QUESTION 131
Which multicast routing mechanism is optimal to support many-to-many multicast applications?
A. |
PIM-SM |
B. |
MOSPF |
C. |
DVMRP |
D. |
BIDIR-PIM |
E. |
MSDP |
Correct Answer: D
QUESTION 132
Which three statements regarding VLANs are true? (Choose three.)
A. |
To create a new VLAN on a Cisco Catalyst switch, the VLAN name, VLAN ID and VLAN type must all be specifically configured by the administrator. |
B. |
A VLAN is a broadcast domain. |
C. |
Each VLAN must have an SVI configured on the Cisco Catalyst switch for it to be operational. |
D. |
The native VLAN is used for untagged traffic on an 802.1Q trunk. |
E. |
VLANs can be connected across wide-area networks. |
Correct Answer: BDE
QUESTION 133
Which technology, configured on the Cisco ASA, allows Active Directory authentication credentials to be applied automatically to web forms that require authentication for clientless SSL connections?
A. |
one-time passwords |
B. |
certificate authentication |
C. |
user credentials obtained during authentication |
D. |
Kerberos authentication |
Correct Answer: C
QUESTION 134
In what subnet does address 192.168.23.197/27 reside?
A. |
192.168.23.0 |
B. |
192.168.23.128 |
C. |
192.168.23.160 |
D. |
192.168.23.192 |
E. |
192.168.23.196 |
Correct Answer: D
QUESTION 135
Given the IPv4 address 10.10.100.16, which two addresses are valid IPv4-compatible IPv6 addresses? (Choose two.)
A. |
:::A:A:64:10 |
B. |
::10:10:100:16 |
C. |
0:0:0:0:0:10:10:100:16 |
D. |
0:0:10:10:100:16:0:0:0 |
Correct Answer: BC
QUESTION 136
What is the size of a point-to-point GRE header, and what is the protocol number at the IP layer?
A. |
8 bytes, and protocol number 74 |
B. |
4 bytes, and protocol number 47 |
C. |
2 bytes, and protocol number 71 |
D. |
24 bytes, and protocol number 1 |
E. |
8 bytes, and protocol number 47 |
Correct Answer: B
QUESTION 137
Refer to the exhibit. Which three fields of the IP header labeled can be used in a spoofing attack? (Choose one.)
A. |
6, 7, 11 |
B. |
6, 11, 12 |
C. |
3, 11, 12 |
D. |
4, 7, 11 |
Correct Answer: A
QUESTION 138
When implementing WLAN security, what are three benefits of using the TKIP instead of WEP? (Choose three.)
A. |
TKIP uses an advanced encryption scheme based on AES. |
B. |
TKIP provides authentication and integrity checking using CBC-MAC. |
C. |
TKIP provides per-packet keying and a rekeying mechanism. |
D. |
TKIP provides message integrity check. |
E. |
TKIP reduces WEP vulnerabilities by using a different hardware encryption chipset. |
F. |
TKIP uses a 48-bit initialization vector. |
Correct Answer: CDF
QUESTION 139
Which two statements about SHA are correct? (Choose two.)
A. |
Five 32-bit variables are applied to the message to produce the 160-bit hash. |
B. |
The message is split into 64-bit blocks for processing. |
C. |
The message is split into 512-bit blocks for processing. |
D. |
SHA-2 and MD5 both consist of four rounds of processing. |
Correct Answer: AC
QUESTION 140
Which three statements about IKEv2 are correct? (Choose three.)
A. |
INITIAL_CONTACT is used to synchronize state between peers. |
B. |
The IKEv2 standard defines a method for fragmenting large messages. |
C. |
The initial exchanges of IKEv2 consist of IKE_SA_INIT and IKE_AUTH. |
D. |
Rekeying IKE and child SAs is facilitated by the IKEv2 CREATE_CHILD_SA exchange. |
E. |
NAT-T is not supported. |
F. |
Attribute policy push (via the configuration payload) is only supported in REQUEST/REPLY mode. |
Correct Answer: ACD
Free VCE & PDF File for Cisco 350-018 Practice Tests
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …