Download New Updated (Spring 2015) Cisco 350-018 Actual Tests 351-360

Ensurepass

 

QUESTION 351

Which statement about SMTP is true?

 

A.

SMTP uses UDP port 25.

B.

The POP protocol is used by the SMTP client to manage stored mail.

C.

The IMAP protocol is used by the SMTP client to retrieve and manage stored email.

D.

The mail delivery agent in the SMTP architecture is responsible for DNS lookup.

E.

SMTP uses TCP port 20.

 

Correct Answer: C

 

 

QUESTION 352

Which two statements about DHCP are true? (Choose two.)

 

A.

DHCP uses TCP port 67.

B.

DHCP uses UDP ports 67 and 68.

C.

The DHCPDiscover packet has a multicast address of 239.1.1.1.

D.

DHCPRequest is a broadcast message.

E.

The DHCPOffer packet is sent from the DHCP server.

 

Correct Answer: BE

 

 

QUESTION 353

Which two statements about SNMP are true? (Choose two)

 

A.

SNMP operates at Layer-6 of the OSI model.

B.

NMS sends a request to the agent at TCP port 161.

C.

NMS sends request to the agent from any source port.

D.

NMS receives notifications from the agent on UDP 162.

E.

MIB is a hierarchical representation of management data on NMS.

 

Correct Answer: CD

 

 

QUESTION 354

Which two statement about the DNS are true? (Choose two.)

 

A.

The client-server architecture is based on query and response messages.

B.

Query and response messages have different format.

C.

In the DNS message header, the QR flag set to 1 indicates a query.

D.

In the DNS header, an Opcode value of 2 represents a client status request.

E.

In the DNS header, the Rcode value is set to 0 in Query message.

 

Correct Answer: AD

 

 

QUESTION 355

Which is an example of a network reconnaissance attack?

 

A.

botnets

B.

backdoor

C.

ICMP sweep

D.

firewalk

E.

inverse mapping

 

Correct Answer: C

 

 

QUESTION 356

Which ICMP message could be used with traceroute to map network topology?

 

A.

Echo Reply

B.

Redirect

C.

Time Exceeded

D.

Echo

E.

Router Selection

F.

Address Mask Request

 

Correct Answer: C

 

 

QUESTION 357

Which statement about the Firewalk attack is true?

 

A.

The firewall attack is used to discover hosts behind firewall device.

B.

The firewall attack uses ICMP sweep to find expected hosts behind the firewall.

C.

The firewall attack uses traceroute with a predetermined TTL value to discover hosts behind the firewall.

D.

The firewall attack is used to find the vulnerability in the Cisco IOS firewall code.

E.

The firewall attack uses an ICMP echo message to discover firewall misconfiguration.

 

Correct Answer: C

 

 

QUESTION 358

Which pair of ICMP messages is used in an inverse mapping attack?

 

A.

Echo-Echo Request

B.


Route Solicitation- Time Exceeded

C.

Echo-Time Exceeded

D.

Echo Reply-Host Unreachable

E.

Echo-Host Unreachable

 

Correct Answer: D

 

 

QUESTION 359

Which statement about a botnet attack is true?

 

A.

The botnet attack is an attack on a firewall to disable it’s filtering ability.

B.

The botnet attack is a network sweeping attack to find hosts that are alive alive behind the filtering device.

C.

The botnet attack is a collection of infected computers that launch automated attacks.

D.

The owner of the infected computer willingly participates in automated attacks.

E.

The botnet attack enhances the efficiency of the computer for effective automated attacks.

 

Correct Answer: C

 

 

QUESTION 360

Which two statements about IPS signatures are true? (Choose two.)

 

A.

All of the built-in signatures are enabled by default.

B.

Tuned signatures are built-in signatures whose parameters are adjusted.

C.

Once the signature is removed from the sensing engine it cannot be restored

D.

It is recommended not to retire a signature that is not being used because then it cannot be restored.

E.

It is possible to define custom signatures.

 

Correct Answer: BE

 

Free VCE & PDF File for Cisco 350-018 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …