Wednesday 8 February 2017

350-018 Sample Question

Question No : 20

Which two statements about the MD5 Hash are true? (Choose two.)

A. Length of the hash value varies with the length of the message that is being hashed.
B. Every unique message has a unique hash value.
C. Its mathematically possible to find a pair of message that yield the same hash value.
D. MD5 always yields a different value for the same message if repeatedly hashed.
E. The hash value cannot be used to discover the message.

Answer: B,E

Wednesday 25 January 2017

350-018 Sample Question

Question No : 19

Which two statements about the MD5 Hash are true? (Choose two.)

A. Length of the hash value varies with the length of the message that is being hashed.
B. Every unique message has a unique hash value.
C. Its mathematically possible to find a pair of message that yield the same hash value.
D. MD5 always yields a different value for the same message if repeatedly hashed.
E. The hash value cannot be used to discover the message.

Answer: B,E

Tuesday 3 January 2017

350-018 Sample Question

Question No : 18

Which VTP mode allows the Cisco Catalyst switch administrator to make changes to the VLAN configuration that only affect the local switch and are not propagated to other switches in the VTP domain?

A. transparent
B. server
C. client
D. local
E. pass-through

Answer: A

Monday 19 December 2016

350-018 Sample Question

Question No : 17

Which two statements about MPP (Management Plane Protection) are true? (Choose two.)

A. Only out-of-band management interfaces are supported
B. Only virtual interfaces associated with physical interfaces are supported
C. Only virtual interfaces associated with sub-interfaces are supported
D. It is supported on both distributed and hardware-switched platforms
E. Only in-band management interfaces are supported
F. It is supported on both active and standby management interfaces.

Answer: B,E

Wednesday 27 July 2016

350-018 Sample Question

Question No : 16

When you are configuring QoS on the Cisco ASA appliance, which four are valid traffic selection criteria? (Choose four.)

A. VPN group
B. tunnel group
C. IP precedence
D. DSCP
E. default-inspection-traffic
F. qos-group

Answer : B,C,D,E

Tuesday 12 July 2016

350-018 Sample Question

Question No : 15

Which two statements about the AES algorithm are true? (Choose two)

A. The AES algorithm is an asymmetric block cipher.
B. The AES algorithm operates on a 128-bits block.
C. The AES algorithm uses a fixed length-key of 128 bits.
D. The AES algorithm does not give any advantage over 3DES due to the same key length.
E. The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption.

Answer : B,E