QUESTION 331
Which two statements about NHRP are true? (Choose two.)
A. |
NHRP is used for broadcast multi-access networks. |
B. |
NHRP allows NHC to dynamically learn the mapping of VPN IP to NBMA IP. |
C. |
NHRP allows NHS to dynamically learn the mapping of VPN IP to BMA IP. |
D. |
NHC registers with NHS. |
E. |
Traffic between two NHCs always flows through the NHS. |
F. |
NHRP provides Layer-2 to Layer-3 address mapping. |
Correct Answer: BD
QUESTION 332
Which two statements about the AES algorithm are true? (Choose two)
A. |
The AES algorithm is an asymmetric block cipher. |
B. |
The AES algorithm operates on a 128-bits block. |
C. |
The AES algorithm uses a fixed length-key of 128 bits. |
D. |
The AES algorithm does not give any advantage over 3DES due to the same key length. |
E. |
The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption. |
Correct Answer: BE
QUESTION 333
Refer to the exhibit. Which two statements correctly describe the debug output that is shown in the exhibit? (Choose two.)
A. |
The request is from NHS to NNC. |
B. |
The request is from NHC to NHS. |
C. |
69.1.1.2 is the local non-routable address. |
D. |
192.168.10.2 is the remote NBMA address. |
E. |
192.168.10.1 is the local VPN address. |
F. |
This debug output represents a failed NHRP request. |
Correct Answer: BE
QUESTION 334
Which two statements about the RC4 algorithm are true? (Choose two.)
A. |
The RC4 algorithm is an asymmetric key algorithm. |
B. |
The RC4 algorithm is a symmetric key algorithm. |
C. |
The RC4 algorithm is slower in computation than DES. |
D. |
The RC4 algorithm is used with wireless encryption protocols. |
E. |
The RC4 algorithm uses fixed-length keys. |
Correct Answer: BD
QUESTION 335
Which two statements about the MD5 Hash are true? (Choose two.)
A. |
Length of the hash value varies with the length of the message that is being hashed. |
B. |
Every unique message has a unique hash value. |
C. |
Its mathematically possible to find a pair of message that yield the same hash value. |
D. |
MD5 always yields a different value for the same message if repeatedly hashed. |
E. |
The hash value cannot be used to discover the message. |
Correct Answer: BE
QUESTION 336
Which two statements about the SHA-1 algorithm are true? (Choose two)
A. |
The SHA-1 algorithm is considered secure because it always produces a unique hash for the same message. |
B. |
The SHA-1 algorithm takes input message of any length and produces 160-bit hash output. |
C. |
The SHA-1 algorithm is considered secure because it is possible to find a message from its hash. |
D. |
The purpose of the SHA-1 algorithm is to provide data confidentiality. |
E. |
The purpose of the SHA-1 algorithm is to provide data authenticity. |
Correct Answer: BE
QUESTION 337
Which two statements about the DES algorithm are true? (Choose two)
A. |
The DES algorithm is based on asymmetric cryptography. |
B. |
The DES algorithm is a stream cipher. |
C. |
The DES algorithm is based on symmetric cryptography. |
D. |
The DES algorithm encrypts a block of 128 bits. |
E. |
The DES algorithm uses a 56-bit key. |
Correct Answer: CE
QUESTION 338
Which statement about the 3DES algorithm is true?
A. |
The 3DES algorithm uses the same key for encryption and decryption, |
B. |
The 3DES algorithm uses a public-private key pair with a public key for encryption and a private key for decryption. |
C. |
The 3DES algorithm is a block cipher. |
D. |
The 3DES algorithm uses a key length of 112 bits. |
E. |
The 3DES algorithm is faster than DES due to the shorter key length. |
Correct Answer: C
QUESTION 339
Which two
statements about the DH group are true? (Choose two.)
A. |
The DH group is used to provide data authentication. |
B. |
The DH group is negotiated in IPsec phase-1. |
C. |
The DH group is used to provide data confidentiality. |
D. |
The DH group is used to establish a shared key over an unsecured medium. |
E. |
The DH group is negotiated in IPsec phase-2. |
Correct Answer: BD
QUESTION 340
Which statement describes the computed authentication data in the AH protocol?
A. |
The computed authentication data is never sent across. |
B. |
The computed authentication data is part of a new IP header. |
C. |
The computed authentication data is part of the AH header. |
D. |
The computed authentication data is part of the original IP header. |
Correct Answer: C
Free VCE & PDF File for Cisco 350-018 Real Exam
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …
100-105 Dumps VCE PDF
200-105 Dumps VCE PDF
300-101 Dumps VCE PDF
300-115 Dumps VCE PDF
300-135 Dumps VCE PDF
300-320 Dumps VCE PDF
400-101 Dumps VCE PDF
640-911 Dumps VCE PDF
640-916 Dumps VCE PDF
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF
220-901 Dumps VCE PDF
220-902 Dumps VCE PDF
N10-006 Dumps VCE PDF
SY0-401 Dumps VCE PDF