Download New Updated (Spring 2015) Cisco 351-018 Actual Tests 181-190

By | April 26, 2015

Ensurepass

 

QUESTION 181

Which three statements are true about Cryptographically Generated Addresses for IPv6? (Choose three.)

 

A.      They prevent spoofing and stealing of existing IPv6 addresses.

B.      They are derived by generating a random 128-bit IPv6 address based on the public key of the node.

C.      They are used for securing neighbor discovery using SeND.

D.      SHA or MD5 is used during their computation.

E.       The minimum RSA key length is 512 bits.

F.       The SHA-1 hash function is used during their computation.

 

Correct Answer: ACF

 

 

QUESTION 182

Which three options are extension headers that are implemented in IPv6? (Choose three.)

 

A.      Routing Header.

B.      Generic Tunnel Header.

C.      Quality of Service Header.

D.      Fragment Header.

E.       Encapsulating Security Payload Header.

F.       Path MTU Discovery Header.

 

Correct Answer: ADE

 

 

QUESTION 183

What is a key characteristic of MSTP?

 

A.      always uses a separate STP instance per VLAN to increase efficiency

B.      only supports a single STP instance for all VLANs

C.      is a Cisco proprietary standard

D.      several VLANs can be mapped to the same spanning-tree instance

 

Correct Answer: D

 

 

QUESTION 184

Which spanning-tree mode supports a separate spanning-tree instance for each VLAN and also supports the 802.1w standard that has a faster convergence than 802.1D?

 

A.      PVST+

B.      PVRST+

C.      PVST

D.      CST

E.       MST

F.       RST

 

Correct Answer: B

 

 

QUESTION 185

Which three LSA types are used by OSPFv3? (Choose three.)

 

A.      Link LSA

B.      Intra-Area Prefix LSA

C.      Interarea-prefix LSA for ASBRs

D.      Autonomous system external LSA

E.       Internetwork LSA

 

Correct Answer: ABD

 

 

QUESTION 186

Which protocol provides the same functions in IPv6 that IGMP provides in IPv4 networks?

 

A.      ICMPv6

B.      ND

C.      MLD

D.      TLA

 

Correct Answer: C

 

 

QUESTION 187

After a client discovers a supportable wireless network, what is the correct sequence of operations that the client will take to join it?

 

A.      association, then authentication

B.      authentication, then association

C.      probe request, then association

D.      authentication, then authorization

 

Correct Answer: B

 

 

QUESTION 188

Which authentication scheme, that is supported on the Cisco ASA, generates a unique key that is used in a single password challenge?

 

A.      one-time passwords

B.      disposable certificates

C.      password management

D.      Capcha web text

 

Correct Answer: A

 

 

QUESTION 189

Which label is advertised by an LSR to inform neighboring LSRs to perform the penultimate hop popping operation?

 

A.      0x00

B.      php

C.      swap

D.      push

E.       imp-null

 

Correct Answer: E

 

 

QUESTION 190

When the RSA algorithm is used for signing a message from Alice to Bob, which statement best describes that operation?

 

A.      Alice signs the message with her private key, and Bob verifies that signature with Alice’s public key.

B.      Alice signs the message with her public key, and Bob verifies that signature with Alice’s private key.

C.      Alice signs the message with Bob’s private key, and Bob verifies that signature with his public key.

D.      Alice signs the message with Bob’s public key, and Bob verifies that signature with his private

E.       Alice signs the message with her public key, and Bob verifies that signature with his private key.

F.       Alice signs the message with her private key, and Bob verifies that signature with his public key.

 

Correct Answer: A

 

Free VCE & PDF File for Cisco 351-018 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …