350-018 Exams Q&A
350-018 Exams Q&A
350-018 Exams Q&A
Written Exam
Pass Cisco 210-260 CCIE Security exam
with 100% Guarantee
100% REAL EXAM QUESTIONS ANSWERS
Get All PDF with Complete Questions Answers File from
http://www.examsleader.com/350-018-exam.html
100% Exam Passing Guarantee & Money Back Assurance
SAMPLE QUESTIONS
QUESTION: 1
Which three statements are true? (Choose three.)
Question: 2
Which two statements about an authoritative server in a DNS system are true?
(Choose two.)
A. It indicates that it is authoritative for a name by setting the AA bit in responses.
B. It has a direct connection to one of the root name servers.
Question: 3
How does a DHCP client request its previously used IP address in a DHCP
DISCOVER packet?
A.
B.
C.
D.
E.
Answer: B
Question: 4
Which two statements are true when comparing ESMTP and SMTP? (Choose two.)
A. Only SMTP inspection is provided on the Cisco ASA firewall.
B. A mail sender identifies itself as only able to support SMTP by issuing an EHLO
command to the mail server.
C. ESMTP mail servers will respond to an EHLO with a list of the additional extensions they
support.
D. SMTP commands must be in upper case, whereas ESMTP can be either lower or upper
case.
E. ESMTP servers can identify the maximum email size they can receive by using the SIZE
command.
Answer: C, E
Question: 5
Which three statements are true about the SSH protocol? (Choose three.)
A. SSH protocol runs over TCP port 23.
B. SSH protocol provides for secure remote login and other secure network services
over an insecure network.
C. Telnet is more secure than SSH for remote terminal access.
D. SSH protocol runs over UDP port 22.
E. SSH transport protocol provides for authentication, key exchange, confidentiality,
and integrity.
F. SSH authentication protocol supports public key, password, host based, or none
as authentication methods.
Answer: B, E, F
Question: 6
Which four options are valid EAP mechanisms to be used with WPA2? (Choose
four.)
A.
B.
C.
D.
E.
F.
G.
PEAP
EAP-TLS
EAP-FAST
EAP-TTLS
EAPOL
EAP-RADIUS
EAP-MD5
Answer: A, B, C, D
Question: 7
IPsec SAs can be applied as a security mechanism for which three options?
(Choose three.)
A.
B.
C.
D.
E.
F.
Send
Mobile IPv6
site-to-site virtual interfaces
OSPFv3
CAPWAP
LWAPP
Answer: B, C, D
Question: 8
Which SSL protocol takes an application message to be transmitted, fragments
the data into manageable blocks, optionally compresses the data, applies a MAC,
encrypts, adds a header, and transmits the resulting unit in a TCP segment?
A.
B.
C.
D.
Answer: C
Question: 9
Which three statements are true about MACsec? (Choose three.)
A.
B.
C.
D.
E.
F.
Answer: B, C, E
Question: 10
DNSSEC was designed to overcome which security limitation of DNS?
http://www.examsleader.com/350018-exam.html