Tuesday, 12 July 2016

350-018 Sample Question

Question No : 15

Which two statements about the AES algorithm are true? (Choose two)

A. The AES algorithm is an asymmetric block cipher.
B. The AES algorithm operates on a 128-bits block.
C. The AES algorithm uses a fixed length-key of 128 bits.
D. The AES algorithm does not give any advantage over 3DES due to the same key length.
E. The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption.

Answer : B,E

Friday, 17 June 2016

350-018 Sample Question

QUESTION NO : 14

Which should be the key driver for a company security policy's creation, implementation and enforcement?

A. the business knowledge of the IT staff
B. the technical knowledge of the IT staff
C. the company's business objectives.
D. the company's network topology
E. the IT future directions.

Answer: C

Friday, 20 May 2016

350-018 Sample Question

QUESTION NO : 13

Which three parameters does the HTTP inspection engine use to inspect the traffic on Cisco IOS firewall? (Choose three)

A. source address
B. application
C. transfer encoding type
D. request method
E. minimum header length
F. destination address

Answer: B,C,D

Thursday, 5 May 2016

350-018 Sample Question

QUESTION: 21

Which statement about VLAN is true?

A. VLAN cannot be routed.
B. VLANs 1006 through 4094 are not propagated by VTP.
C. VLAN1 is a Cisco default VLAN that can be deleted.
D. The extended-range VLANs cannot be configured in global configuration mode.

Answer: B

Friday, 8 April 2016

350-018 Sample Question

QUESTION 20

Which MAC address control command enables usage monitoring for a CAM table on a switch?

A. mac-address-table synchronize
B. mac-address-table limit
C. mac-address-table secure
D. mac-address-table notification threshold
E. mac-address-table learning

Correct Answer: D

Friday, 4 March 2016

350-018 Sample Question

QUESTION 19

Refer to the exhibit.
Against which type of attack does the given configuration protect?

A. pharming
B. a botnet attack
C. phishing
D. DNS hijacking
E. DNS cache poisoning

Correct Answer: B

Thursday, 3 March 2016

350-018 Sample Question

Question: 18


Refer to the exhibit. Which three descriptions of the configuration are true? (Choose three)

A. The tunnel encapsulates multicast traffic.
B. The tunnel provides data confidentiality.
C. This tunnel is a point-to-point GRE tunnel.
D. The configuration is on the NHS.
E. The tunnel is not providing peer authentication.
F. The tunnel IP address represents the NBMA address.
G. The configuration is on the NHC.

Correct Answer: ABD