What technology can you implement on your network to allow Independent applications to work with IPv6 capable applications?
A. DS-Lite
B. NAT-PT
C. ISATAP
D. NAT 6to4
E. NAT64
Answer: E
Which three of these statements about a zone-based policy firewall are correct? (Choose three.)
A. An interface can be assigned to only one security zone.
B. By default, all traffic to and from an interface that belongs to a security zone is dropped unless explicitly allowed in the zone-pair policy.
C. Firewall policies, such as the pass, inspect, and drop actions, can only be applied between two zones.
D. In order to pass traffic between two interfaces that belong to the same security zone, you must configure a pass action using class-default.
E. Traffic cannot flow between a zone member interface and any interface that is not a zone member.
Answer: ACE
Cisco 350-018 Exam Questions Answers
Thursday, 14 September 2017
Tuesday, 2 May 2017
Cisco 350-018 Question Answer
Which four of these attacks or wireless tools can the standard IDS signatures on a wireless LAN controller detect? (Choose four.)
A. long HTTP request
B. SYN flood
C. Deauthorization flood
D. NetStumbler
E. Wellenreiter
F. Association flood
G. AirSnort
H. Fragment Overlap attack
Answer: CDEG
What Cisco IOS feature prevents an attacker from filling up the MTU cache for locally generated traffic when using path MTU discovery?
A. Use NetFlow information to export data to a workstation.
B. Force all traffic to send 1280-byte Packets by hard coding the MSS.
C. Enable flow-label marking to track packet destination.
D. Enable flow-label switching to track IPv6 packets in the MPLS cloud.
E. Always use packets of 1500-byte size or larger.
Answer: C
A. long HTTP request
B. SYN flood
C. Deauthorization flood
D. NetStumbler
E. Wellenreiter
F. Association flood
G. AirSnort
H. Fragment Overlap attack
Answer: CDEG
What Cisco IOS feature prevents an attacker from filling up the MTU cache for locally generated traffic when using path MTU discovery?
A. Use NetFlow information to export data to a workstation.
B. Force all traffic to send 1280-byte Packets by hard coding the MSS.
C. Enable flow-label marking to track packet destination.
D. Enable flow-label switching to track IPv6 packets in the MPLS cloud.
E. Always use packets of 1500-byte size or larger.
Answer: C
Wednesday, 29 March 2017
Cisco 350-018 Question Answer
Which of the following statements are true regarding hashing? (choose two)
A. Changing 1 bit of the input SHA-1 changes 1 bit of the output.
B. SHA-1 is stronger than MD5 because it can be used with a key to prevent modification.
C. MD5 produces a 160-bit result.
D. MD5 takes more CPU cycles to compute than SHA-1.
E. SHA-256 is an extension to SHA-1 with a longer output.
Answer: BE
Which statement about the effect of this command is true?
A. It lists the current protocol-to-port mappings of NBAR.
B. It lists traffic that is packet switched and bypassed by NBAR.
C. It lists the number of packets processed for unknown and unclassified flows.
D. It lists the attributes configured for unknown and unclassified flows.
E. It displays the link age for unknown and unclassified flows.
Answer: D
A. Changing 1 bit of the input SHA-1 changes 1 bit of the output.
B. SHA-1 is stronger than MD5 because it can be used with a key to prevent modification.
C. MD5 produces a 160-bit result.
D. MD5 takes more CPU cycles to compute than SHA-1.
E. SHA-256 is an extension to SHA-1 with a longer output.
Answer: BE
Which statement about the effect of this command is true?

A. It lists the current protocol-to-port mappings of NBAR.
B. It lists traffic that is packet switched and bypassed by NBAR.
C. It lists the number of packets processed for unknown and unclassified flows.
D. It lists the attributes configured for unknown and unclassified flows.
E. It displays the link age for unknown and unclassified flows.
Answer: D
Tuesday, 23 August 2016
Pass4sure 350-018 Question Answer
Which two statements are correct regarding the AES encryption algorithm? (Choose two.)
A. It is a FIPS-approved symmetric block cipher.
B. It supports a block size of 128, 192, or 256 bits.
C. It supports a variable length block size from 16 to 448 bits.
D. It supports a cipher key size of 128, 192, or 256 bits.
E. The AES encryption algorithm is based on the presumed difficulty of factoring large integers.
Answer: A, D
350-018 Practice Test 700-802 Exam Dumps Cisco Practice Exam Questions Dumps
A. It is a FIPS-approved symmetric block cipher.
B. It supports a block size of 128, 192, or 256 bits.
C. It supports a variable length block size from 16 to 448 bits.
D. It supports a cipher key size of 128, 192, or 256 bits.
E. The AES encryption algorithm is based on the presumed difficulty of factoring large integers.
Answer: A, D
350-018 Practice Test 700-802 Exam Dumps Cisco Practice Exam Questions Dumps
Thursday, 14 July 2016
Pass4sure 350-018 Question Answer
Which message could contain an authenticated initial_contact notify during IKE main mode negotiation?
A. message 3
B. message 5
C. message 1
D. none, initial_contact is sent only during quick mode
E. none, notify messages are sent only as independent message types
Answer: B

B. message 5
C. message 1
D. none, initial_contact is sent only during quick mode
E. none, notify messages are sent only as independent message types
Answer: B
Friday, 10 June 2016
Pass4sure 350-018 Question Answer
Which three statements are correct when comparing Mobile IPv6 and Mobile IPv4 support? (Choose three.)
A. Mobile IPv6 does not require a foreign agent, but Mobile IPv4 does.
B. Mobile IPv6 supports route optimization as a fundamental part of the protocol; IPv4 requires extensions.
C. Mobile IPv6 and Mobile IPv4 use a directed broadcast approach for home agent address discovery.
D. Mobile IPv6 makes use of its own routing header; Mobile IPv4 uses only IP encapsulation.
E. Mobile IPv6 and Mobile IPv4 use ARP for neighbor discovery.
F. Mobile IPv4 has adopted the use of IPv6 ND.
Answer: A, B, D Passleader 350-018 BrainDumps
A. Mobile IPv6 does not require a foreign agent, but Mobile IPv4 does.
B. Mobile IPv6 supports route optimization as a fundamental part of the protocol; IPv4 requires extensions.
C. Mobile IPv6 and Mobile IPv4 use a directed broadcast approach for home agent address discovery.
D. Mobile IPv6 makes use of its own routing header; Mobile IPv4 uses only IP encapsulation.
E. Mobile IPv6 and Mobile IPv4 use ARP for neighbor discovery.
F. Mobile IPv4 has adopted the use of IPv6 ND.
Answer: A, B, D Passleader 350-018 BrainDumps
Wednesday, 6 April 2016
Pass4sure 350-018 Question Answer
Which two EIGRP packet types are considered to be unreliable packets? (Choose two.)
A. update
B. query
C. reply
D. hello
E. acknowledgement
Answer: D, E
Before BGP update messages may be sent, a neighbor must stabilize into which neighbor state?
A. Active
B. Idle
C. Connected
D. Established
Answer: D
A. update
B. query
C. reply
D. hello
E. acknowledgement
Answer: D, E
Before BGP update messages may be sent, a neighbor must stabilize into which neighbor state?
A. Active
B. Idle
C. Connected
D. Established
Answer: D
Subscribe to:
Comments (Atom)