Cisco 350-018 Study Guide

Page 1

http://www.pass4sureOfficial.com

350-018 Cisco CCIE Pre-Qualification Test for Security

Pass4sureofficial.com is a reputable IT certification examination guide, study guides and audio exam provider, we not only ensure that you pass your 350-018 exam in first attempt, but also you can get a high score to acquire Cisco certification. If you use pass4sureofficial 350-018 Certification questions and answers, you will experience actual 350-018 exam questions/answers. We know exactly what is needed and have all the exam preparation material required to pass the exam. Our Cisco exam prep covers over 95% of the questions and answers that may be appeared in your 350-018 exam. Every point from pass4sure 350-018 PDF, 350-018 review will help you take Cisco 350-018 exam much easier and become Cisco certified. All the Questions/Answers are taken from real exams. Here's what you can expect from the Pass4sureOfficial Cisco 350-018 course: * Up-to-Date Cisco 350-018 questions taken from the real exam. * 100% correct Cisco 350-018 answers you simply can't find in other 350-018 courses. * All of our tests are easy to download. Your file will be saved as a 350-018 PDF. * Cisco 350-018 brain dump free content featuring the real 350-018 test questions. Cisco 350-018 certification exam is of core importance both in your Professional life and Cisco certification path. With Cisco certification you can get a good job easily in the market and get on your path for success. Professionals who passed Cisco 350-018 exam training are an absolute favorite in the industry. You will pass Cisco 350-018 certification test and career opportunities will be open for you.


Exam Name: Exam Type: Exam Code:

CCIE Pre-Qualification Test for Security Cisco 350-018

Total Questions:

326

Question: 1 VPDN is short for Virtual Private Dialup Network. In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between: A. The NAS and the LAC. B. The client and the NAS C. The NAS and the LNS D. The client and the LNS Answer: D Question: 2 In most buffer overflow attacks, which behavior would be expected? A. A vulnerability used to overflow the buffer and an exploit used to run malicious software off of the stack. B. Shell code to exploit the buffer C. An exploit used to overflow the buffer and a vulnerability used to run malicious software off of the stack. D. A single crafted packet to overflow the buffer and run malicious software Answer: A Question: 3 What statement is correct about PAT? A. PAT provides access control. B. PAT is the preferred method to map servers to external networks. C. PAT rewrites the source address and port. D. PAT keeps ports but rewrites address. Answer: C Question: 4 When configuring system state conditions with the Cisco Security Agent, what will be the result when configuring more than one system state condition? A. Once a state condition is met, the system ceases searching further conditions and will cause the state condition to trigger B. Once the state conditions are met, they become persistent and can only be removed using the Reset feature. C. All specified state conditions are used as part of the requirements to be met to for the state to trigger. D. Any matching state condition will result with the state being triggered. Answer: C Question: 5 A switch has been configured to support MultiLayer Switching (MLS). In addition, Access Control Lists on the MLS-Route Processor have been configured to block all FTP traffic destined to the Internet. What flow mask will be used to create each shortcut? A. Application flow mask B. Full flow mask C. Destination-Source flow mask Page 1 of 96


Exam Name: Exam Type: Exam Code:

CCIE Pre-Qualification Test for Security Cisco 350-018

Total Questions:

D. Destination flow mask Answer: B Question: 6 Which option is the correct diagram for an IPsec Authentication Header?

Answer:

Page 2 of 96

326


Exam Name: Exam Type: Exam Code:

CCIE Pre-Qualification Test for Security Cisco 350-018

Total Questions:

326

Question: 7 What is the term used to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim? A. Fraggle Attack B. Man in the Middle Attack C. Trojan Horse Attack D. Smurf Attack Answer: D Question: 8 Match the correct relationship between Diffie Hellman group and Diffie Hellman description. 1. Diffie Hellman Group 1 2. Diffie Hellman Group 2 3. Diffie Hellman Group 3 4. Diffie Hellman Group 5 5. Diffie Hellman Group 7 (I) Default for Site-to-Site VPN with 3DES Encryption Page 3 of 96


Exam Name: Exam Type: Exam Code:

CCIE Pre-Qualification Test for Security Cisco 350-018

Total Questions:

326

(II) Recommended for devices with low processing power, such as PDAs (III) Recommended for AES Encryption option (IV) Default for Remote Access VPN with DES Encryption option A. (I) - 1, (II) - 2, (III) - 3, (IV) - 5 B. (I) - 1, (II) - 5, (III) - 4, (IV) - 2 C. (I) -1, (II) - 3, (III) - 4, (IV) - 2 D. (I) - 1, (II) - 5, (III) - 2, (IV) - 4 Answer: B Question: 9 While using internet standards, you must follow RFC's processes and procedures based on which RFC? A. Real standards of RFC 1918 B. RFC 1669 real standards and mere publications. C. Real standards and mere publications RFC 1769 D. None of the above. Answer: D Question: 10 If the result of an attack left an ARP table in the state below, what address would you suspect of launching the attack? Internet 171.16.1.100 - 000c.5a35.3c77 ARPA FastEthernet0/0 Internet 171.16.1.111 0 00bc.d1f5.f769 ARPA FastEthernet0/0 Internet 171.16.1.112 0 00bc.d1f5.f769 ARPA FastEthernet0/0 Internet 171.16.1.113 3 00bc.d1f5.f769 ARPA FastEthernet0/0 Internet 171.16.1.114 0 00bc.d1f5.f769 ARPA FastEthernet0/0 A. 171.16.1.100 B. 171.16.1.111 C. 171.16.1.112 D. 171.16.1.113 Answer: D Question: 11 Which two statements correctly describe the Cisco Trust Agent (CTA)? (Choose two.) A. Provides the capability at the endpoint to apply QoS markings to application network traffic as specified by Cisco Trust Agent policy rules. B. Available on Windows operating systems only. C. Can communicate the Cisco Security Agent (CSA) version, OS and patch version, as well as the presence, version, and other posture information of third-party applications that are part of the NAC initiative to the Authentication Server. D. Includes both a Layer 3 communication component using EAP over UDP, as well as an 802.1x supplicant, allowing layer 2 EAP over LAN communications. Answer: C, D Question: 12

Page 4 of 96


Pass4SureOfficial.com Lifetime Membership Features; -

Pass4SureOfficial Lifetime Membership Package includes over 2300 Exams. All exams Questions and Answers are included in package. All Audio Guides are included free in package. All Study Guides are included free in package. Lifetime login access. Unlimited download, no account expiry, no hidden charges, just one time $99 payment. Free updates for Lifetime. Free Download Access to All new exams added in future. Accurate answers with explanations (If applicable). Verified answers researched by industry experts. Study Material updated on regular basis. Questions, Answers and Study Guides are downloadable in PDF format. Audio Exams are downloadable in MP3 format. No authorization code required to open exam. Portable anywhere. 100% success Guarantee. Fast, helpful support 24x7.

View list of All exams (Q&A) downloads http://www.pass4sureofficial.com/allexams.asp View list of All Study Guides (SG) downloads http://www.pass4sureofficial.com/study-guides.asp View list of All Audio Exams (AE) downloads http://www.pass4sureofficial.com/audio-exams.asp Download All Exams Samples http://www.pass4sureofficial.com/samples.asp To purchase $99 Lifetime Full Access Membership click here http://www.pass4sureofficial.com/purchase.asp 3COM ADOBE APC Apple BEA BICSI CheckPoint Cisco Citrix CIW

CompTIA ComputerAssociates CWNP DELL ECCouncil EMC Enterasys ExamExpress Exin ExtremeNetworks

Filemaker Fortinet Foundry Fujitsu GuidanceSoftware HDI Hitachi HP Huawei Hyperion

IBM IISFA Intel ISACA ISC2 ISEB ISM Juniper Legato Lotus

LPI McAfee McData Microsoft Mile2 NetworkAppliance Network-General Nokia Nortel Novell

OMG Oracle PMI Polycom RedHat Sair SASInstitute SCP See-Beyond SNIA

Sun Sybase Symantec TeraData TIA Tibco TruSecure Veritas Vmware


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.