QUESTION 351
Which statement about SMTP is true?
A. |
SMTP uses UDP port 25. |
B. |
The POP protocol is used by the SMTP client to manage stored mail. |
C. |
The IMAP protocol is used by the SMTP client to retrieve and manage stored email. |
D. |
The mail delivery agent in the SMTP architecture is responsible for DNS lookup. |
E. |
SMTP uses TCP port 20. |
Correct Answer: C
QUESTION 352
Which two statements about DHCP are true? (Choose two.)
A. |
DHCP uses TCP port 67. |
B. |
DHCP uses UDP ports 67 and 68. |
C. |
The DHCPDiscover packet has a multicast address of 239.1.1.1. |
D. |
DHCPRequest is a broadcast message. |
E. |
The DHCPOffer packet is sent from the DHCP server. |
Correct Answer: BE
QUESTION 353
Which two statements about SNMP are true? (Choose two)
A. |
SNMP operates at Layer-6 of the OSI model. |
B. |
NMS sends a request to the agent at TCP port 161. |
C. |
NMS sends request to the agent from any source port. |
D. |
NMS receives notifications from the agent on UDP 162. |
E. |
MIB is a hierarchical representation of management data on NMS. |
Correct Answer: CD
QUESTION 354
Which two statement about the DNS are true? (Choose two.)
A. |
The client-server architecture is based on query and response messages. |
B. |
Query and response messages have different format. |
C. |
In the DNS message header, the QR flag set to 1 indicates a query. |
D. |
In the DNS header, an Opcode value of 2 represents a client status request. |
E. |
In the DNS header, the Rcode value is set to 0 in Query message. |
Correct Answer: AD
QUESTION 355
Which is an example of a network reconnaissance attack?
A. |
botnets |
B. |
backdoor |
C. |
ICMP sweep |
D. |
firewalk |
E. |
inverse mapping |
Correct Answer: C
QUESTION 356
Which ICMP message could be used with traceroute to map network topology?
A. |
Echo Reply |
B. |
Redirect |
C. |
Time Exceeded |
D. |
Echo font> |
E. |
Router Selection |
F. |
Address Mask Request |
Correct Answer: C
QUESTION 357
Which statement about the Firewalk attack is true?
A. |
The firewall attack is used to discover hosts behind firewall device. |
B. |
The firewall attack uses ICMP sweep to find expected hosts behind the firewall. |
C. |
The firewall attack uses traceroute with a predetermined TTL value to discover hosts behind the firewall. |
D. |
The firewall attack is used to find the vulnerability in the Cisco IOS firewall code. |
E. |
The firewall attack uses an ICMP echo message to discover firewall misconfiguration. |
Correct Answer: C
QUESTION 358
Which pair of ICMP messages is used in an inverse mapping attack?
A. |
Echo-Echo Request |
B. |
Route Solicitation- Time Exceeded |
C. |
Echo-Time Exceeded |
D. |
Echo Reply-Host Unreachable |
E. |
Echo-Host Unreachable |
Correct Answer: D
QUESTION 359
Which statement about a botnet attack is true?
A. |
The botnet attack is an attack on a firewall to disable it’s filtering ability. |
B. |
The botnet attack is a network sweeping attack to find hosts that are alive alive behind the filtering device. |
C. |
The botnet attack is a collection of infected computers that launch automated attacks. |
D. |
The owner of the infected computer willingly participates in automated attacks. |
E. |
The botnet attack enhances the efficiency of the computer for effective automated attacks. |
Correct Answer: C
QUESTION 360
Which two statements about IPS signatures are true? (Choose two.)
A. |
All of the built-in signatures are enabled by default. |
B. |
Tuned signatures are built-in signatures whose parameters are adjusted. |
C. |
Once the signature is removed from the sensing engine it cannot be restored |
D. |
It is recommended not to retire a signature that is not being used because then it cannot be restored. |
E. |
It is possible to define custom signatures. |
Correct Answer: BE
Free VCE & PDF File for Cisco 350-018 Practice Tests
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …