[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 491-500

EnsurepassQUESTION 491 At the end of the Cisco TrustSec authentication process, which three pieces of information do both authenticator and supplicant know? (Choose three.)   A. Peer device ID B. Peer Cisco TrustSec capability information C. SAP key D. Server device ID E. Service ID F. Server peers information   Correct Answer: ABC     QUESTION 492 You are preparing Control Plane Protection configurations for implementation on the router, which has the EBGP Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 481-490

EnsurepassQUESTION 481 Which two items are required for LDAP authenticated bind operations? (Choose two.)   A. Root DN B. Password C. Username D. SSO E. UID   Correct Answer: AB     QUESTION 482 Which of the following two options can you configure to avoid iBGP full mesh? (Choose two.)   A. Route reflectors B. Confederations C. BGP NHT D. Local preference E. Virtual peering   Correct Answer: AB     QUESTION 483 Which three Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 471-480

EnsurepassQUESTION 471 Which two statements apply to the method that ASA uses for tunnel-group lookup for LAN-to-LAN IPSec connections when using PSK-based authentication? (Choose two.)   A. If the configuration does not contain the tunnel-group with the IKE ID or peer IP address DefaultRAGroup, DefaultL2LGroup is used instead. B. DefaultL2LGroup is used only if the PSK check in DefaultRAGroup fails. C. DefaultRAGroup is used only if the PSK check in DefaultL2LGroup fails. D. You Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 451-460

EnsurepassQUESTION 451 Which three addresses are special use as defined in RFC 5735? (Choose three.)   A. 171.10.0.0/24 B. 0.0.0.0/8 C. 203.0.113.0/24 D. 192.80.90.0/24 E. 172.16.0.0/12 F. 198.50.100.0/24   Correct Answer: BCE     QUESTION 452 Which statement about Sarbanes-Oxley (SOX) is true?   A. SOX is an IEFT compliance procedure for computer systems security. B. SOX is a US law. C. SOX is an IEEE compliance procedure for IT management Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 441-450

EnsurepassQUESTION 441 Which three statements about Dynamic ARP Inspection on Cisco Switches are true? (Choose three.)   A. Dynamic ARP inspection checks ARP packets on both trusted and untrusted ports. B. Dynamic ARP inspection is only supported on access ports. C. Dynamic ARP inspection checks ARP packets against the trusted database. D. The trusted database can be manually configured using the CLI. E. Dynamic ARP inspection does not perform ingress security checking. F. Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 461-470

EnsurepassQUESTION 461 On Cisco routers, there are two mutually exclusive types of RSA key pairs: special-usage keys and general-purpose keys. When you generate RSA key pairs, you are prompted to select either special-usage keys or general-purpose keys. Which set of statements is true?   A. If you generate special-usage keys, two pairs of RSA keys are generated. One pair is used with any IKE policy that specifies RSA signatures as the authentication method. The other pair is used with any Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 401-410

EnsurepassQUESTION 401 Which two statements about PCI DSS are true? (Choose two.)   A. PCI DSS is a US government standard that defines ISP security compliance. B. PCI DSS is a proprietary security standard that defines a framework for credit, debit, and ATM cardholder information. C. PCI DSS is a criminal act of cardholder information fraud. D. One of the PCI DSS objectives is to restrict physical access to credit, debit, and ATM cardholder information. E. PCI DSS is an IETF Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 411-420

EnsurepassQUESTION 411 DRAG DROP   Correct Answer:     QUESTION 412 DRAG DROP   Correct Answer:           QUESTION 413 DRAG DROP   Correct Answer:     QUESTION 414 DRAG DROP   Correct Answer:                   QUESTION 415 Which two options describe the main purpose of EIGRP authentication? (Choose two.)   A. To identify authorized peers. B. To allow faster convergence Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 421-430

EnsurepassQUESTION 421 Which statement about layer-2 VLAN is true?   A. VLAN cannot be routed. B. VLANs 1006 through 4094 are not propagated by VTP version 3. C. VLAN1 is a Cisco default VLAN that can be deleted. D. The extended-range VLANs cannot be configured in global configuration mode.   Correct Answer: A     QUESTION 422 Which two statements abou t the OSPF authentication configuration are true? (Choose two.)   A. OSPF authentication is required in Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 431-440

EnsurepassQUESTION 431 Which option is an example of network reconnaissance attack?   A. botnets B. ping of death C. SYN flooding D. inverse mapping   Correct Answer: D     QUESTION 432 Which statement about Cisco IPS signatures is true?   A. All of the built-in signatures are enabled by default. B. Tuned signatures are built-in signatures whose parameters cannot be adjusted. C. Once the signature is removed from the sensing engine it cannot be restored. Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 381-390

EnsurepassQUESTION 381 Refer to the exhibit. If SW4 is sending superior BPDUs, where should the root guard feature be configured to preserve SW3 as a root bridge?     A. SW4 Gi0/0 interface. B. Sw3 Gi0/0 interface. C. Sw2 Gi0/1 interface. D. SW2 Gi0/1 and SW3 Gi0/1   Correct Answer: C     QUESTION 382 Refer to the exhibit. What is the reason for the failure of the DMVPN session between R1 and R2?     A. tunnel mode mismatch B. IPsec phase-1 Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 391-400

EnsurepassQUESTION 391 Which two statements about SOX are true? (Choose two.)   A. SOX is an IEFT compliance procedure for computer systems security. B. SOX is a US law. C. SOX is an IEEE compliance procedure for IT management to produce audit reports. D. SOX is a private organization that provides best practices for financial institution computer systems. E. Section 404 of SOX is related to IT compliance.   Correct Answer: BE     QUESTION 392 Refer to the exhibit. Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 371-380

EnsurepassQUESTION 371 Which two statements about ASA transparent mode are true? (Choose two.)   A. Transparent mose acts as a Layer-3 firewall. B. The inside and outside interface must be in a different subnet. C. IP traffic will not pass unless it is permitted by an access-list. D. ARP traffic is dropped unless it is permitted. E. A configured route applies only to the traffic that is originated by the ASA. F. In multiple context mode, all contexts need to be in transparent Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 361-370

EnsurepassQUESTION 361 When is the supplicant considered to be clientless?   A. when the authentication server does not have credentials to authenticate. B. when the authenticator is missing the dot1x guest VLAN under the port with which the supplicant is connected. C. when the supplicant fails EAP-MD5 challenge with the authentication server. D. when the supplicant fails to respond to EAPOL messages from the authenticator. E. when the authenticator is missing the reauthentication Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 351-360

EnsurepassQUESTION 351 Which pair of ICMP messages is used in an inverse mapping attack?   A. Echo-Echo Request B. Route Solicitation- Time Exceeded C. Echo-Time Exceeded D. Echo Reply-Host Unreachable E. Echo-Host Unreachable   Correct Answer: D     QUESTION 352 Which statement about a botnet attack is true?   A. The botnet attack is an attack on a firewall to disable it's filtering ability. B. The botnet attack is a network sweeping attack to find Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 341-350

EnsurepassQUESTION 341 Which statement about the AH is true?   A. AH authenticates only the data. B. AH authenticates only the IP header. C. AH authenticates only the TCP-UDP header. D. AH authenticates the entire packet and any mutable fields. E. AH authenticates the entire packet except for any mutable fields.   Correct Answer: E     QUESTION 342 Which three fields are part of the AH header? (Choose three.)   A. Source Address B. Destination Address Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 331-340

EnsurepassQUESTION 331 Which two statements about NHRP are true? (Choose two.)   A. NHRP is used for broadcast multi-access networks. B. NHRP allows NHC to dynamically learn the mapping of VPN IP to NBMA IP. C. NHRP allows NHS to dynamically learn the mapping of VPN IP to BMA IP. D. NHC registers with NHS. E. Traffic between two NHCs always flows through the NHS. F. NHRP provides Layer-2 to Layer-3 address mapping.   Correct Answer: BD     QUESTION 332 Which Read more [...]

[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 321-330

EnsurepassQUESTION 321 Refer to the exhibit. Which option describes the behavior of this configuration?     A. Host 10.10.10.1 will get translated as 20.20.20.1 from inside to outside. B. Host 20.20.20.1 will be translated as 10.10.10.1 from outside to inside. C. Host 20.20.20.1 will be translated as 10.10.10.1 from inside to outside. D. Host 10.10.10.1 will be translated as 20.20.20.1 from outside to inside.   Correct Answer: A     QUESTION 322 Which ICMP Read more [...]