traffic

  4. traffic that is destined to the device interface

  5. any traffic filtered by the access list

  6. traffic from a management protocol such as Telnet or SNMP

Answer: B,D,F

Question No: 209 – (Topic 4)

Which three statements about Security Group Tag Exchange Protocol are true? (Choose three.)

  1. SXP runs on UDP port 64999.

  2. A connection is established between a quot;listenerquot; and a quot;speaker.quot;

  3. It propagates the IP-to-SGT binding table across network devices that do not have the ability to perform SGT tagging at Layer 2 to devices that support it.

  4. SXP is supported across multiple hops.

  5. SXPv2 introduces connection security via TLS.

Answer: B,C,D

Question No: 210 – (Topic 4)

What mechanism does SSL use to provide confidentiality of user data?

  1. symmetric encryption

  2. asymmetric encryption

  3. RSA public-key encryption

  4. Diffie-Hellman exchange

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:2V0-651 Demo PDF
100% Dumps4cert Pass Guaranteed!
2V0-651 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.