|Full Exam Name
||CCIE Data Center
||Cisco Certified Intenet Expert Data Center
||Data Center Management
♥ 2018 Valid 400-151 Exam Questions ♥
400-151 exam questions, 400-151 PDF dumps; 400-151 exam dumps:: 400-151 Dumps (246 Q&A) (New Questions Are 100% Available! Also Free Practice Test Software!)
Latest and Most Accurate Cisco 400-151 Exam Questions:
A server with IP address 184.108.40.206 is protected behind the inside interface of a Cisco ASA and
Internet on the outside interface. User on the Internet need to access the server ay any time, but the
firewall administrator does not want to apply NAT to the address of the server because it is currently
a public address. Which three of the following commands can be used to accomplish this? (Choose
A. static (outside, inside) 220.127.116.11.18.104.22.168 netmask 255.255.255.255
B. nat (inside) 1 22.214.171.124 255.255.255.255
C. static (inside, outside) 126.96.36.199.188.8.131.52 netmask 255.255.255.255
D. no nat-control
E. access-list no-nat permit ip host 184.108.40.206 any
nat (inside) 0 access-list no-nat
F. nat (inside) 0 220.127.116.11 255.255.255.255
Which statement about the Cisco AMP Virtual Private Cloud Appliance is true for deployments in airgap
A. The amp-sync tool syncs the threat-intelligence repository on the appliance directly with the AMP
B. The appliance can perform disposition lookup against either the Protect DB or the AMP public
C. The appliance can perform disposition lookups against the Protect DB without an Internet
D. The appliance evaluates files against the threat intelligence and disposition information residing
E. The Update Host automatically downloads updates and deploys them to the Protect DB on a daily
What are the most common methods that security auditors use to access an organization’s securityprocesses? (Choose two.)
A. physical observation
B. social engineering attempts
C. penetration testing
D. policy assessment
E. document review
Which two statements about Cisco AMP for Web Security are true? (Choose two.)
A. It can prevent malicious data exfiltration by blocking critical files from exiting through the Web
B. It can perform reputation-based evaluation and blocking by uploading the fingerprint of incoming
files to a cloud-based threat intelligence network.
C. It can detect and block malware and other anomalous traffic before it passes through the Web
D. It can perform file analysis by sandboxing known malware and comparing unknown files to a local
repository of the threats.
E. It can identify anomalous traffic passing through the Web gateway by comparing it to an
F. It continues monitoring files after they pass the Web gateway.
Which three statements about WCCP are true? (Choose three.)
A. If a specific capability is missing from the Capabilities Info Component, the router is assumed to
support the default capability.
B. The web cache transmits its capabilities as soon as it receives a receive ID from a router.
C. The minimum WCCP-Fast Timers message interval is 500 ms.
D. The assignment method supports GRE encapsulation for sending traffic.
E. If the packet return method is missing from a packet return method advertisement, the web cache
the Layer 2 rewrite method.
F. The router must receive a valid receive ID before it negotiates capabilities.
What are two features that helps to mitigate man-in-the-middle attacks? (Choose two.)
A. DHCP snooping
B. ARP spoofing
C. destination MAC ACLs
D. dynamic ARP inspection
E. ARP sniffing on specific ports
New Updated 400-151 Exam Questions 400-151 PDF dumps 400-151 practice exam dumps: https://www.dumpsschool.com/400-151-exam-dumps.html