[Free] 2018(July) Dumps4cert Microsoft 77-427 Dumps with VCE and PDF Download 291-300

By | July 24, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Microsoft Official New Released 77-427
100% Free Download! 100% Pass Guaranteed!

CCIE Security Exam (v4.1)

Question No: 291 – (Topic 4)

Which Cisco IPS appliance signature engine defines events that occur in a related manner, within a sliding time interval, as components of a combined signature?

  1. Service engine

  2. Sweep engine

  3. Multistring engine

  4. Meta engine

Answer: D

Question No: 292 – (Topic 4)

Which four statements about SeND for IPv6 are correct? (Choose four.)

  1. It protects against rogue RAs.

  2. NDP exchanges are protected by IPsec SAs and provide for anti-replay.

  3. It defines secure extensions for NDP.

  4. It authorizes routers to advertise certain prefixes.

  5. It provides a method for secure default router election on hosts.

  6. Neighbor identity protection is provided by Cryptographically Generated Addresses that are derived from a Diffie-Hellman key exchange.

  7. It is facilitated by the Certification Path Request and Certification Path Response ND messages.

Answer: A,C,D,E

Question No: 293 – (Topic 4)

Which two statements about OSPF authentication are true? (Choose two.)

  1. OSPF authentication is required in area 0.

  2. There are three types of OSPF authentication.

  3. In MD5 authentication, the password is encrypted when it is sent.

  4. Null authentication includes the password in clear-text.

  5. Type-3 authentication is a clear-text password authentication.

  6. In MD5 authentication, the password never goes across the network.

Answer: B,F

Question No: 294 – (Topic 4)

Which three types of information could be used during the incident response investigation phase? (Choose three.)

  1. netflow data

  2. SNMP alerts

  3. encryption policy

  4. syslog output

  5. IT compliance reports

Answer: A,B,D

Question No: 295 – (Topic 4)

Which three statements are true about the SSH protocol? (Choose three.)

  1. SSH protocol runs over TCP port 23.

  2. SSH protocol provides for secure remote login and other secure network services over an insecure network.

  3. Telnet is more secure than SSH for remote terminal access.

  4. SSH protocol runs over UDP port 22.

  5. SSH transport protocol provides for authentication, key exchange, confidentiality, and integrity.

  6. SSH authentication protocol supports public key, password, host based, or none as authentication methods.

Answer: B,E,F

Question No: 296 – (Topic 4)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which statement regarding the output is true?

  1. Every 1800 seconds the secondary name server will query the SOA record of the primary name server for updates.

  2. If the secondary name server has an SOA record with the serial number of 10973815, it will initiate a zone transfer on the next cycle.

  3. Other DNS servers will cache records from this domain for 864000 seconds (10 days)

    before requesting them again.

  4. Email queries concerning this domain should be sent to quot;admin@postmaster.cisco.comquot;.

  5. Both primary and secondary name servers will clear (refresh) their caches every 7200 seconds to ensure that up-to-date information is always in use.

Answer: B

Question No: 297 – (Topic 4)

Which of the following two options can you configure to avoid iBGP full mesh? (Choose two.)

  1. Route reflectors

  2. Confederations

  3. BGP NHT

  4. Local preference

  5. Virtual peering

Answer: A,B

Question No: 298 – (Topic 4)

Which command is used to replicate HTTP connections from the Active to the Standby Cisco ASA appliance in failover?

  1. monitor-interface http

  2. failover link fover replicate http

  3. failover replication http

  4. interface fover replicate http standby

  5. No command is needed, as this is the default behavior.

Answer: C

Question No: 299 – (Topic 4)

Which option explains the passive scan technique that is used by wireless clients to

discover available wireless networks?

  1. listening for access point beacons that contain available wireless networks

  2. sending a null probe request

  3. sending a null association request

  4. listening for access point probe response frames that contain available wireless networks

Answer: A

Question No: 300 – (Topic 4)

Which three statements are true about TLS? (Choose three.)

  1. TLS protocol uses a MAC to protect the message integrity.

  2. TLS data encryption is provided by the use of asymmetric cryptography.

  3. The identity of a TLS peer can be authenticated using public key or asymmetric cryptography.

  4. TLS protocol is originally based on the SSL 3.0 protocol specification.

  5. TLS provides support for confidentiality, authentication, and nonrepudiation.

Answer: A,C,D

100% Dumps4cert Free Download!
Download Free Demo:77-427 Demo PDF
100% Dumps4cert Pass Guaranteed!
77-427 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.