Ccie Sec Written Jan 20 - Full Pool
Ccie Sec Written Jan 20 - Full Pool
Ccie Sec Written Jan 20 - Full Pool
www.PASSWRITTEN.com
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1) What are the two enhancements in WCCP V2.0 over WCCP V1.0? (Choose two)
A. Support for HTTP redirection
B. Multicast support
C. Authentication support
D. IPv6 support
E. Encryption support
Answer:B,C
Answer:D
3) Which three items does TLS rely on to prove identity .(Choose three)
A. Certificates
B. Password
C. Username
D. Trustpoint
E. Private keys
F. Public keys
Answer:A,E,F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
4) Which two statements about the storm control implementation on the switch are true? (Choose two)
A. Traffic storm level is the percentage of total available bandwidth of the port
B. A lower storm control level means more traffic is allowed to pass through
C. Traffic storm control monitors the broadcast, multicast and unicast traffic
D. Traffic storm control monitors only the broadcast traffic
E. Traffic storm level is the rate at which Layer 2 traffic is received on the port
F. Traffic storm level is the rate at which Layer 3 traffic is received on the port
Answer:A C
5) What is the default duration of IPS anomaly detections learning accept mode?
A. 12 hours
B. 48 hours
C. 24 hours
D. 8 hours
Answer: C
6) Which two of the following pieces of the information are communicated by ASA inn version 8.4 or later when
the Stateful Failover is enabled? (Choosetwo)
A. DHCP server address leases
B. Dynamic routing tables
C. Power status
D. NAT translation table
E. User authentication
Answer:B,D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:B,D
Answer:A,C
9) Which three parameters does the HTTP inspection engine use to inspect the traffic on Cisco IOS Firewall?
A. Source address
B. Application
C. Transfer encoding type
D. Minimum header length
E. Request method
F. Destination address
Answer:B,C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
10) Which command sets the key length for the IPv6 SeND protocol?
A. Ipv6 nd inspection
B. Ipv6 nd ra-interval
C. Ipv6 nd prefix
D. Ipv6 nd secured
E. Ipv6 nd ns-interval
Answer :D
B) The backup include areas that are used for the data store
E) The backup timestamps the files with the date and time during copy operations.
Answer :D
Version V9
Destination 10.0.255.150
B) source loopback0
D) next-hop address
Answer :B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
13) What action can you to prevent an amplification attack on an IPv6 network?
C) disable the processing of IPv6 type 2 routing headers between remote routers
Answer :A
14)
Refer to the exhibit. Based on the show command output which statement is true?
Answer :B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
15) What IPS form factor is best suited to handling heavy traffic between virtualized servers in a data center?
A) FirePower appliance
C) Firepower NGIPSv
Answer :A
16) Drag each goal of PCI DSS on the left to the corresponding PCI DSS requirement on the right.
Answer :A:5,B:4,C:1,D:3,E:2,F:6
17) Which two cipher mechanisms does PCoIP use? (Choose two)
A) Blowfish
B) AES 256
C) Suite B
D) SEAL
E) autokey
F) RC4
Answer :B,C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
18) Which three EAP method require a server-side certificate? ( Choose three)
A) EAP-GTP
B) EAP-TLS
D) EAP-TTLS
E) EAP-FAST
Answer :B,C,D
A) TCP 389
B) UDP 389
C) TCP 639
D) UDP 639
E) IP protocol 87
F) IP protocol 90
Answer :C
20) you run the show ipv6 port-map telnet command and you see that the port 23 (system-defined) message and
the port 223 (User-defined) message are displayed which command is in the router configuration?
Answer :C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
21) which three statement are true about cryptographically Generated addresses for IPv6 ? (choose three)
E) They are derived by generating a random 128-bit IPv6 address based on the public key of the node
Answer :B,C,F
22) The ssl vpn implementation on a cisco ASA adaptive security appliance supports which three of these feature?
A) establishing a winsock 2 connection between the client and the server through smart tunnels
C) establishing a winsock 2 connection between the client and the server through port forwarding
Answer :A,D,E
23) Which ISMS provides the basis for an optional business certification logo program?
A) HIPAA
B) COBIT 5
C) ISO 27001
D) TOGAF
E) ISO 27002
F) NIST 800-53
Answer :C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C) The Copp SNMP feature can forward and manage traffic during heavy traffic load
Answer :C
25) You run the show ipv6 port-map telnet command and you see that the port 23(system-defined) message and the
port 223 (user-defined) message are displayed which command is in the router configuration?
Answer :C
26) which statement about the TACACS+ protocol are true?( Choose two)
A) The entire body of a TCACS+ packet is encrypted with the exception of the standard clear-text TACACS+ header
B) Because it uses UDP for transport TACACS+ can detect server crashes out-of-band
D) VSAs allow products from other vendors to interoperate with cisco routers that support TACACS+
Answer :A,D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B)snmp-server inform
Answer :A
28) What are two important guidelines to follow when implementing VTP? (choose two)
A) All switches in the VTP domain must run the same version of VTP
B) Enabling VTP pruning on a server will enable the feature for the entire management domain
D) Use of the VTP multidomain feature should be restricted to migration and temporary implementation
E) When using secure-mode VTP configure management domain password only on VTP servers
Answer :A,B
29) What are three features that are enabled by generating change of Authorization (CoA) requests in a push
model?(Choose three)
A) host termination
B) Mac identification
C) session identification.
D) session termination
E) host reauthentication
F) session reauthentication
Answer: C,D,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
30)
Refer to the exhibit. You have configured an NDAC seed switch as shown but the switch is failing to allow other
switch to securely join the domain what command must you add to the seed switchs configuration to enable secure
RADIUS communication?
C)seed-switch(config)#radius-server host 10.1.1.2 auth-port 1812 acct-port 1813 test username ndac-test pac key
cisco123
D)seed-switch(config)#aaapreauth
Answer :C
31) Which three parameters does the HTTP inspection engine use to inspect the traffic on Cisco IOS firewall?
A. Source address
B. Application
C. Transfer encoding type
D. Minimum header length
E. Request method
F. Destination address
Answer:B,C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
33) Which statement is true regarding Transparent mode configuration on Cisco ASA firewall running version 9.x?
A. Networks connected with the ASA data interfaces must be different subnet for the traffic to flow.
B. Bridge groups are not supported in Transparent Mode.
C. Default route defined on the ASA is only for the management traffic return path
D. You need to make management interface of the ASA as the next hop for the connected devices to establish
reachablity across the ASA.
E. Management Interface does not update the MAC address table.
Answer : C
34) Which two statement about ISO 27001 are true? Choose two.
A. It is closely aligned to ISO 22000 standard
B. it is an ISO 17799 code of practice.
C. It is an information security management systems specification.
D. It is a code of practice for informational social management
E. It was formerly known as BS7799-2
Answer:C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
35) Which 3 HTTP header fields can be classified by NBAR for request messages. Choose 3.
A. Referrer
B. Content-Encoding
C. User-Agent
D. From
E. Server
F. Location
Answer:A,C,D
Answer:C
Answer:C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
38) Which two statements about SSL VPN smart tunnels on a CISCO IOS service are True. Choose 2.
A. They are incompatible with split-tunneling
B. They do not support FTP
C. They are incompatible with MAPI proxy
D. They support private socket libraries
E. They can be started in more than one web browser at the same time
Answer: A,C
39) Depending on configuration which 2 behaviors can the ASA classifier exhibit when it receives unicast traffic on
an interface that is shared by multiple contexts. Choose 2.
A. It is classified using the destination address of the packat using the NAT table.
B. It is classified using the destination address of the packet using the connection table.
C. It is classified by coping and sending the packet to all the contexts.
D. It is classified using the destination address of the packet using the routing table.
E. It is classified using the destination MAC address of the packet.
Answer:A,E
40) Which statement is true regarding the packet flow on Cisco ASA firewall running version 8.2?
A. For the packet that has been received on the ingress interface, ACL is also checked if the connection entry
exists for the packet flow.
B. For the packet that has been received on the ingress interface ,translation route is checked before the ACL if
the connection entry for the packet flow does not exist
C. For the packet that has been received on the egress interface ,translation rule is checked before the ACL if
the connection entry does not exist for the packet flow
D. For the packet that has been received on the ingress interface, ACL is only checked if the connection entry
does not exist for the packet flow.
Answer:D
41) Which statement about the fragmentation of IPsec packets in routers is true?
A. By default if the packet size exceeds MTU or ingress physical interface ,it will be fragmented and send
without encrytion
B. By default if the packet size exceeds MTU of the egress physical interface, it will be dropped.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. By default the router knows the IPSEC overhead to add to the packet performs the lookup of the packet will
exceed egress physical interface IP MTU after encryption, then fragments the packet before encrypting and
separately encrypts the resulting IP fragements.
D. By default the IP packets that needs encryption are first encrypted with ESP, if the resulting encrypted
packets exceeds the IP MTU on the egress physical interface, then the encrypted packet is fragmented
before being send
Answer: D
42) Which MAC address control commands enable usage monitoring for a CAM table on a Switch?
A. MAC address-table synchronize
B. MAC address-table limit
C. MAC address-table secure
D. MAC address-table notification threshold
E. MAC address-table learning
Answer: D
43) Which three statements about SSH v1 and SSH v2 are true. Choose 3.
A. Both SSHv1 and SSHv2 support multiple session channels on a single connection.
B. Both SSHv1 and SSHv2 require a server key to protect the session key
C. Both SSHv1 and SSHv2 negotiate the bulk chipper
D. SSHv2 supports the wider variety of authentication methods than SSHv1
E. Unlike SSHv1, SSHv2 uses separate protocols for authentication connection and transport
F. Unlike SSHv1, SSHv2 supports multiple forms of user authentication in a single session
Answer:C,E,F
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:D
46) In traceroute, which ICMP message indicates that the packet is dropped by a router in the path.
A. Type 11 code 0
B. Type 11 code 1
C. Type 3 code 1
D. Type 3 code 3
E. Type 5 code 1
Answer: A
47) Which of the following statement is true about ARP spoofing attack?
A. Attacker sents ARP request with the MAC address and the IP address of a legitimate resource in the network
B. ARP spoofing doesnot facilitate man in the middle attack for the attacker
C. Attacker sents the ARP request with its own MAC address and IP address of a legitimate resource in the
network
D. Attacket sents APR request with the MAC address and the IP address of its own
Answer:C
48) Attacks can originate from the multicast receivers. Any receivers that sends an IGMP or MLD report typically
caters state on which router?
A. Customer
B. First-HOP
C. Source
D. RP
Answer:B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
49) Which 2 values you must configure on the CISCO ASA firewall to support FQDN Acl ? Choose 2.
A. A DNS server
B. An FQDN object
C. A policy map
D. A class map
E. A service object
F. A service polcy
Answer:A,B
50) Which two parameters can the hostscan feature scan before users log in? (Choose two)
Answer : A,E
51)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Which line in the given configuration contains a locally significant value ?
Answer :D
52) What are four technologies that can be used to trace the source of an attack in a network environment with
multiple exit/entry points? (choose four)
Answer :B,C,E,F
53)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Referring to the DMVPN topology diagram shown in the exhibit, which two statements are correct? (choose two)
A) Before a spoke-to-spoke tunnel can be build, the spoke router needs to send an NHRP query to the hub
to resolve the remote spoke router physical interface IP address.
B) The spoke router act as the NHRP serves for resolving the remote spoke physical interface IP address.
C) At the spoke A router, the next hop to reach the 192.168.0.0/24 network should be 172.17.0.1.
D) The hub router tunnel interface must have the EIGRP next hop self-enabled.
E) The hub router needs to have EIGRP split horizon disabled.
F) At the Spoke A router ,the next hop to reach the 192.168.2.0/24 network should be 10.0.0.1.
Answer :E,F
54) Which four cisco IOS feature are used to implement Frist hop security in IPv6? (choose four)
A) SeND
B) IPv6 Selective Packet Discard
C) IPv6 First-Hop Security Binding Table
D) IPv6 Device Tracking
E) IPv6 Source Guard
F) IPv6 RA Guard
Answer :A,C,D,F
55) Which two statement about IPv6 Neighbor Solicitation Messages are true? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) They are identified by Type value 133 in the ICMP packet header.
B) They are identified by Type value 134 in the ICMP packet header.
C) They elicit a neighbor advertisement message from the destination device.
D) They include the link-layer address of the source device.
E) They are sent to the link-layer address of the destination node.
F) They are sent at a regular interval through the interfaces on a IPv6 device.
Answer :C,D
56) When you enable the same-security-traffic-permit inter-interface command on the ASA, which two statement
about the configuration are true?(Choose two)
A) Traffic can flow between interface at the same security level without an access list
B) by default the outside interface on every ASA is the on every interface to be configured with a name and security
level of 100.
Answer :A,D
57) Which two option are operating mode of security group Tag (SGT) Exchange protocol (SXP) peers? (Choose two)
A) neighbor
B) broadcast
C) transmitter
D) listener
E) speaker
Answer :D,E
58) Which two statement about fast SSID changing on a WLC are true? (choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C) It enables a clients to move to a new SSID before its previous entry I the controller connection table is cleared.
E) If it is disabled while clients are connected to the controller the clients loses communication with othe hosts in the
same VLAN
F) If it is disabled while clients are connected to the controller the clients loses communication with hosts in other
VLANs.
Answer :AC
59) Which two statement about MPP (Management plane protection) are true? (Choose two)
Answer :D,F
60) Which two statement about port security are true? (Choose two)
B)When a violation occure on a port in switchport port-security violation restrict mode,theswitchport will be taken
out of service and placed in the err-disabled state
D)When a violation occurs on a port in switchport port security violation restrict mode data is restricted and the
switch writes the violation to a log file
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
F) When a violation occurs on a port in switch port-security violation shutdown mode the switchport will be taken
out of service and placed in the err-disabled state.
Answer :D,F
61) Drag each step in the IPS anomaly detection configuration process on the left into the correct order of orations
on the right
Answer :
Step2 = Run the sensor in learning accept mode for 24 hours or more to set a baseline
Step4 = Apply the anomaly detection policy to one or more virtual sensors
62) Drag each step in the flow of packet on a DMVPN network using GD OI on the left into the correct sequence on
the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
1: The hub and spoke that are members of the group register with the GDOI key server.
2. Each group member receives the group key from the GDOI key server.
3. An encrypted DMVPN tunnel is established between the hub and spoke using NHRP.
5. a spoke encrypts traffic with the group key and sends it directly to other spokes.
63) What IPS risk rating allows the user to assign a risk weighting based on the relative importance of the system
involved?
Answer :B
64) Which three statement correctly describe the purpose and oration of IPv6 and RA messages? (Choose three)
A)RS and RA packets are used by the duplicate address detection function of ipv6
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B)Ipv6 hosts learn connected router information from RA message Which may be sent in response to an RS message
C)Ipv6 RA message can help host devices perform stateful or stateless address autoconfiguration; RS message are
sent by host to determine the address of routers
F)RS and RA packet are used for IPv6 nodes to perform address resolution that similar to ARP in IPv4
Answer :B,C,D
65) which protocol is an extension to SSH 2.0 that provides security for data traffic?
A) TKIP
B)SFTP
C)Kerberos
D)AES
Answer :B
66) Which statement regarding the routing functions of the cisco ASA is true?
A) The translation table can override the routing table for new connections
B) in a failover pair of ASAs the standby firewall establish a peer relationship with OSPF neighbours
Answer :A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) Discovery probe
B)Home agent
C)biding node
D) correspondent node
E) mobile node
Answer :B,D,E
68) Which four statements about SeND for IPv6 are correct? (Choose four.)
C) NDP exchanges are protected by IPsec SAs and provide for anti-reply.
E) Neighbour identity protection is provided by Cryptographically Generated Addresses that are derived from a
Diffie-Hellman key exchange.
G) It is facilitated by the certification Path request and certification path response ND message.
Answer :A,B,D,F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :D
70)
Refer to the exhibit. Which statement about the effect of this command is true?
A) It lists the number of packets processed for unknown and unclassified flows.
Answer :E
71) What is an RFC 2827 recommendation for protecting your network against DoS attacks with IP address spoofing
?
A) Use ingress traffic filtering to limit traffic from a downstream network to known advertised prefixes.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C)Browser-based applications should be filtered on the source to protect your networkfrom known advertised
prefixes.
Answer :A
72) Which three nonproprietary EAP methods do not require the use of a client-side certificate for mutual
authentication? (Choose three)
A) EAP-TTLS
B) EAP-TLS
C) LEAP
D) EAP-FAST
E) PEAP
Answer :A,D,E
73)Which three statements about remotely triggered black hole filtering are true? (Choose three.)
A)It uses BGP or OSPF to trigger a network-wide remotely controlled response to attack
B)ICMP unreachable message must not be disable on all edge PE router peered with the trigger router
D) Three key components of an RTBH filtering solution are: uRPF, iBGP and a null0 interface
Answer :B,D,E
74) Which three statement are true regarding the eigrp update message?(Choose three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B)Update always include all routes know by the router with update send in the reply message
Answer :C,D,E
75)Which two option are Cisco-recommend best practices for provisioning QoS for Scavenger-class traffic?(Choose
two)
Answer :B,F
Answer :C,D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
77) Which two IP multicast addresses belong to the group represented by the mac address0x01-005E-15-6A-2c?
(choose two)
A)224.21.106.44
B)224.25.106.44
C)233.149.106.44
D)239.153.106.44
E)236.25.106.44
Answer :A,C
77)Using Cisco IOS,Which two object-group option will permit network10.1.1.0/24 and 10.1.2.0/24 to host
192.168.5.1 port 80 and 443?(Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :A,C
78) Drag and drop the web attack types from the left to the corresponding description of the attack on the right.?
Answer :A:2,B:1,D:5,C:3,E:4
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
79) Which two of these are thing on attacker can do with an encrypted RC4 data stream? (Choose two)
A) filter out the keystream if the attacker gets two stream encrypted with the same RC4 key
B) use XOR to match the encrypted stream to itself in order to retrieve the key
C) retrieve the private key if the attackers has access to the public key
D) flip a bit of the encrypted text which will flip a corresponding bit in the cleartext once it is decrypted.
Answer :A,B
80) Which three of these statement about a zone-based policy firewall are correct?(choose three)
A) By defult all traffic to and from an interface that belong to a security zone is dropped unless explicity allowed in
the zone-pair policy.
B) Firewall policies,such as the pass,inspect and drop action can only be applied between two zones
D) Traffic cannot flow between a zone member interface and any interface that is not a zone member.
E) In order to pass traffic between two interface that belong to the same security zone, you must configure a pass
action using class-default.
Answer :B,C,D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
81)
Refer to the exhibit. Which two statement about the effect of the given Cisco IOS configuration are true?( Choose
two)
D) The software will delete half-open sessions if more than 600 new sessions are established per minute.
Answer :A,D
82) Which three basic security measure are used to harden MSDP? (Choose three)
E) MSDP SA filters
Answer :A,B,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
83) Drag each dacl entry on the left to the type of access it allows on the right
Answer:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
84) Drag and drop the components of a Teredo IPv6 packet from the left to the correct position in the packet on the
right
Answer :
IPv4: Fourth
IPv6 : first
UDP: third
85)
Refer to the exhibit. What is the effect of the given command?
A. It enables MPP on the FastEthernet 0/0/ interface, allowing only SSH and SNMP management traffic
B. It enables QoS policing on the control plane of the FastEthernet 0/0/ interface
C. It enables MPP on the FastEthernet 0/0 interface for SSH and SNMP management traffic and CoPP
for the other protocols
D. It enables MPP on the FastEthernet 0/0 interface by enforcing rate-limiting for SSH and SNMP
management traffic
E. It enables CoPP on the FastEthernet 0/0/ interface for SSh and SNMP management traffic
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
86)What are two control-plane protection features provided by CPPr? (Choose two)
A. All traffic traversing the router undergoes aggregate policing at the control plane host subinterface
B. All control-plane CDP and ARP traffic is received and managed on the control plane host subinterface
C. All control-plane IP traffic is received and managed on the control plane transit subinterface
D. The number of packets allowed in the control plane IP input queue can be managed by queue thresholding
limits
E. When the port-filtering features is enabled, packets that are send to closed TCP ports are dropped prior to
processing
F. The control plane transit subinterface is protected by the port-thresholding features
Answer: A, C
87) Which two statements about traffic storm control are true? (Choose two)
Answer : A, F
88) What are the three flag bits in an IPv4 header? (Choose three)
A. Timestamp
B. MF
C. DF
D. Record Route
E. Unused
F. TTL
Answer : B,C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
89) Which signature engine is used to create a custom IPS signature on a Cisco IPS appliance that triggers when a
vulnerable web application identified by the /runscript URI is run?
A) AIC HTTP
B) META
C) Atomic IP
D) String TCP
E) service HTTP
F) Multi-string
Answer :E
90) Which four of these attacks of wireless tools can the standard IDS signature on a wireless LAN controller detect?
(Choose four)
A) SYn flood
B) AirSnort
C)NEtstumbler
E) Deauthorization flood
G) Wellenreeintire
H) Association flood
Answer :C,E,G,H
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
91) All of these are predefined reports in the cisco IPS manger Express (Cisco IME) GUI expect which one?
Answer :A
92) What Cisco IOS feature prevent an attacker from filling up the MTU cache for locally generate traffic when using
path MTU discovery?
A) Force all traffic to send 1280-Byte packets by hard coding the MSS
Answer :C
Answer:C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:B
95) Which statement is true about the PKI deployment using Cisco IOS devices?
A. During the enrollment CA or RA signs the client certificate request with its public key
B. RA is capable to publish the CRLs
C. Peers use private keys in there certificates to negotiate IPSEC SAs to established a secure channel.
D. RA is used for accepting the enrollment requests
E. Certification revocation is not supported by SCEP protocol.
Answer :D
Answer:D
97) Which statement about the infrastructure ACL on Cisco IOS software is true?
A. They are used to protect the device forwarding path
B. They are used to protect the device management and internal link addresses
C. They are used to authorize the transit the traffic
D. They only protect device physical management interface
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:B
98) Which two statement about ASA transparent mode are true? Choose two.
A. It drops ARP traffic unless it is permitted
B. It doesnot support NAT
C. It requires inside and outside interface to be in different subnets
D. It can pass IPv6 traffic
E. It cannot pass multicast traffic
F. It supports ARP inspection
Answer:D,F
99) Which ICMP message type code indicates that fragment reaasembly time has exceeded?
A. Type 11 code 0
B. Type 11 code 1
C. Type 12 code 2
D. Type 4 code 0
Answer:B
100) What are the 2 authentication algorithms supported with SNMP v3 on an ASA? Choose 2.
A. 3DES
B. DES
C. SHA
D. RC4
E. MD5
F. RC5
Answer:C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:D,F
102) Which two statements about the BGP backdoor feature are true? Choose 2
A. It makes IGP learned routes preferred over eBGP learned routes
B. It makes iBGP learned routes preferred over IGP learned routes
C. It changes the eBGP administrative distance from 20 to 200
D. It makes eBGP learned routes preferred over IGP learned routes
E. It changes the eBGP administrative distance from 200 to 20
F. It changes the iBGP administrative distance from 200 to 20
Answer:A,C
103) Which statement describes the computed authentication data in the AH protocol?
A. It is part of the original IP header
B. It is send to peer
C. It is part of new IP header
D. It provides integrity only for the new IP header
Answer: B
104) Which two options describe how the traffic for the shared interface is classified in ASA multicontext mode?
Choose 2
A. At the destination address in the packet
B. At the destination address in the context
C. By copying and sending the packet to all the contexts
D. At the source address in the packet
E. By sending the MAC address for the shared interface
Answer:B,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:B
106) Which two statements about RFC 2827 are true? Choose 2
A. It defines egress packet filtering to safeguard against IP spoofing
B. It defines ingress packet filtering to defeat DoS that uses IP spoofing
C. It is endorsed by IETF in BCP 38
D. A corresponding practice is documented by the IETF in BCP 84
E. It defines ingress packet filtering for the multihomed network
Answer:C,D
Answer: C
108) Which two statements about PCI DSS are true? Choose two
A. It is an IETF standard for companies to protect credit, debit and ATM cardholder information
B. It is a proprietary security standard that defines a framework for credit, debit and ATM cardholder
information
C. It is a criminal act of cardholder information fraud
D. It is a US government standard that defines ISP security compliance
E. It has as one of its objectives to restrict physical access to credit, debit and ATM cardholder information
Answer:B,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:C
110) Which two statements about the RC4 algorithm are true? Choose two
A. The RC4 algorithm is an asymmetric key algorithm
B. In the RC4 algorithm, the 40-bit key represents four characters of ASCII code
C. The RC4 algorithm is faster in computation than DES
D. The RC4 algorithm uses variable-length keys
E. The RC4 algorithm cannot be used with wireless encryption protocols
Answer:C,D
111) Which two statements about VTP passwords are true? Choose 2
A. The VTP password can only be configured when the switch is in client mode
B. The VTP password is hashed to preserve authenticity using the MD5 algorithm
C. The VTP password is encrypted for confidentiality using 3DES
D. The VTP password can be configured only when the switch is in server mode
E. The VTP password is sent in the summary advertisements
Answer:B,E
Answer:E
113) An RSA key pair consists of a public key and a private key and is used to set up PKI. Which statement applies
to RSA and PKI?
A. The public key must be included in the certificate enrollment request
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:A
114) For what reson has the IPv6 Type 0 Routing Header been recommend for depreciation?
A. When a type 0 traffic is blocked by a firewall policy, all other traffic with routing headers is dropped
automatically
B. It can conflict with ingress filtering
C. It can create a black hole when used in combination with other routing headers
D. Attackers can exploit its functionality to generate DoS attacks
Answer:D
115) For which reason would an RSA key pair need to be removed?
A. The CA is under DoS attack
B. The CA has suffered a power outage
C. The existing CA is replaced and the new CA requires newly generated keys
D. PKI architecture would never allow the RSA key pair removal
Answer: C
116) Which two statement about the 3DES encryption algorithm are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B , E
117) Which three IPv6 tunneling methods are point-to-multipoint in nature? (Choose three)
Answer : C, D ,E
118) You have implemented a private VLAN to limit access between hosts on the same VLAN but the secondary
VLAN you created are still visible to other switches on the VTP version 2 domain What is the most efficient
action can you take to correct the problem?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A
119)
Refer to the exhibit, what is the effect of the given service policy configuration?
A) It block cisco com, msn com ,and facebook.com and permits all other domains.
B) IT block facebook.com, msn.com, Cisco.com and google.com and permit all other domains.
C) It block all domains except cisco.com msn.com, and facebook.com
D) It block all domains except facebook.com, msn.com,cisco.com and google.com.
Answer : C
120) Which two statement about RADIUS VSA are true?(Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B , C
A) RC4
B) Blowfish
C) DES
D) RC5
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
122) Assessing your network for potential security risks (risk assessment)should be an integral elements of your
network architecture. Which four task items need to be performed for an effective risk assessment and to
evaluate network posture?(Choose four)
Answer : A , C , E, G
123)
A) It disable the IPsec anti-reply feature only for SAs that were created using the ANTI_Reply crypto map.
B) It disable the IPsec anti-reply feature only for SAs on the device.
C) It sets security association to a maximum hold time and disables association for new security connections.
D) It sets security association to a minimum hold time and disables association for new security connection.
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
124) What are the three scanning engines that the Cisco IronPort dynamic vectoring and streaming engine can
use to protect against malware? (Choose three)
A. F-Secure
B. McAfee
C. Sophos
D. Webroot
E. Symantec
F. TrendMicro
Answer: B, C, D
125) Which standard prescribes a risk assessment to identify whether each control is required to decrease risks
and if so, to which extent it should be applied?
A. ISO 27001
C. ISO 17799
D. HIPPA
E. ISO 9000
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
126) All of these are available from Cisco IPS Device manager (Cisco IDM) except Which one ?
Answer : E
127) When you are configuring QoS on the Cisco ASA appliance, which four are valid traffic selection criteria?
(Choose four.)
A. VPN group
B. tunnel group
C. IP precedence
D. DSCP
E. default-inspection-traffic
F. qos-group
Answer: B, C, D, E
128) Which feature on the Cisco ASA uses domain and IP-address blacklists to enforce security?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
129) Drag each IPS events action on the left to its description on the right?
Answer :
Deny attacker in-line: Drop the current packet and all additional packets from the same ip address for a
configurable period of time
Deny attacker service pair inline: Drop the current packet and all additional packets from the same ip address to
the same destination port for a configurable period of time
Deny attacker victim pair inline: Drop the current packet and all additional packets from the same ip address to
the same destination ip address for a configurable period of time
Deny connection inline: Drop the current packet and any subsequent on the same tcp flow
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
130)
Refer to the exhibit which statement about the result of the given configuration is true?
Answer : B
131) A DNS client that sends DNS massage to obtain information about the requested domain name space is
known as which of these?
Answer : E
132) What ICMPv6 massage type does an IPv6 host use to inform other hosts about its fragmentation
requirements?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
133) When applying MD5 route authentication on routers running RIP or EIGRP Which two important key chain
consideration should be accounted for?(Choose two)
Answer : A C
134)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the Exhibit What feature does the given configuration implement?
Answer : D
135) Drag and drop the desktop-security terms from the left onto their right definitions on the right?
Answer :
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:C
137) Which three statements about Dynamic ARP inspection on Cisco switches are true?
A. The trusted database can be manually configured using the CLI
B. Dynamic ARP inspection does not perform ingress security checking
C. DHCP snooping is used to dynamically build the trusted database
D. Dynamic ARP inspection checks ARP packets against the trusted database
E. Dynamic ARP inspection is supported only on access ports
F. Dynamic ARP inspection checks ARP packets on trusted and untrusted ports
Answer:A,C,D
138) What are the two limitation of the Atomic IP advanced engine? Choose two.
A. It has limited ability to check the fragmentation header
B. It is unable to fire high-severity alerts for known vulnerabilities
C. It is unable to detect IP address anomalies, including IP spoofing
D. It is unable to inspect packets length fields for bad information
E. It is unable to detect layer 4 attacks if the packet are fragmented by IPv6
Answer: A,E
139) Which statement about the Cisco Secure ACS solution engine TACACs + Av pair is true?
A. AV pairs must be enable only on cisco secure ACS for successful implementation
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:B
140) Which two statements about NEAT are true. Choose two.
A. NEAT supports standard ACLs on the switch port
B. NEAT is not supported on an etherchannel port
C. NEAT should be deployed only with auto configuration
D. NEAT uses CISCP, client information signaling protocol to propagate client IP addresss
E. NEAT is supported on an etherchannel port
Answer:B,C
141) What are two advantages of SNMPv3 over SNMPv2C? Choose two.
A. Integrity, to ensure that data has not been tampered with in transit
B. No source authentication mechanism for faster response time
C. Packet replay protection mechanism removed for efficiency
D. GETBULKREQUEST capability, to retrieve large amount of data in a single request
E. Confidentiality via encryption of packets, to prevent man-in-the-middle-attack
Answer:A,E
142) When attempting to use basic http authentication to authenticate a client, which type of http message
should the server used?
A. HTTP 302 with an authentication header
B. HTTP 401 with a WWW-authenticate header
C. HTTP 407
D. HTTP 200 with a WWW-authenticate header
Answer:B
143) What is the range of valid stratum numbers for NTP when configuring a cisco IOS device as an authoritive
NTP server?
A. 0 to 16
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. 1 to 15
C. 0 to 4
D. 1 to 16
Answer: B
145) Your co-worker is working on project to prevent DDOS and ingress filtering and needs advice on the
standard an associated process for a single home network. Which two option do you suggest?
A. RFC 5735
B. RFC 3704
C. BCP 84
D. BCP 38
E. RFC 2827
Answer:D,E
146) In the IPv6 address 2001 DB8 130F::870::140:B/64 which portion is the IPv6 interface identifier?
A. 2001:DB8:130F:0
B. 870:0:140B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. 2001:DB8:130F
D. 0:870:0:14B
Answer: D
147) Which three fields are parts of the AH header? Choose three.
A. Destination address
B. Source address
C. Protocol ID
D. NEXT header
E. Packet ICV
F. SPI identifying SA
G. Application port
Answer:D,E,F
Answer:C
149) Which two ESTMP commands are supported by the ASA inspection engine? Choose two.
A. SOML
B. LINK
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. VERB
D. ONEX
E. ETRN
F. ATRN
Answer:A,E
150) Which two statement about the ISO are true? Choose two.
A. Correspodant bodies are small countries with there own standards organization
B. Only member bodies have voting rights
C. The ISO has three membership categories- Member, correspondant and subscriber
D. The ISO is government based-organization
E. Subscriber members are individual organisations
Answer:B,C
Answer: C
Answer: E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:D
154) Which statement about the Cisco ASA operation running version 8.3 is true?
A. The interface and global access-lists both can be applied in the input or output direction
B. NAT control is enabled by default
C. The interface access-list is matched first before the global access-lists
D. The static CLI command is used to configure static NAT translation rules
Answer:C
Answer: A
156) Which Cisco IOS IPS signature action denies and attacker session using the Dynamic access-list?
A. Deny-packet-inline
B. Reset-TCP-action
C. Deny-connection-inline
D. Produce-Alert
E. Deny-session-Inline
F. Deny-attacker-inline
Answer:C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
157) Which signature engine would you choose to filter for the regex [aA][tT][tT][aA][cC][kK] in the URI field of
the HTTP header?
A. Atomic IP
B. Service HTTP
C. AIC HTTP
D. String TCP
Answer:B
158)
Refer to the exhibit. Against which type of the given configuration protect?
A. Pharming
B. Botnet Attack
C. Phishing
D. DNS Hijacking
E. DNS cache poisoning
Answer: B
159)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:
1-C,2-A,3-D,4-B
160)
Answer:
1-D,2-B,3-A,4-C
161)
Refer to the exhibit. Which option describe the behavior of this configuration ?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
162)
Refer to the exhibit, After setting the replay window size on your Cisco Router, you received the given system
message. What is the reason for the messge?
A. The replay window size is set too low for the number of packets received.
B. The IP-sec antireplay feature is enable, but the window size feature is disabled.
C. The IPSec anti-replay feature is disabled.
D. The replay window size is set too high for the number of packets received.
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
163)
Refer to the exihibit. Which option is the reason for the failure of the DMVPN session between R and R2?
Answer: B
164)
Refer to the exhibit. Which two statements correctly describe the debug output? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:A,C
165)
Refer to the exihibit. Which three description of the configuration are router?
Answer: A,F,G
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
166)
Answer:1-B,2-A,3-D,4-C
167)
Answer:1-B,2-B,3-C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
168)
Refer to the exhibit. Why does the easyVPN session fail to establish between client and the server?
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
169)
Refer to the exihibit. Why there is no encrypted session between host 10.10.10.1 and 20.20.20.1 ?
Answer:A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
170)
Answer: C
171)
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
172)
Answer: B
173)
Answer:A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
174)
Answer: A,F
175)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. You have determined that RouterA is sending a high number of fragmented packets from the s0
interface to the Web server, causing performance issues on RouterA. What configuration can you perform to send
the fragmented packets to the workstation at 10.0.0.2 for analysis?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
176) Which two statements about 802.1x authentication with port security are true ? (Choose two )
A. 802.1x manages network access for all authorized MAC address
B. If any host causes a security violation, the port is immediately error-disabled
C. If any client causes a security violation , the port is immediately placed in spanning-tree disabled mode
D. An entry is created in the secure host table for any client that is authenticated and manually configured for
port security, even if the table is full
E. If a client is authenticated and port security table is full, the oldest client is aged out
Answer : A, E
177) Which of the following are two valid TLS message content types ? ( Choose two)
A. Application data
B. DynamID
C. Proxy
D. Identity
E. Alert
F. Notification
Answer : A, E
178) Which two statements about PIM-DM are true ? (Choose two )
A. It delivers multicast traffic only when the data is explicitly requested
B. It forwards data packets on the shared distribution tree
C. It is most efficient when the network uses active receivers on every subnet
D. It requires a rendezvous point
E. It uses a unicast routing table to perform the RPF check
Answer : C, E
179) What are two of the valid IPv6 extension headers ? (Choose two)
A. Mobility
B. Options
C. Authentication Header
D. Hop Limit
E. Protocol
F. Next Header
Answer : A, C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : D
181) Which two ICMP types must be allowed in a firewall to enable trace routes through the firewall ? (Choose
two)
A. ICMP type=3, code=12
B. ICMP type=5, code=1
C. ICMP type=5, code=0
D. ICMP type=3, code=3
E. ICMP type=11, code=1
F. ICMP type= 11, code=0
Answer : D , F
182) Which three multicast features are supported on the Cisco ASA? (Choose three.)
Answer : A, B ,D
183) What are two functions that ESMTP application inspection provides when enabled on the ASA ? (Choose
two)
A. It supports extended SMTP commands, such as ONEX, and VERB
B. It protects the network from SMTP aplication inspection and phishing attacks
C. It supports both SMTP and ESMTP sessions
D. It scans MAIL and RCPT commands for invalid characters and other anomalies
E. It generates an audit trail when it rejects invalid commands
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :C, D
Answer : D
B. Category: Internet
Protocol: FTP, HTTP, TFTP
Answer : B
186) Which configuration is the correct way to change a GET VPN Key Encryption Key lifetime to 10800 seconds
on the key server?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. crypto godi
group GET-Group
identity number
1234
server local
set security-association lifetime seconds 10800
Answer : D
187) How can the tail drop algorithm support traffic when the queue is filled?
A) It drop older packet with a size of 64 byts or more until queue has more traffic
B)It drop older packet with a size of less than 64 byts until queue has more traffic
C) It drops all new packets until the queue has room for more traffic
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D) It drops older TCP packets that are set to be redelivered due to error on the link until the queue has room for
more traffic.
Answer : C
188) Which three options are components of Mobile IPv6? (Choose three.)
A. home agent
B. correspondent node
C. mobile node
D. binding node
E. discovery probe
Answer : A, B ,C
189) What command can you use to display the number of malford messages received by a DHCP server ?
Answer : B
190) Which three EAP methods require a server-side certificate? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. EAP-TLS
C. EAP-FAST
D. EAP-TTLS
E. EAP-GTP
Answer: A, B, D
191) Which four Cisco IOS features are used to implement First Hop Security in IPv6? (Choose four.)
C. IPv6 RA Guard
D. SeND
Answer: A, B, C, D
192) Which signature engine is used to create a custom IPS signature on a Cisco IPS appliance that triggers when a
vulnerable web application identified by the "/runscript.php" URI is run?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. AIC HTTP
B. Service HTTP
C. String TCP
D. Atomic IP
E. META
F. Multi-String
Answer: B
193) Given the IPv4 address 10.10.100.16, which two addresses are valid IPv4-compatible IPv6 addresses? (Choose
two.)
A. :::A:A:64:10
B. ::10:10:100:16
C. 0:0:0:0:0:10:10:100:16
D. 0:0:10:10:100:16:0:0:0
Answer: B, C
194) Which three statements correctly describe the purpose and operation of IPv6 RS and RA messages? (Choose
three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. IPv6 RA messages can help host devices perform stateful or stateless address autoconfiguration; RS messages are
sent by hosts to determine the addresses of routers.
D. RS and RA packets are used by the duplicate address detection function of IPv6.
E. IPv6 hosts learn connected router information from RA messages which may be sent in response to an RS
message.
F. RS and RA packets are used for IPv6 nodes to perform address resolution that is similar to ARP in IPv4.
Answer: A, B, E
195)
Answer:1-B,2-A,3-D,4-E,5-C
A. In the DNS header, the Rcode value is set to 0 for format error.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
197)
Refer to the exhibit. Which option describes the behavior of this configuration?
A. An initial warning message is displayed when 800 prefixes are received. A different message is displayed when
1000 prefixes are received and the session is not disconnected.
D. An initial warning message is displayed when 80 prefixes area received. The same warning message is displayed
when 1000 prefixes area received and the session is disconnected.
Answer: A
198)What is the default duration of IPS anomaly detection's learning accept mode?
A. 24 hours
B. 48 hours
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. 12 hours
D. 8 hours
Answer: A
199)Which two statements about the BGP backdoor feature are true? (Choose two)
Answer: AC
200) Which Cisco IOS IPS signature action denies an attacker session using the dynamic access list?
A. deny-connection-inline
B. deny-packet-inline
C. deny-attacker-inline
D. reset-tcp-action
E. produce-alert
F. deny-session-inline
Answer: A
201)What is the range of valid stratum numbers for NTP when configuring a Cisco IOS device as an authoritative NTP
server?
A. 1 to 16
B. 1 to 15
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. 0 to 16
D. 0 to 4
Answer: B
A. TKIPandAES
Answer: A
203) What are two enhancements in WCCP V2.0 over WCCP V1.0? (Choose two)
A. authentication support
B. multicast support
C. encryption support
D. IPv6 support
Answer: B,A
204) Which two statements about IPv6 path MTU discovery are true? (Choose two)
A. If the source host receives an ICMPv6 Packet Too Big message from a router, it reduces its path MTU.
C. If the destination host receives an ICMPv6 Packet Too Big message from a router, it reduces its path MTU.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. It can allow fragmentation when the minimum MTU is below a configured value.
E. The initial path MTU is the same as the MTU of the original node's link layer interface.
Answer: AE
205)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Which three descriptions of the configuration are true? (Choose three)
Answer: ABD
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
206)
Refer to the exhibit. What is the purpose of the command in the NAT PT for IPv6 implementation on a Cisco IOS
device?
A. It defines the IPv4 address pool used by the NAT-PT for dynamic address mapping.
B. It defines the IPv6 address pool used by the NAT-PT for dynamic address mapping.
C. It defines the IPv4 address pool used by the NAT-PT for static address mapping.
Answer: A
A. DNSSEC
D. DNS encryption
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
208)
Refer to the exhibit. Why is there no encrypted session between host 10.10.10.1 and 20.20.20.1?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
209)Which three parameters does the HTTP inspection engine use to inspect the traffic on Cisco IOS firewall?
(Choose three)
A. source address
B. application
D. request method
F. destination address
Answer: BCD
210) Which two statements about the RC4 algorithm are true? (Choose two)
E. in the RC4 algorithm, the 40-bit key represents four characters of ASCII code.
Answer: BD
E. implements a key mixing function before passing the initialization vector to the RC4 algorithm
Answer: AE
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
212) To transport VXLAN traffic, which minimum MTU change, from a default MTU of 1500 bytes on the port, is
required to avoid fragmentation and performance degradation?
A. 1650 bytes
B. 1550 bytes
C. 9100 bytes
D. 9114 bytes
Answer: B
213)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Why is there no encrypted session between host 10.10.10.1 and 20.20.20.1?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
A. Dynamically downloaded SGACL does not override manually configured conflicting policies.
Answer: B
215)Which two statements about ISO 27001 are true? (Choose two)
Answer: AB
216) Drag and drop the ISE profiler components on the left onto their corresponding
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:
Probe Manager = allow probe configuration to start-stop attribute-value pair collection from the end.
Forwarder = Stores endpoints along with their attribute-value pair in the Cisco ISE database.
Analyzer = Classifies endpoint into specifies groups using their attribute-value paris.
A. MAC in GRE
B. MAC in UDP
C. MAC in TCP
D. MAC in MAC
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:
Cisco TrustSec SGT Exchange Protocol = control protocol for propagating IP-to-SGT binding information
219)
Refer to the exhibit. Which two statements about this debug output are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: AD
220)
Refer to the exhibit. Which configuration prevents R2 from becoming a PIM neighbor with R1?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Ip igmp access-group 10
Answer: A
221)Which statement is true about the PKI deployment using Cisco IOS devices?
A. During the enrollment, CA or RA signs the client certificate request with its public key.
E. Peers use private keys in their certificates to negotiate IPSec SAs to establish the secure channel.
Answer: D
222)Which statement about the Cisco Secure ACS Solution Engine TACACS+ AV pair is true?
B. AV pairs must be enabled only on Cisco Secure ACS for successful implementation.
D. the Cisco Secure ACS Solution Engine does not support accounting AV pairs.
Answer: C
A. MainApp
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. InterfaceApp
C. AuthenticationApp
D. NotificationApp
E. SensorApp
Answer: A
224) for what reason has the IPv6 Type 0 Routing Header been recommended for deprecation?
B. It can create a black hold when used in combination with other routing headers.
C. When Type 0 traffic is blocked by a firewall policy, all other traffic with routing headers is dropped automatically
Answer: A
225) In the IPv6 address 2001:DB8:130E::870:0:140B/64, which portion is the IPv6 interface identifier?
A. 2001:DB8:130F:0:
B. 0:870:0:140B
C. 870:0:140B
D. 2001:DB8:130F
Answer: B
226)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Which two statements correctly describe the debug output? (Choose two)
Answer: DF
227)In traceroute, which ICMP message indicates that the packet is dropped by a router in the path?
A. Type 3, Code 1
C. Type 5, Code 1
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. Type 3, Code 3
Answer: B
A. integrity, to ensure that data has not been tampered with in transit
Answer: AC
Answer: C
230) Drag and drop the SMTP components on the left onto their corresponding roles on the right.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
231)
Refer to the exhibit. Which option is the reason for the failure of the DMVPN session between R1 and R2?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. AuthenticationApp
B. InterfaceApp
C. SensorApp
D. MainApp
E. SensorDefinition
F. NotificationApp
Answer: C
B. The RA has the power to accept registration requests and to issue certificates.
Answer: D
B. They are used to protect device management and internal link addresses.
Answer: B
236)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Why does the EasyVPN session fail to establish between the client and server?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
237)
Refer to the exhibit. Which statement about the configuration commands is true?
A. These commands return an error because of a mismatch between the Dot1x order and priority.
C. Changing the default order of authentication does not introduce additional authentication traffic in the network.
D. These are valid configuration commands and the switch accepts them.
Answer: D
238) If a nodes IPv6 interface address is 2001:DB2::1F5C:7A92,what is its solicited-node multicast address?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : F
239) Which two network protocol can operate on the application layer? (Choose two)
A) UDP
B) DNS
C) DCCP
D) NetBIOS
E) SMB
F) TCP
Ans: B,E
240) What are two EAP types used for authentication on a wireless network? (Choose two)
A) VPN
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B) EAP-TLS
C) EAP-CHAP
D) PEAP
E) EAP SHA
F) EAP MAC
Ans: B,D
241) Which three of this protocol are supported when using TACACS+? (Choose three)
A) NetBIOS
B) CHAP
C) Kerberos
D) Apple Talk
E) NASI
Answer : A, D, E
242) What are two limitation of CPPr (control plane protection)?(Choose two)
Answer : C , D
243) Which two statement about SSIDs are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Ans: A,D
244) TACACS+ authentication uses which three packet Types? (Choose Three)
Answer : C,D,E
245) Which three global correlation features can be enabled from cisco IPS Device manager (Cisco ICM)? (Choose
three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Ans: A, D, F
246) Which three statements about Security Group Tag Exchange Protocol are true? (Choose three.)
C. It propagates the IP-to-SGT binding table across network devices that do not have the ability to perform SGT
tagging at Layer 2 to devices that support it.
Answer: B, C, D
247) Which two statement about IPv6 router advertisement massages are true?(Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : C,E
248)
Refer to the exhibit switch SW2 has just been added to fastEthernet 0/23 on sw1,after a few second interface
Fa0/23 on SW1 is placed in the error-disabled state.SW2 is removed from port 0/23 and inserted into SW1 port
Fa0/22 with the same result. What is the most likely cause of this problem?
Answer : D
249) Which three statement regarding cisco ASA multicast routing support are correct ? (Choose three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : C , D, F
250) your organization has implemented an internal stratum 2 NTPv4 server using a Cisco router. How can you
prevent NTP clients that are configured without authentication from syncing with the NTP server?
Answer : D
251) You have configured a downlink MACsec switch port without a policy if the ISE server fails to return the CISCO-
av-pair= subscriber:linksec-policy,What policy will the MACsec switch port use?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : D
252) Which two statement are correct about the aaa authentication login defaults group tacacs+ local global
configuration command?(Choose two)
Answer : B E
253) Drag each cryptographic algorithm on the left to the operation it support on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
254) Drag each IPS signature engine on the left to its description on the right?
Answer :
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
255) What are two important guideline to follow when implementing VTP? (Choose Two)
Answer : A, E
256) DNS security Extension(DNSSEC) adds security functionality to the domain name system for which name system
for which three purposes? (Choose three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:A, B , F
257)Which two ESMTP commands are supported by the ASA inspection engine? (Choose two)
A. ATRN
B. ETRN
C. VERB
D. VERB E.ONEX
F. SOML
G. LINK
Answer: BF
258)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. A DMVPN session will fail to establish because R2 is missing the ISAKMP peer address.
E. The tunnel configuration is incomplete and the DMVPN session will fail between Rl and R2
Answer: C
259)Which ICMP message type code indicates that fragment reassembly time has been exceeded?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. Type 4, Code 0
Answer: B
260) When a client attempts to authenticate to an access point with the RADIUS server, the server returns the error
message "Invalid message authenticator in EAP request" Which action can you take to correct the problem?
Answer: D
261) Which signature engine would you choose to filter for the regex [aA][tT][tT][aA][cC][kK) in the
A. AIC HTTP
B. ATOMIC IP
C. service HTTP
D. string TCP
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. to avoid configuring PSKs (Pre-Shared Key) locally on network access devices and to configure a PSK once on a
RADIUS server
D. to allow authenticated client devices to roam from one access point to another without any perceptible delay
during re-association
Answer: D
263)What are two limitations of the Atomic IP Advanced Engine? (Choose two)
Answer: CE
264) your coworker is working on a project to prevent DDoS and ingress filtering and needs advice on the standard
and associated process for a single-homed network. Which two options do you suggest? (Choose two)
A. RFC 3704
B. RFC S73S
C. RFC 2827
D. BCP 38
E. BCP 84
Answer: CD
265)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. With the client attempting which mode works by default?
A. passive
B. active
Answer: A
266) For which router configuration is the attack-drop sdf file recommended?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
B. It uses ICMP sweep with a predetermined TTL value to discover hosts behind a firewall.
E. It uses TTL handling to determine whether packets can pass through a packet-filtering device.
Answer: B
B. It uses ICMP sweep with a predetermined TTL value to discover hosts behind a firewall.
E. It uses TTL handling to determine whether packets can pass through a packet-filtering device.
Answer: B
269)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Which option describes the behavior of this configuration?
A. IEEE 802.lx devices must first authenticate via MAB to perform subsequent IEEE 802.IX authentication. If 802.IX
fails, the device is assigned to the default guest VLAN.
C. The device performs subsequent IEEE 802.IX authentication if it passed MAB authentication. If the device fails
IEEE 802.IX, it will start MAB again.
D. Devices that perform IEEE 802.IX should be in the MAC address database for successful authentication.
Answer: C
270)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Why does the EasyVPN session fail to establish between the client and server?
Answer A
271)What are two authentication algorithms supported with SNMPv3 on an ASA? (Choose two) ARCS
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. DES C.RC4
B. MD5
C. 3DES
D. SHA
Answer: C, D
272) Which three statements about VRF aware Cisco Firewall are true? (Choose three)
274)Which two statements about the BGP TTL security check are true? (Choose two)
275)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. You are configuring a GRE tunnel between two sites. What action can you take to minimize
packet fragmentation on the tunnel?
A. Configure ip mtu 1400 and ip tcp adjust-mss 1360 under the tunnel1 interface on both routers.
B. Configure ip mtu1360 and ip tcp adjust-mss 1400 under the tunnel1 interface on both routers
C. Configure ip mtu 1500 and ip tcp adjust-mss 1400 under the tunnel1 interface on either router
D. Configure ip mtu 1500 and ip tcp adjust-mss 1360 under the tunnel1 interface on either router
Answer: A
277)
ipv6 access-list permit
permit icmp any any 128 0
permit icmp any any 129 0
permit icmp any any 2 0
permit icmp any any 4 0
Refer to the exhibit. What are three effects of the given firewall configuration? (Choose three)
A. the firewall allows destination unreachable error messages from any source to pass to the server
B. PCs outside the firewall are unable to communicate with server over HTTP
C. The firewall allows Echo Request packets from any source to pass to the server
D. The firewall allows Echo Replay packets from any sources to pass to the server
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. The firewall allows Time Exceeded error message from any source to pass to the server
F. The firewall allows Packet too big error message from any source to pass to the server.
Answer: C, D, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
280)Drag each field authentication Header on the left into the order in which it appears in the header on the right
Answer:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
281) Drag each step in the Cisco PSIRT response to incidents and vulnerabilities involving Cisco products on the left
in the correct order on the right
Answer:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
282) Drag each IPv6 extension header on the left into the recommended order for more than one extension header
in the same IPv6 packet on the right
Answer:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
283) What is an RFC 2827 recommendation for protecting your network against DoS attacks with IP address
spoofing?
284) Which two statements about Flexible Packet Matching are true? (Choose two)
285) Which three statements about VRF-Aware Firewall are true? (Choose three)
286 ) Which two statements about attacks against IPV4 and IPv6 network are true? (Choose two)
Answer: A, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
287) given the IPV4 address 10.10.100.16 which two addresses are valid IPv4-compatible IPv6 addressed?(choose
two)
A) 0:0:10:10:100:16:0:0:0
B) 0:0:0:0:0:10:10:100:16
C):::A:A64:10
D):::10:10:100:16
Answer :B,D
288) if any ASA device is configured as a remote access ipsec server with RADIUS authentication and password
management enabled,which type of authentication will it use?
A) MS-CHAPv2.
B)PAP
C)RSA
D)NTLM
E)MS-CHAPv1
Answer :A
D)SHA-1 is stronger than MD5 because it can be used with a key to prevent modification
Answer :C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
290)Which three of these are true statement about TLS? (choose three)
E)If a third-party(man-in-the-middle)observes the entire handshake between clients and server,third-party can
decrypt the encrypted data that passes between them
Answer :A,C,D
291) You have discovered that a router on your network is experiencing high CPU when management server
10.11.10.12 queries OLD iidpMIB Assuming management stations access to OID is not critical What configuration can
you apply to the router to prevent high CPU usage when the OID is queried?
Answer :B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
292) Which three routing characteristic are relevant for DMVPN Phase 3?(Choose three)
C) Hubs are routing neighbor with other hubs and must use the same routing protocol as that used on hub-spoke
tunnels
Answer :B,D,F
293) In RFC 4034,DNSSEC introduced which four new resource record types?(Choose four)
Answer :A,B,C,F
Answer :A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
295)
Refer to the exhibit what is the maximum number of hops from the device that generated the given output to its
BGP neighbor at 4.4.4.4?
A)5
B)2
C)3
D)254
E)252
F)255
Answer :C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
296) Drag and drop the step in the Cisco ASA packet processing flow on the left into the correct order of operation
on the right?
Answer :
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
297)Which three statements about Cisco Secure Desktop are true? (Choose three)
A. It is interpretable with Clientless SSL VPN, AnyConnect, and the IPSec VPN client.
B. Its supports shared network folder
C. It validate PKI certificates
D. It supports multiple prelogin checks, including IP address, certificate and OS
E. It supports unlimited CSD locations.
F. It can be pre-installed to reduce download time.
Answer: B, D, E
298)Which two statements about Cisco MQC are true? (Choose two)
299) What are the three default account duration settings supported by the Cisco ISE Guest services? (Choose three)
A. DefaultStartEnd
B. DefaultEightHours
C. DefaultFirstLoginEight
D. DefaultUnlimited
E. DefaultFirstLogin
F. DefaultFiveHours
Answer: A, B, C
300) What are the three probes supported by Cisco ISE profiling services? (Choose three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
302) Which two statements about the IPv6 OSPFv3 authentication Trailer are true (choose two)
303) Which two statements about DNSSEC are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
304)
Refer the exhibit. Two routers are connected using GRE through a WAN link. Your syslog server is logging the given
error message. What is a possible reason for the errors?
305) Which three statements about VXLANs are true? (Choose three.)
B. Layer 2 frames are encapsulated in IP, using a VXLAN ID to identify the source VM.
D. IGMP join messages are sent by new VMs to determine the VXLAN multicast IP.
Answer: B, C, D
306) In order to reassemble IP fragments into a complete IP datagram, which three IP header fields are referenced
by the receiver? (Choose three.)
Answer: C, D, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
307) Which VTP mode allows the Cisco Catalyst switch administrator to make changes to the VLAN configuration
that only affect the local switch and are not propagated to other switches in the VTP domain?
A. transparent
B. server
C. client
D. local
E. pass-through
Answer: A
308) Which type of VPN is based on the concept of trusted group members using the GDOI key management
protocol?
A. DMVPN
B. SSLVPN
C. GETVPN
D. EzVPN
E. MPLS VPN
F. FlexVPN
Answer: C
309) Based on RFC 4890, what is the ICMP type and code that should never be dropped by the firewall to allow
PMTUD?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
310) A firewall rule that filters on the protocol field of an IP packet is acting on which layer of the OSI reference
model?
A. network layer
B. application layer
C. transport layer
D. session layer
Answer: A
311) Which layer of the OSI model is referenced when utilizing http inspection on the Cisco ASA to filter Instant
Messaging or Peer to Peer networks with the Modular Policy Framework?
A. application layer
B. presentation layer
C. network layer
D. transport layer
Answer: A
312) When a Cisco IOS Router receives a TCP packet with a TTL value less than or equal to 1, what will it do?
B. Drop the packet and reply with an ICMP Type 3, Code 1 (Destination Unreachable, Host Unreachable)
C. Drop the packet and reply with an ICMP Type 11, Code 0 (Time Exceeded, Hop Count Exceeded)
D. Drop the packet and reply with an ICMP Type 14, Code 0 (Timestamp Reply)
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
313) In an 802.11 WLAN, which option is the Layer 2 identifier of a basic service set, and also is typically the MAC
address of the radio of the access point?
A. BSSID
B. SSID
C. VBSSID
D. MBSSID
Answer: A
314) What term describes an access point which is detected by your wireless network, but is not a trusted or
managed access point?
A. rogue
B. unclassified
C. interferer
D. malicious
Answer: A
315)A router has four interfaces addressed as 10.1.1.1/24, 10.1.2.1/24, 10.1.3.1/24, and 10.1.4.1/24. What is the
smallest summary route that can be advertised covering these four subnets?
A. 10.1.2.0/22
B. 10.1.0.0/22
C. 10.1.0.0/21
D. 10.1.0.0/16
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. simple passwords
B. MD5
C. null
D. IKEv2
E. IPsec AH/ESP
Answer: E
317) Which two IPv6 tunnel types support only point-to-point communication? (Choose two.)
A. manually configured
B. automatic 6to4
C. ISATAP
D. GRE
Answer: A, D
318) Which two EIGRP packet types are considered to be unreliable packets? (Choose two.)
A. update
B. query
C. reply
D. hello
E. acknowledgement
Answer: D, E
319) Before BGP update messages may be sent, a neighbor must stabilize into which neighbor state?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Active
B. Idle
C. Connected
D. Established
Answer: D
320) Which three statements are correct when comparing Mobile IPv6 and Mobile IPv4 support? (Choose three.)
A. Mobile IPv6 does not require a foreign agent, but Mobile IPv4 does.
B. Mobile IPv6 supports route optimization as a fundamental part of the protocol; IPv4 requires extensions.
C. Mobile IPv6 and Mobile IPv4 use a directed broadcast approach for home agent address discovery.
D. Mobile IPv6 makes use of its own routing header; Mobile IPv4 uses only IP encapsulation.
E. Mobile IPv6 and Mobile IPv4 use ARP for neighbor discovery.
Answer: A, B, D
321) Which three statements are true about MACsec? (Choose three.)
Answer: B, C, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
322) Troubleshooting the web authentication fallback feature on a Cisco Catalyst switch shows that clients with the
802.1X supplicant are able to authenticate, but clients without the supplicant are not able to use web
authentication. Which configuration option will correct this issue?
C. switch(config-if)# webauth
Answer: D
Which route will be advertised by the Cisco ASA to its OSPF neighbors?
A. 10.39.23.0/24
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. 10.40.29.0/24
C. 10.66.42.215/32
D. 10.40.29.0/24
Answer: A
324) Which three configuration components are required to implement QoS policies on Cisco routers using MQC?
(Choose three.)
A. class-map
B. global-policy
C. policy-map
D. service-policy
E. inspect-map
Answer: A, C, D
325) Which type of PVLAN ports can communicate among themselves and with the promiscuous port?
A. isolated
B. community
C. primary
D. secondary
E. protected
Answer: B.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
326) Which of the following provides the features of route summarization, assignment of contiguous blocks of
addresses, and combining routes for multiple classful networks into a single route?
B. route summarization
C. supernetting
D. private IP addressing
Answer: A
327) Aggregate global IPv6 addresses begin with which bit pattern in the first 16-bit group?
A. 000/3
B. 001/3
C. 010/2
D. 011/2
Answer: B
328) Which layer of the OSI reference model typically deals with the physical addressing of interface cards?
A. physical layer
B. data-link layer
C. network layer
D. host layer
Answer: B.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
329) Which statement best describes a key difference in IPv6 fragmentation support compared to IPv4?
A. In IPv6, IP fragmentation is no longer needed because all Internet links must have an IP MTU of 1280 bytes or
greater.
C. In IPv6, IP fragmentation is no longer needed since all nodes must perform PMTUD and send packets equal to or
smaller than the minimum discovered path MTU.
D. In IPv6, PMTUD is no longer performed by any node since the don't fragment flag is removed from the IPv6
header.
E. In IPv6, IP fragmentation is performed only by the source node of a large packet, and not by any other devices in
the data path.
Answer: E
It shows the format of an IPv6 Router Advertisement packet. If the Router Lifetime value is set to 0, what does that
mean?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
F. The router that is sending the RA has its time synchronized to an NTP source.
Answer: A
331) If a host receives a TCP packet with an SEQ number of 1234, an ACK number of 5678, and a length of 1000
bytes, what will it send in reply?
A. a TCP packet with SEQ number: 6678, and ACK number: 1234
B. a TCP packet with SEQ number: 2234, and ACK number: 5678
C. a TCP packet with SEQ number: 1234, and ACK number: 2234
D. a TCP packet with SEQ number: 5678, and ACK number 2234
Answer: D
Explanation: The response will be SEQ number + length of packet i.e. 1234 + 1000 = 2234.
332) A network administrator uses a LAN analyzer to troubleshoot OSPF router exchange messages sent to all OSPF
routers. To which one of these MAC addresses are these messages sent?
A. 00-00-1C-EF-00-00
B. 01-00-5E-00-00-05
C. 01-00-5E-EF-00-00
D. EF-FF-FF-00-00-05
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. EF-00-00-FF-FF-FF
F. FF-FF-FF-FF-FF-FF
Answer: B
333)Which option correctly describes the security enhancement added for OSPFv3?
A. The AuType field in OSPFv3 now supports the more secure SHA-1 and SHA-2 algorithms in addition to MD5.
B. The AuType field is removed from the OSPFv3 header since simple password authentication is no longer an
option.
C. The Authentication field in OSPFv3 is increased from 64 bits to 128 bits to accommodate more secure
authentication algorithms.
D. Both the AuType and Authentication fields are removed from the OSPF header in OSPFv3, since now it relies on
the IPv6 Authentication Header (AH) and IPv6 Encapsulating Security Payload (ESP) to provide integrity,
authentication, and/or confidentiality.?
E. The Authentication field is removed from the OSPF header in OSPFv3, because OSPFv3 must only run inside of an
authenticated IPSec tunnel.
Answer: D
334) Which IPv6 tunnel type is a standard that is defined in RFC 4214?
A. ISATAP
B. 6to4
C. GREv6
D. manually configured
Answer: A
335) What IP protocol number is used in the protocol field of an IPv4 header, when IPv4 is used to tunnel IPv6
packets?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. 6
B. 27
C. 41
D. 47
E. 51
Answer: C
336) An IPv6 multicast receiver joins an IPv6 multicast group using which mechanism?
A. IGMPv3 report
B. IGMPv3 join
C. MLD report
D. general query
E. PIM join
Answer: C
Explanation: The Multicast Listener Discovery (MLD) protocol is the multicast group management protocol for IPv6
and is used to exchange group information between multicast hosts and routers. The MLD protocol was designed
based on IGMP, the Internet Group Management Protocol for IPv4, and the protocol specification is the same in
many points. Unlike IGMP, however, MLD is defined as part of ICMPv6, while IGMP is defined as a separate
transport layer protocol.
337) Which option shows the correct sequence of the DHCP packets that are involved in IP address assignment
between the DHCP client and the server?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
338)Which common FTP client command transmits a direct, byte-for-byte copy of a file?
A. ascii
B. binary
C. hash
D. quote
E. glob
Answer: B
339)Which option is a desktop sharing application, used across a variety of platforms, with default TCP ports
5800/5801 and 5900/5901?
A. X Windows
C. VNC
D. desktop proxy
Answer: C
Explanation: VNC enables you to remotely access and control your devices wherever you are in the world, whenever
you need to. VNC has a widespread user base from individuals to the world's largest multi-national companies
utilizing the technology for a range of applications.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. PIM-SM
B. MOSPF
C. DVMRP
D. BIDIR-PIM
E. MSDP
Answer: D
Explanation: Bidir-PIM is a variant of the PIM suite of routing protocols for IP multicast. In PIM, packet traffic for a
multicast group is routed according to the rules of the mode configured for that multicast group. The Cisco IOS
implementation of PIM supports three modes for a multicast group:
Bidirectional mode
Dense mode
Sparse mode
A. To create a new VLAN on a Cisco Catalyst switch, the VLAN name, VLAN ID and VLAN type must all be specifically
configured by the administrator.
C. Each VLAN must have an SVI configured on the Cisco Catalyst switch for it to be operational.
Answer: B, D, E
342) Which technology, configured on the Cisco ASA, allows Active Directory authentication credentials to be
applied automatically to web forms that require authentication for clientless SSL connections?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. one-time passwords
B. certificate authentication
D. Kerberos authentication
Answer: C
A. 192.168.23.0
B. 192.168.23.128
C. 192.168.23.160
D. 192.168.23.192
E. 192.168.23.196
Answer: D
344)What is the size of a point-to-point GRE header, and what is the protocol number at the IP layer?
Answer: B
345)Which mode of operation must be enabled on CSM to support roles such as Network Administrator, Approver,
Network Operator, and Help Desk?
A. Deployment Mode
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. Activity Mode
C. Workflow Mode
E. Administration Mode
F. Network Mode
Answer: C
346) Which three statements about triple DES are true? (Choose three.)
A. For 3DES, ANSI X9.52 describes three options for the selection of the keys in a bundle, where all keys are
independent.
E. 3DES involves encrypting a 64-bit block of plaintext with the 3 keys of the key bundle.
Answer: B, C, D
What will the router respond with when it receives a DNS query for its own host name?
A. The router will respond with the IP address of the incoming interface.
B. The router will respond with 192.168.20.1 only if the outside interface is down.
D. The router will ignore the DNS query and forward it directly to the DNS server.
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
348) What are the three configurations in which SSL VPN can be implemented? (Choose three)
Answer : A , C , F
349)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
350) Drag each SNMPv3 entity component on the left to its function on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
351) If a cisco ASA firewall that configured in multiple-context mode of operation receives a packet whose
destination MAC address is a multicast address, how is the packet routed?
Ans: C
352) Which series of steps illustrates the correct flow for incident management?
A. Identify, log, categorize, prioritize, initial diagnosis, escalate, investigate and diagnose, resolve and recover, close
B. Categorize, log, identify, prioritize, initial diagnosis, escalate, investigate and diagnose, resolve and recover, close
C. Identify, log, categorize, prioritize, initial diagnosis, investigate and diagnose, escalate, resolve and recover, close
D. Identify, categorize, prioritize, log, initial diagnosis, escalate, investigate and diagnose, resolve and recover, close
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
353) Which three of these make use of a certificate as part of the protocol? (Choose three)
Answer : A , B , D
Answer : C D
355) Which two statement about MSDP are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C,F
356)
Refer to the Exhibit. Which statement about the effect of this configuration is true?
Answer : B
357)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
358) Which authentication does WCCPv2 use to protect massage against interception ,inspection and reply attack?
Answer : C
359) Which AS-path ACL is used to deny all the prefixes that original in AS65104 and permit all other prefixes?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : E
360)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Host 1 is assigned the static ip address 10.1.1.200 as shown but host 3 have dynamic ip address
DHCP snooping and dynamic ARP inception are configured on the network. What command sequence must you
configured on the switch to allow host 1 to communicate woith the other hosts?
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
361) You have noticed a continuous flow of %CRYP TO-4-PKT_REPLAY-ERR:decrypt check failed events in the
log of a router on a network configured with IPSec. Which command can you enter to mitigate the possible
counter-based reply problem with the least impact on IPSec security?
Answer: B
Answer: B , E, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. DNS Inspection
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
364) Which two statement about MSS(Maximum segment size) values are true? (Choose two)
Answer: E, F
365) Which two ISE Probes would be required to distinguish accurately the difference between an iPad and a
MacBook Pro? (Choose two.)
A. DHCP or DHCPSPAN
B. SNMPTRAP
C. SNMPQUERY
D. NESSUS
E. HTTP
F. DHCP TRAP
Answer: A, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. MAB is the process of checking the mac-address-table on the local switch for the sticky address. If the mac-
address of the device attempting to access the network matches the configured sticky address, it will be permitted
to bypass 802.1X authentication.
B. MAB is a process where the switch will send an authentication request on behalf of the endpoint that is
attempting to access the network, using the mac-address of the device as the credentials. The authentication server
evaluates that MAC address against a list of devices permitted to access the network without a stronger
authentication.
C. MAB is a process where the switch will check a local list of MAC addresses to identify systems that are permitted
network access without using 802.1X.
D. MAB is a process where the supplicant on the endpoint is configured to send the MAC address of the endpoint as
its credentials.
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which three statements about the Cisco IPS sensor are true? (Choose three.)
A. A
B. B
C. C
D. D
E. E
Answer: A, C, E
A. MPLS EXP
B. DSCP
C. QoS group
D. IP precedence
E. traffic class
F. flow label
Answer: C
369)Which two VLSM subnets, when taken as a pair, overlap? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. 10.22.21.128/26
B. 10.22.22.128/26
C. 10.22.22.0/27
D. 10.22.20.0/23
E. 10.22.16.0/22
Answer: A, D
370)What is the ICMPv6 type and destination IPv6 address for a Neighbor Solicitation packet that is sent by a router
that wants to learn about a newly introduced network device?
Answer: E
371)Which three options are extension headers that are implemented in IPv6? (Choose three.)
A. Routing Header.
D. Fragment Header.
Answer: A, D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
373) Which spanning-tree mode supports a separate spanning-tree instance for each VLAN and also supports the
802.1w standard that has a faster convergence than 802.1D?
A. PVST+
B. PVRST+
C. PVST
D. CST
E. MST
F. RST
Answer: B
A. Link LSA
E. Internetwork LSA
Asnwer:B,C,D
375)Which protocol provides the same functions in IPv6 that IGMP provides in IPv4 networks?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. ICMPv6
B. ND
C. MLD
D. TLA
Answer: C
376)Which authentication scheme, that is supported on the Cisco ASA, generates a unique key that is used in a
single password challenge?
A. one-time passwords
B. disposable certificates
C. password management
Answer: A
377)Which label is advertised by an LSR to inform neighboring LSRs to perform the penultimate hop popping
operation?
A. 0x00
B. php
C. swap
D. push
E. imp-null
Answer: E
378)When the RSA algorithm is used for signing a message from Alice to Bob, which statement best describes that
operation?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Alice signs the message with her private key, and Bob verifies that signature with Alice's public key.
B. Alice signs the message with her public key, and Bob verifies that signature with Alice's private key.
C. Alice signs the message with Bob's private key, and Bob verifies that signature with his public key.
D. Alice signs the message with Bob's public key, and Bob verifies that signature with his private key.
E. Alice signs the message with her public key, and Bob verifies that signature with his private key.
F. Alice signs the message with her private key, and Bob verifies that signature with his public key.
Answer: A
379) According to RFC-5426, syslog senders must support sending syslog message datagrams to which port?
C. TCP port 69
D. UDP port 69
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. It allows the switch to restrict the MAC addresses on the switch port, based on the static MAC addresses
configured in the startup configuration.
B. It allows the administrator to manually configure the secured MAC addresses on the switch port.
C. It allows the switch to permanently store the secured MAC addresses in the MAC address table (CAM table).
D. It allows the switch to perform sticky learning, in which the dynamically learned MAC addresses are copied from
the MAC address table (CAM table) to the startup configuration.
E. It allows the switch to dynamically learn the MAC addresses on the switch port, and the MAC addresses will be
added to the running configuration
Answer: E
381)When configuring a switchport for port security that will support multiple devices and that has already been
configured for 802.1X support, which two commands need to be added? (Choose two.)
A. The 802.1X port configuration must be extended with the command dot1x multiple-host.
B. The 802.1X port configuration must be extended with the command dot1x port-security.
E. The 802.1X port configuration needs to remain in port-control force-authorized rather than port-control auto.
Answer: A, C
382) In Cisco IOS, what is the result of the ip dns spoofing command on DNS queries that are coming from the inside
and are destined to DNS servers on the outside?
A. The router will prevent DNS packets without TSIG information from passing through the router.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. The router will act as a proxy to the DNS request and reply to the DNS request with the IP address of the interface
that received the DNS query if the outside interface is down.
C. The router will take the DNS query and forward it on to the DNS server with its information in place of the client
IP.
D. The router will block unknown DNS requests on both the inside and outside interfaces.
Answer: B
383)Which three traffic conditions can be matched when configuring single rate, dual token bucket traffic policing
on Cisco routers? (Choose three.)
A. conform
B. normal
C. violate
D. peak
E. exceed
F. average
Answer: A, C, E
384) A frame relay PVC at router HQ has a CIR of 768 kb/s and the frame relay PVC at router branch office has a CIR
of 384 kb/s. Which QoS mechanism can best be used to ease the data congestion and data loss due to the CIR speed
mismatch?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. LLQ at the HQ
Answer: C
385)Which four options could be flagged as potential issues by a network security risk assessment? (Choose four.)
C. route optimization
Answer: B, E, F, G
386) Which MPLS label is the signaled value to activate PHP (penultimate hop popping)?
A. 0x00
B. php
C. swap
D. push
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. imp-null
Answer: E
387) What action will be taken by a Cisco IOS router if a TCP packet, with the DF bit set, is larger than the egress
interface MTU?
A. Split the packet into two packets, so that neither packet exceeds the egress interface MTU, and forward them
out.
Answer: B
388)What will the receiving router do when it receives a packet that is too large to forward, and the DF bit is not set
in the IP header?
A. Drop the packet, and send the source an ICMP packet, indicating that the packet was too big to transmit.
B. Fragment the packet into segments, with all segments having the MF bit set.
C. Fragment the packet into segments, with all except the last segment having the MF bit set.
D. Fragment the packet into segments, with all except the first segment having the MF bit set.
Answer: C
A. traffic class
B. flow label
C. routing
D. fragment
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C, D, E
390)Which three statements are true regarding the EIGRP update message? (Choose three.)
D. Updates always include all routes known by the router with partial updates sent in the Reply message.
Answer: A, B, C
391)Which two EIGRP packet types are considered to be unreliable packets? (Choose two.)
A. update
B. query
C. reply
D. hello
E. acknowledgement
Answer: D, E
392)Which IPv6 routing protocol can use IPv6 ESP and AH to provide integrity, authentication, and confidentiality
services to protect the routing information exchange between the adjacent routing neighbors?
A. RIPng
B. EIGRPv6
C. BGP-4
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. IS-IS
E. OSPFv3
Answer: E
D. IPv6 support
E. authentication support between the multicast receivers and the last hop router
Answer: B
394) Beacons, probe request, and association request frames are associated with which category?
A. management
B. control
C. data
D. request
Answer: A
A. IP TTL propagation
E. PHP
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
A. in-addr.arpa
B. ip4.arpa
C. in-addr.net
D. ip4.net
Answer: A
397)Which port or ports are used for the FTP data channel in passive mode?
Answer: A
C. The FTP server sends chunks of data that are too big.
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. The client needs to log in using "anonymous" as a username and specifying an email address as a password.
Answer: A
A. 0
B. 1
C. 8
D. 16
Answer: D
B. It uses the local time of the server with its time zone indication.
C. It uses the local time of the server and does not indicate its time zone.
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
403)Which four functionalities are built into the ISE? (Choose four.)
A. Profiling Server
B. Profiling Collector
Answer: A, B, D, G
404)Which two statements about the fragmentation of IPsec packets in routers are true? (Choose two.)
By default, the IP packets that need encryption are first encrypted with ESP. If the resulting encrypted packet
exceeds the IP MTU on the egress physical interface, then the encrypted packet is fragmented and sent out.
B. By default, the router knows the IPsec overhead to add to the packet. The router performs a lookup if the packet
will exceed the egress physical interface IP MTU after encryption, then fragments the packet and encrypts the
resulting IP fragments separately.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, C
server local
sa receive-only
sa ipsec 1
profile gdoi-p
A. The key server instructs the DMVPN spoke to install SAs outbound only.
B. The key server instructs the GDOI group to install SAs inbound only.
C. The key server instructs the DMVPN hub to install SAs outbound only.
D. The key server instructs the GDOI spoke to install SAs inbound only.
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
According to this DHCP packet header, which field is populated by a DHCP relay agent with its own IP address before
the DHCPDISCOVER message is forwarded to the DHCP server?
A. ciaddr
B. yiaddr
C. siaddr
D. giaddr
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
407)Which two are valid SMTP commands, according to RFC 821? (Choose two.)
A. EHLO
B. HELO
C. RCPT
D. AUTH
Answer: B, C
408)Which two statements about VTP passwords are true? (Choose two)
A. The VTP password can only be configured when the switch is in Server mode.
E. The VTP password is hashed to preserve authenticity using the MD5 algorithm.
F. The VTP password can only be configured when the switch is in Client mode.
Answer: B, E
A. PIM routers.
B. RIP routers.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. NTP.
Answer: C
410) Which two statements about IPv6 are true? (Choose two.)
A. Broadcast is available.
Answer: B, D
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. 10.1.x.x
B. 172.10.1.x
C. 169.254.x.x
D. 196.245.x.x
E. 128.1.1.x
F. 127.1.x.x
Answer: C
A. Traffic from the 30.30.0.0/16 network to the 10.10.0.0/32 network will be translated.
B. Traffic from the 30.30.0.0/32 network to the 10.10.0.0/16 network will not be translated.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. Traffic from the 10.10.0.0/16 network to the 30.30.30.0/24 network will not be translated.
D. Traffic from the 10.10.0.0/32 network to the 30.30.30.0/16 network will be translated.
Answer: C
Answer: A
415)Which ICMP message type code indicates fragment reassembly time exceeded?
A. Type 4, Code 0
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
416) Which IPV4 header field increments every time when packet is sent from a source to a destination?
A. Flag
B. Fragment Offset
C. Identification
D. Time To Live
Answer: C
417)A device is sending a PDU of 5000 B on a link with an MTU of 1500 B. If the PDU includes 20 B of IP header,
which statement is true?
A. The first three packets will have a packet payload size of 1400.
C. The first three packets will have a packet payload size of 1480.
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
419) Which two statements about SNMP are true? (Choose two)
Answer: C, D
420) Which two statement about the DNS are true? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, D
421)Which three HTTP header fields can be classified by NBAR for request messages? (Choose three.)
A. User-Agent
B. Server
C. Referrer
D. Content-Encoding
E. Location
F. From
Answer: A, C, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The packet will be dropped if received on the same interface that the router would use to forward return packet.
C. The packet will be forwarded if received on the same interface that the router would use to forward return
packet.
D. Packet will be forwarded only if exists a default route for the return path.
Answer: C
423) Which three types of traffic are processed by CoPP configured on the device? (Choose three.)
A. tansient traffic
C. IPsec traffic
Answer: B, D, F
A. The host that is connected to the community port can communicate with a host that is connected to a different
community port.
B. The host that is connected to the community port cannot communicate with hosts that are connected to the
promiscuous port.
C. The host that is connected to the community port cannot communicate with hosts that are connected to the
isolated port.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. The host that is connected to the community port can only communicate with hosts that are connected to the
same community port.
Answer: C
A. Flexible NetFlow uses seven key fields in IP datagrams to identify the flow.
B. Flexible NetFlow uses key fields of IP datagram to identify fields from which data is captured.
Answer: C
C. Storm Control uses the bandwidth and rate at which a packet is received to measure the activity.
D. Storm Control uses the bandwidth and rate at which a packet is dispatched to measure the activity.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
If SW4 is sending superior BPDUs, where should the root guard feature be configured to preserve SW3 as a root
bridge?
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, D, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. The configuration would not work unless the AAA server is configured for authentication and authorization.
C. The exec commands in the configuration will be excluded from the test view.
Answer: D
A. ESP header
B. ESP trailer
C. IP header
D. Data
E. TCP-UDP header
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. ESP header
B. ESP trailer
C. New IP header
D. Original IP header
E. Data
F. TCP-UDP header
Answer: C
B. The Cisco NAC CAS can only operate as an in-band real IP gateway.
Answer: C
433) Which two statements about dynamic ARP inspection are true? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Dynamic ARP inspection checks ARP packets on both trusted and untrusted ports.
C. Dynamic ARP inspection checks invalid ARP packets against the trusted database.
D. The trusted database to check for an invalid ARP packet is manually configured.
Answer: C, F
Answer: C
435) Which two options describe the main purpose of EIGRP authentication? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. To provide redundancy
Answer: A, D
A. Broadcast is available.
C. Data security is natively supported through mandatory IPv6 extension headers for ESP and AH.
Answer: C
437) Which IPv4 header field usually increments for each subsequent packet sent?
A. Flag
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. Fragment Offset
C. Identification
D. Time To Live
Answer: C
A. 10.1.x.x
B. 172.10.1.x
C. 169.254.x.x
D. 196.245.x.x
E. 128.1.1.x
F. 127.1.x.x
Answer: C
439) Which ICMP message type code indicates fragmentation needed but DF bit set?
A. Type 3, Code 0
B. Type 4, Code 2
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. Type 3, Code 4
D. Type 8, Code 0
Answer: C
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
442) Which two statements about the OSPF authentication configuration are true? (Choose two.)
Answer: B, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
Answer: B
445) Which three statements about SMTP are true? (Choose three.)
B. The POP protocol is used by the SMTP client to manage stored mail.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. The mail delivery agent in the SMTP architecture is responsible for DNS lookup.
Answer: A, E, F
E. In the DNS header, the Rcode value is set to 0 for format error.
Answer: D
447) Which statement about Infrastructure ACLs on Cisco IOS software is true?
B. Infrastructure ACLs are used to protect device management and internal link addresses.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
448) In traceroute, which ICMP message indicates the packet is dropped by a router in the path?
A. Type 3, Code 3
C. Type 5, Code 1
D. Type 3, Code 1
Answer: B
449) Which three statements about Dynamic ARP Inspection on Cisco Switches are true? (Choose three.)
A. Dynamic ARP inspection checks ARP packets on both trusted and untrusted ports.
C. Dynamic ARP inspection checks ARP packets against the trusted database.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C, D, F
C. Community ports can communicate with the other promiscuous ports but not with the other community ports.
D. Isolated ports can communicate with the other isolated ports only.
E. Promiscuous ports can communicate with all the other type of ports.
F. Community ports can communicate with the other community ports but not with promiscuous ports.
Answer: E
451) A device is sending a PDU of 5000 B on a link with an MTU of 1500 B. If the PDU includes 20 B of IP header,
which statement is true considering the most efficient way to transmit this PDU?
A. The first three packets will have a packet payload size of 1400.
C. The first three packets will have a packet payload size of 1480.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
A. Traffic from the 30.30.0.0/16 network to the 10.10.0.0/32 network will be translated.
B. Traffic from the 30.30.0.0/32 network to the 10.10.0.0/16 network will not be translated.
C. Traffic from the 10.10.0.0/16 network to the 30.30.30.0/24 network will not be translated.
D. Traffic from the 10.10.0.0/32 network to the 30.30.30.0/16 network will be translated.
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Traffic from the n2 network object to the outside network will be translated using the g1 network objects and
outside interface.
B. Traffic from the n3 network object to the inside network will be translated using the g1 network objects and
outside interface.
C. Traffic from the n1 network object to the outside network will be translated using the g1 network object and
outside interface.
D. Traffic from the n3 network object to the outside network will be translated using the g1 network object and
outside interface.
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Traffic from the n2 network object to the inside network will be translated using the n1 network object.
B. Traffic from the n1 network object to the outside network will be translated using the n2 network object.
C. Traffic from the n2 network object to the outside network will be translated using the n1 network object.
D. Traffic from the n2 network object to the outside network will be translated using the n2 network object.
Answer: C
455) What are two advantages of using NLA with Windows Terminal Services? (Choose two.)
A. uses SPNEGO and TLS to provide optional double encryption of user credentials
E. protects servers against DoS attacks by requiring lesser resources for authentication
Answer: A, C
456) Which record statement is part of the NetFlow monitor configuration that is used to collect MPLS traffic with
an IPv6 payload?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
457) Hierarchical priority queuing is used on the interfaces on which you enable a traffic-shaping queue. Which two
statements about hierarchical priority queuing are true? (Choose two.)
A. Priority packets are never dropped from the shape queue unless the sustained rate of priority traffic exceeds the
shape rate.
B. For IPsec-encrypted packets, you can match traffic based only on the DSCP or precedence setting.
D. For IPsec-encrypted packets, you cannot match traffic based on the DSCP or precedence setting.
Answer: B, C
458) Which two MAC authentication methods are supported on WLCs? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B
459) Client MFP supplements rather than replaces infrastructure MFP. Which three are client MFP components?
(Choose three.)
C. error reports
D. error generation
Answer: A, B, C
460) Which two items are required for LDAP authenticated bind operations? (Choose two.)
A. Root DN
B. Password
C. Username
D. SSO
E. UID
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B
461) Which three authentication types does OSPF support? (Choose three.)
A. Null
B. Plaintext
C. MD5
D. PAP
E. PEAP
F. MS-CHAP
Answer: A, B, C
462) Which three steps are required to rekey the routers on a link without dropping OSPFv3 protocol packets or
disturbing the adjacency? (Choose three.)
A. For every router on the link, create an additional inbound SA for the interface that is being rekeyed using a new
SPI and the new key.
B. For every router on the link, replace the original outbound SA with one that uses the new SPI and key values.
C. For every router on the link, remove the original inbound SA.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. For every router on the link, create an additional outbound SA for the interface that is being rekeyed using a new
SPI and the new key.
E. For every router on the link, replace the original inbound SA with one that uses the new SPI and key values.
F. For every router on the link, remove the original outbound SA.
Answer: A, B, C
463) Which BGP configuration forces the session to tear down when the learned routes from the neighbor exceed
10?
Answer: B
464) Which three RADIUS protocol statements are true? (Choose three.)
C. RADIUS packet types for authentication include Access-Request, Access-Challenge, Access-Accept, and Access-
Reject.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. RADIUS packet types for authentication include Access-Request, Access-Challenge, Access-Permit, and Access-
Denied.
Answer: C, D, F
465) Which three statements are true about TLS? (Choose three.)
C. The identity of a TLS peer can be authenticated using public key or asymmetric cryptography.
Answer: A, C, D
466) Which three features are supported with ESP? (Choose three.)
C. ESP provides confidentiality, data origin authentication, connectionless integrity, and antireplay service.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
F. ESP provides confidentiality, data origin authentication, connection-oriented integrity, and antireplay service.
Answer: A, C, D
467) Which three options correctly describe the AH protocol? (Choose three.)
A. The AH protocol encrypts the entire IP and upper layer protocols for security.
Answer: B, C, E
468) Which two identifiers are used by a Cisco Easy VPN Server to reference the correct group policy information for
connecting a Cisco Easy VPN Client? (Choose two.)
A. IKE ID_KEY_ID
C. XAUTH username
E. IKE ID_IPV4_ADDR
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B
469) Which two security measures are provided when you configure 802.1X on switchports that connect to
corporate-controlled wireless access points? (Choose two.)
D. It ensures that 802.1x requirements for wired PCs can no longer be bypassed by disconnecting the AP and
connecting a PC in its place.
Answer: A, D
470) Which configuration implements an ingress traffic filter on a dual-stack ISR border router to prevent attacks
from the outside to services such as DNSv6 and DHCPv6?
A. !
! output omitted
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. !
! output omitted
C. !
! output omitted
D. !
! output omitted
E. !
! output omitted
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
471) Which protocol does 802.1X use between the supplicant and the authenticator to authenticate users who wish
to access the network?
A. SNMP
B. TACACS+
C. RADIUS
E. PPPoE
Answer: D
472) Which two statements are correct regarding the AES encryption algorithm? (Choose two.)
E. The AES encryption algorithm is based on the presumed difficulty of factoring large integers.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, D
473) What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access IPsec VPNs? (Choose
two.)
D. The IKEv2 SA plus the IPsec SA can be established in six messages instead of nine messages.
Answer: A, B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
475) Which SSL protocol takes an application message to be transmitted, fragments the data into manageable
blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit in a
TCP segment?
Answer: C
476)
Refer to the exhibit. You log the cisco IPS and a warming banner is displayed as shown.What user role is assigned to
the account you used to log in?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : D
477) you have configured an ASA firewall in multiple context mode. If the context are sharing an inteface what are
two of the action you could take to classify packet to the appropriate context? (choose two)
Answer:A,B
478) What context-based Access control(CBAC)Command sets the maximum time that a router running
Cisco IOS will wait for a new TCP session to reach the establish state?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
479)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit R1 and R2 are failing to establish a BGP neighbor relation, What is a possible reason for the
problem?
Answer:A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
480) Which two statement about CBAC are true? (Choose two)
Answer : A , B
481) Which three statements about the keying methods used by MACSec are true? (Choose three.)
A. Key management for host-to-switch and switch-to-switch MACSec sessions is provided by MKA.
Answer: B, C, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
482)Which two statement about source specific multicast are true? (Choose two)
Answer: D,E
483) Which three of these situations warrant engagement of a Security Incident Response team? (Choose three.)
E. pornographic blogs/websites
Answer: A, C, D
484) What are three of the components of the Cisco PCI solution framework (choose three)
A. Infrastructure
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. Risk Assessment
C. Virtualization
D. Endpoint
E. Disaster management
F. Services
Answer: A, D, F
485) Which two of these are valid TACACS+ accounting packets?(Choose two)
Answer : A C
486) What are three Ways you can enforce a BCP 38 policy on an internet edge device? (Choose three)
Answer : C , E , F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
487) Which two statements about CGMP frames are true? (Choose two)
Answer : B, D
488) You are trying to set up a site-to-site IPsec tunnel between two Cisco ASA adaptive security appliances, but you
are not able to pass traffic. You try to troubleshoot the issue by enabling debug crypto isakmp and see the following
messages:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, Tunnel RejecteD. Conflicting protocols specified by tunnel-
group and group-policy
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, QM FSM error (P2 struct &0xb0cf31e8, mess id
0x97d965e5)!
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, Removing peer from correlator table failed, no match!
A. The policy group mapped to the site-to-site tunnel group is configured to use both IPsec and SSL VPN tunnels.
B. The policy group mapped to the site-to-site tunnel group is configured to use both IPsec and L2TP over IPsec
tunnels.
C. The policy group mapped to the site-to-site tunnel group is configured to just use the SSL VPN tunnel.
D. The site-to-site tunnel group is configured to use both IPsec and L2TP over IPsec tunnels.
E. The site-to-site tunnel group is configured to just use the SSL VPN tunnel.
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
489 )
Referring to the partial Cisco IOS router configuration shown in the exhibit which statement is true?
Answer : E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
The above NBAR configuration matches RTP traffic with which payload types
B. 0, 1, 4, 5, 6, 7, 8, 9, 10
C. 0, 1, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 64
Answer: A
491) your network is configured to block outgoing ISAKMP packet, to enable incoming access, you have configured a
users Cisco VPN clients for transparent tunneling using ipsec over TCP on port 445. The user attempts to connect to
the server are failing. what is the most likely reason for this failure?
Answer:D
492)
Refer to the exhibit What are two effect of the given configuration? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : C , F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
493)
Answer : D
494) Which three of the following statement are true about a RADIUS vendor-specific attribute? (Choose
three)
Answer : C , D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
495) Which statement about disabling the SSID broadcast in a WI-FI environment is true?
Answer : C
496)
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
497)
Refer to the exhibit You Issued the Show Crypto isakmpsa command to troubleshoot a connection failure on
an IP sec VPN What possible issue does the given output indicate?
Answer : D
498)
Refer to the Exhibit Client 1 has an IPsec VPN tunnel establish to a cisco ASA adaptive security appliance in Chicago
.the remote access VPN Client wants to access WWW.cisco.com But splits tunneling is disabled Which of these is the
appropriate configuration on the cisco ASA adaptive security appliance is theVPN clients public IP address is
209.165.201.10 and it is assigned a private address from 192.168.1.0/24?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
499)
Refer to the exhibit, what type of packet can trigger the rate limiter in the given configuration?
Answer : A
500) When a Cisco ASA is configured for stateful failover, which information is replicated by default on the
stateful failover link? Drag and drop the state information item on the left into the corresponding category
on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
501) Drag each neighbor-discover vulnerability on the left to the send mechanism that counters it on the right?
Answer :
Duplicate address detection DoS attack: RSA signature and proof of authorization in neighbor advertisement
message.
Neighbor solicitation and advertisement spoofing: RSA signature and CGA options in neighbor
Neighbor unreachability detection failure:Proof of authorization when a node responds to a neighbor solicitation.
502) Which feature of WEP was intended to prevent and attacker from altering and resending data packet
over a WEP connection?
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
503) Which two statement about CoPP are true? (Choose two)
Answer : B, F
504) which three statement about NetFlow v9 packet are true? (Choose three)
Answer : A , B , C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
505) IPsec SAs can be applied as a security mechanism for which three options? (Choose three.)
A. Send
B. Mobile IPv6
D. OSPFv3
E. CAPWAP
F. LWAPP
Answer: B, C, D
506) Which four options are valid EAP mechanisms to be used with WPA2? (Choose four.)
A. PEAP
B. EAP-TLS
C. EAP-FAST
D. EAP-TTLS
E. EAPOL
F. EAP-RADIUS
G. EAP-MD5
Answer: A, B, C, D
507) Which three statements are true about the SSH protocol? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. SSH protocol provides for secure remote login and other secure network services over an insecure network.
E. SSH transport protocol provides for authentication, key exchange, confidentiality, and integrity.
F. SSH authentication protocol supports public key, password, host based, or none as authentication methods.
Answer: B, E, F
508) Which two statements are true when comparing ESMTP and SMTP? (Choose two.)
B. A mail sender identifies itself as only able to support SMTP by issuing an EHLO command to the mail server.
C. ESMTP mail servers will respond to an EHLO with a list of the additional extensions they support.
D. SMTP commands must be in upper case, whereas ESMTP can be either lower or upper case.
E. ESMTP servers can identify the maximum email size they can receive by using the SIZE command.
Answer: C, E
509) How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. The client cannot request its last IP address; it is assigned automatically by the server.
Answer: B
510) Which two statements about an authoritative server in a DNS system are true? (Choose two.)
Answer: A, E
511) Which three security features were introduced with the SNMPv3 protocol? (Choose three.)
A. Message integrity, which ensures that a packet has not been tampered with in-transit
B. DoS prevention, which ensures that the device cannot be impacted by SNMP buffer overflow
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. Authorization, which allows access to certain data sections for certain authorized users
Answer: A, C, F
512) Which common Microsoft protocol allows Microsoft machine administration and operates over TCP port 3389?
B. desktop mirroring
C. desktop shadowing
Answer: A
D. The international standards for evaluating trust in information systems and products
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
514) Which three types of information could be used during the incident response investigation phase? (Choose
three.)
A. netflow data
B. SNMP alerts
C. encryption policy
D. syslog output
E. IT compliance reports
Answer: A, B, D
515) Which protocol can be used to encrypt traffic sent over a GRE tunnel?
A. SSL
B. SSH
C. IPsec
D. DH
E. TLS
Answer: C
516) When you compare WEP to WPA (not WPA2), which three protections are gained? (Choose three.)
B. AES-based encryption
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. a rekeying mechanism
Answer: A, C, E
517) Which two statements about SHA are correct? (Choose two.)
A. Five 32-bit variables are applied to the message to produce the 160-bit hash.
Answer: A, C
518) Which three statements about IKEv2 are correct? (Choose three.)
D. Rekeying IKE and child SAs is facilitated by the IKEv2 CREATE_CHILD_SA exchange.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
F. Attribute policy push (via the configuration payload) is only supported in REQUEST/REPLY mode.
Answer: A, C, D
519) Which three statements about LDAP are true? (Choose three.)
Answer: B, C, D
D. DTLS is designed to prevent man-in-the-middle attacks, message tampering, and message forgery.
E. DTLS is used by application layer protocols that use UDP as a transport mechanism.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C, D, E
F. The TFTP protocol is implemented by a wide variety of operating systems and network devices.
Answer: D
522) Which three new capabilities were added to HTTP v1.1 over HTTP v1.0? (Choose three.)
B. HTTP pipelining
C. POST method
D. HTTP cookies
E. keepalive mechanism
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B, E
523)
Refer to the exhibit, which shows a partial output of the show command.
C. The config has not been properly updated for context vpn1.
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
524) Which four protocols are supported by Cisco IOS Management Plane Protection? (Choose four.)
Answer: A, B, E, F
525) Which three statements about OCSP are correct? (Choose three.)
C. OCSP responders can use RSA and DSA signatures to validate that responses are from trusted entities.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, C, D
A. stateful autoconfiguration
B. stateless autoconfiguration
Answer: A
527) Which two options represent definitions that are found in the syslog protocol (RFC 5426)? (Choose two.)
E. Syslog servers must use NTP for the accurate time stamping of message arrival.
Answer: B, C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. DES
B. RSA
C. RC4
D. MD5
Answer: A
Answer: A
530) Which IPsec protocol provides data integrity but no data encryption?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. AH
B. ESP
C. SPI
D. DH
Answer: A
531) What transport protocol and port are used by GDOI for its IKE sessions that are established between the group
members and the key server?
C. ESP port 51
Answer: A
532) What is the advantage of using the ESP protocol over the AH?
A. data confidentiality
C. nonrepudiation
D. anti-replay protection
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
533) Which three statements about the TACACS protocol are correct? (Choose three.)
D. TACACS+ can support authorization and accounting while having another separate authentication solution.
Answer: C, D, F
Answer: A
A. EAPOL frames
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. 802.3 frames
D. PPPoE frames
Answer: A
A. RC4
B. RC5
C. DES
D. AES
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
A. to extend a TrustSec domain on switches that do not support packet tagging with SGTs
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
540) Which statement describes the computed authentication data in the AH protocol?
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: E
542) Which three fields are part of the AH header? (Choose three.)
A. Source Address
B. Destination Address
C. Packet ICV
D. Protocol ID
E. Application Port
F. SPI identifying SA
Answer: C, F, G
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. The success and error codes are returned in the response message by the user-agent.
Answer: C
B. The POP protocol is used by the SMTP client to manage stored mail.
C. The IMAP protocol is used by the SMTP client to retrieve and manage stored email.
D. The mail delivery agent in the SMTP architecture is responsible for DNS lookup.
Answer: C
Explanation: Internet Message Access Protocol (IMAP) is a protocol for e-mail retrieval and storage developed by
Mark Crispin in 1986 at Stanford University as an alternative to POP. IMAP, unlike POP, specifically allows multiple
clients simultaneously connected to the same mailbox, and through flags stored on the server, different clients
accessing the same mailbox at the same or different times can detect state changes made by other clients.
Ref: http://en.wikipedia.org/wiki/Internet_Message_Access_Protocol
545) Which two statements about DHCP are true? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, E
546) Which three statements describe the security weaknesses of WEP? (Choose three.)
B. The WEP ICV algorithm is not optimal for cryptographic integrity checking.
Answer: A, B, C
547) When implementing WLAN security, what are three benefits of using the TKIP instead of WEP? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C, D, F
548) Which option explains the passive scan technique that is used by wireless clients to discover available wireless
networks?
A. listening for access point beacons that contain available wireless networks
D. listening for access point probe response frames that contain available wireless networks
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which message could contain an authenticated initial_contact notify during IKE main mode negotiation?
A. message 3
B. message 5
C. message 1
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Because of a "root delay" of 0ms, this router is probably receiving its time directly from a Stratum 0 or 1 GPS
reference clock.
B. This router has correctly synchronized its clock to its NTP master.
C. The NTP server is running authentication and should be trusted as a valid time source.
D. Specific local time zones have not been configured on this router.
E. This router will not act as an NTP server for requests from other devices.
Answer: B, C, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. HTTP traffic to the Facebook, Youtube, and Twitter websites will be dropped.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
Explanation:
As we know to block websites we need to configure the command under class-map type option
Match regex domainlist &order(1 or 2 or).So facebook & twitter are blocked here.
552) Which Cisco ASA feature can be used to update non-compliant antivirus/antispyware definition files on an
AnyConnect client?
B. dynamic access policies with Host Scan and advanced endpoint assessment
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. main mode 1
B. main mode 3
C. aggressive mode 1
D. main mode 5
E. aggressive mode 2
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which statement about this Cisco Catalyst switch 802.1X configuration is true?
A. If an IP phone behind the switch port has an 802.1X supplicant, MAC address bypass will still be used to
authenticate the IP Phone.
B. If an IP phone behind the switch port has an 802.1X supplicant, 802.1X authentication will be used to authenticate
the IP phone.
C. The authentication host-mode multi-domain command enables the PC connected behind the IP phone to bypass
802.1X authentication.
D. Using the authentication host-mode multi-domain command will allow up to eight PCs connected behind the IP
phone via a hub to be individually authentication using 802.1X.
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
555) The ASA can be configured to drop IPv6 headers with routing-type 0 using the MPF. Choose the correct
configuration.
drop log
drop log
drop log
match routing-header 0
drop log
drop log
drop log
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
With the client protected by the firewall, an HTTP connection from the client to the server on TCP port 80 will be
subject to which action?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. The config has not been properly updated for context vpn1.
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which two statements about this Cisco Catalyst switch configuration are correct? (Choose two.)
A. The default gateway for VLAN 200 should be attached to the FastEthernet 5/1 interface.
B. Hosts attached to the FastEthernet 5/1 interface can communicate only with hosts attached to the FastEthernet
5/4 interface.
C. Hosts attached to the FastEthernet 5/2 interface can communicate with hosts attached to the FastEthernet 5/3
interface.
D. Hosts attached to the FastEthernet 5/4 interface can communicate only with hosts attached to the FastEthernet
5/2 and FastEthernet 5/3 interfaces.
Answer: B, C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
559) Which additional configuration component is required to implement a MACSec Key Agreement policy on user-
facing Cisco Catalyst switch ports?
A. PKI
B. TACACS+
D. port security
E. 802.1x
Answer: E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
561) When configuring an Infrastructure ACL (iACL) to protect the IPv6 infrastructure of an enterprise network,
where should the iACL be applied??
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: E
562) What feature on the Cisco ASA is used to check for the presence of an up-to-date antivirus vendor on an
AnyConnect client?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
563) Which statement is true regarding Cisco ASA operations using software versions 8.3 and later?
A. The global access list is matched first before the interface access lists.
B. Both the interface and global access lists can be applied in the input or output direction.
C. When creating an access list entry using the Cisco ASDM Add Access Rule window, choosing "global" as the
interface will apply the access list entry globally.
E. The static CLI command is used to configure static NAT translation rules.
Answer: C
564) Which statement regarding the routing functions of the Cisco ASA is true?
A. The translation table can override the routing table for new connections.
C. In a failover pair of ASAs, the standby firewall establishes a peer relationship with OSPF neighbors.
Answer: A
565) Which three statements about remotely triggered black hole filtering are true? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B) ICMP unreachable message must not be disable on all edge PE router peered with the trigger router
D) Three key components of an RTBH filtering solution are: uRPF, iBGP and a null0 interface
Answer :B,D,E
Answer : B
566) What context-based access control (CBAC)command sets the maximum time that a router running Cisco IOS
Will wait for a new TCP session to reach the established state?
A) IP inspect max-incomplete
Answer :D
567) Which three statements are true about Cryptographically Generated Addresses for IPv6? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. They are derived by generating a random 128-bit IPv6 address based on the public key of the node.
Answer: A, C, F
A. The backup timestamps the files with the date and time during copy operations.
C. The backup includes areas that are used for the data store.
Answer: B
569) In RFC 4034, DNSSEC introduced which four new resource record types? (Choose four.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B, C, D
570) Using Cisco IOS, which two object-group options will permit networks 10.1.1.0/24 and 10.1.2.0/24 to host
192.168.5.1 port 80 and 443? (Choose 2.)
host 192.168.5.1
tcp eq www
tcp eq 443
10.1.1.0 0.0.0.255
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
10.1.2.0 0.0.0.255
host 192.168.5.1
tcp eq www
tcp eq 443
10.1.1.0 255.255.255.0
10.1.2.0 255.255.255.0
host 192.168.5.1
tcp eq www
tcp eq 443
10.1.1.0 255.255.255.0
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
10.1.2.0 255.255.255.0
host 192.168.5.1
tcp eq www
tcp eq 443
Answer: A, D
571) You run the show ipv6 port-map telnet command and you see that the port 23 (system-defined) message and
the port 223 (user-defined) message are displayed. Which command is in the router configuration?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
572) Which three basic security measures are used to harden MSDP? (Choose three.)
A. MSDP SA filters
Answer: A, B, C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
574) Which two statements about IPv6 path MTU discovery are true? Choose 2
A. If the destination host receives on ICMPv6 packet too big message from router, it reduces its path MTU
B. It can allow fragmentation when the minimum MTU is below a configured value
C. The discovery packets are dropped if there is congestion on the link
D. If the source host receives an ICMPv6 packet too big message from a router, it reduces its path MTU
E. During the discovery process, the DF bit is set to 1
F. The initial path MTU is the same as the MTU of the original nodes link layer interface
Answer:D F
575)Which four statements about SeND for IPv6 are correct? (Choose four.)
B. NDP exchanges are protected by IPsec SAs and provide for anti-replay.
F. Neighbor identity protection is provided by Cryptographically Generated Addresses that are derived from a Diffie-
Hellman key exchange.
G. It is facilitated by the Certification Path Request and Certification Path Response ND messages.
Answer: A, C, D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
576) Which three routing characteristics are relevant for DMVPN Phase 3? (Choose three.)
F. Hubs are routing neighbors with other hubs and must use the same routing protocol as that used on hub-spoke
tunnels.
Answer: A, C, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Source Loopback0
D. Next-hop address
Answer: A
578) Which three nonproprietary EAP methods do not require the use of a client-side certificate for mutual
authentication? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. LEAP
B. EAP-TLS
C. PEAP
D. EAP-TTLS
E. EAP-FAST
Answer: C, D, E
579) Which of the following two options can you configure to avoid iBGP full mesh? (Choose two.)
A. Route reflectors
B. Confederations
C. BGP NHT
D. Local preference
E. Virtual peering
Answer: A, B
580) Which two address translation types can map a group of private addresses to a smaller group of public
addresses? (Choose two.)
A. static NAT
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. dynamic NAT
D. PAT
E. VAT
Answer: C, D
581) As defined by Cisco TrustSec, which EAP method is used for Network Device Admission Control authentication?
A. EAP-FAST
B. EAP-TLS
C. PEAP
D. LEAP
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
582) Which three configuration tasks are required for VPN clustering of AnyConnect clients that are connecting to an
FQDN on the Cisco ASA?? (Choose three.)
A. The redirect-fqdn command must be entered under the vpn load-balancing sub-configuration.
B. Each ASA in the VPN cluster must be able to resolve the IP of all DNS hostnames that are used in the cluster.
C. The identification and CA certificates for the master FQDN hostname must be imported into each VPN cluster-
member device?.
D. The remote-access IP pools must be configured the same on each VPN cluster-member interface.
Answer: A, B, C
Explanation: Please refer to the link to understand the working of Anyconnect in load balancing cluster.
Reference: https://supportforums.cisco.com/document/29886/asa-vpn-load-balancingclustering-digital-certificates-
deployment-guide
583) Which three statements are true about objects and object groups on a Cisco ASA appliance that is running
Software Version 8.4 or later? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. TCP, UDP, ICMP, and ICMPv6 are supported service object protocol types.
Answer: A, C, E
584) Which command is used to replicate HTTP connections from the Active to the Standby Cisco ASA appliance in
failover?
A. monitor-interface http
D. interface fover
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
drop
class-map outside-class
match any
policy-map outside-policy
class outside-class
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Given the Cisco ASA configuration above, which commands need to be added in order for the Cisco ASA appliance to
deny all IPv6 packets with more than three extension headers?
count> 3
B. policy-map outside-policy
class outside-class
C. class-map outside-class
drop
Answer: D
586) Which C3PL configuration component is used to tune the inspection timers such as setting the tcp idle-time and
tcp synwait-time on the Cisco ZBFW?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
587) Which three NAT types support bidirectional traffic initiation? (Choose three.)
A. static NAT
B. NAT exemption
D. static PAT
E. identity NAT
Answer: A, B, D
588) Which IPS module can be installed on the Cisco ASA 5520 appliance?
A. IPS-AIM
B. AIP-SSM
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. AIP-SSC
D. NME-IPS-K9
E. IDSM-2
Answer: B
589) Which two options best describe the authorization process as it relates to network access? (Choose two.)
A. the process of identifying the validity of a certificate, and validating specific fields in the certificate against an
identity store
C. applying enforcement controls, such as downloadable ACLs and VLAN assignment, to the network access session
of a user
Answer: B, C
590) If ISE is not Layer 2 adjacent to the Wireless LAN Controller, which two options should be configured on the
Wireless LAN Controller to profile wireless endpoints accurately? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, E
On R1, encrypt counters are incrementing. On R2, packets are decrypted, but the encrypt counter is not being
incremented. What is the most likely cause of this issue?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. a routing problem on R1
B. a routing problem on R2
Answer: B
592) Which two methods are used for forwarding traffic to the Cisco ScanSafe Web Security service? (Choose two.)
A. Cisco AnyConnect VPN Client with Web Security and ScanSafe subscription
C. Cisco ASA adaptive security appliance using DNAT policies to forward traffic to ScanSafe subscription servers
Answer: B, C
593) What is the recommended network MACSec policy mode for high security deployments?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. should-secure
B. must-not-secure
C. must-secure
D. monitor-only
E. high-impact
Answer: C
594) Which PKCS is invoked during IKE MM5 and MM6 when digital certificates are used as the authentication
method?
A. PKCS#7
B. PKCS#10
C. PKCS#13
D. PKCS#11
E. PKCS#3
Answer: A
595) User A at Company A is trying to transfer files to Company B, using FTP. User A can connect to the FTP server at
Company B correctly, but User A cannot get a directory listing or upload files. The session hangs.
What are two possible causes for this problem? (Choose two.)
A. Active FTP is being used, and the firewall at Company A is not allowing the returning data connection to be
initiated from the FTP server at Company B.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. Passive FTP is being used, and the firewall at Company A is not allowing the returning data connection to be
initiated from the FTP server at Company B.
C. At Company A, active FTP is being used with a non-application aware firewall applying NAT to the source address
of User A only.
D. The FTP server administrator at Company B has disallowed User A from accessing files on that server.
E. Passive FTP is being used, and the firewall at Company B is not allowing connections through to port 20 on the FTP
server.
Answer: A, C
596) Which four IPv6 messages should be allowed to transit a transparent firewall? (Choose four.)
Answer: C, D, E, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. main mode 1
B. main mode 3
C. aggressive mode 1
D. main mode 5
E. aggressive mode 2
Answer: B
598) Which two ISE Probes would be required to distinguish accurately the difference between an iPad and a
MacBook Pro? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. DHCP or DHCPSPAN
B. SNMPTRAP
C. SNMPQUERY
D. NESSUS
E. HTTP
F. DHCP TRAP
Answer: A, E
599) An internal DNS server requires a NAT on a Cisco IOS router that is dual-homed to separate ISPs using distinct
CIDR blocks. Which NAT capability is required to allow hosts in each CIDR block to contact the DNS server via one
translated address?
A. NAT overload
B. NAT extendable
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which three command sets are required to complete this IPv6 IPsec site-to-site VTI? (Choose three.)
A. interface Tunnel0
B. crypto isakmp-profile
C. interface Tunnel0
ipv6 enable
D. ipv6 unicast-routing
E. interface Tunnel0
ipv6 enable-ipsec
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, C, D
Which option correctly identifies the point on the exhibit where Control Plane Policing (input) is applied to incoming
packets?
A. point 6
B. point 7
C. point 4
D. point 1
E. points 5 and 6
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
602) Management Frame Protection is available in two deployment modes, Infrastructure and Client. Which three
statements describe the differences between these modes? (Choose three.)
Answer: A, B, D
603) The address of an inside client is translated from a private address to a public address by a NAT router for
access to an outside web server. What term describes the destination address (client) after the outside web server
responds, and before it hits the NAT router?
A. inside local
B. inside global
C. outside local
D. outside global
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
604) After a client discovers a supportable wireless network, what is the correct sequence of operations that the
client will take to join it?
Answer: B
605) In HTTPS session establishment, what does the server hello message inform the client?
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Every 1800 seconds the secondary name server will query the SOA record of the primary name server for updates.
B. If the secondary name server has an SOA record with the serial number of 10973815, it will initiate a zone transfer
on the next cycle.
C. Other DNS servers will cache records from this domain for 864000 seconds (10 days) before requesting them
again.
E. Both primary and secondary name servers will clear (refresh) their caches every 7200 seconds to ensure that up-
to-date information is always in use.
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
607) According to RFC 4890, which four ICMPv6 types are recommended to be allowed to transit a firewall? (Choose
four.)
Answer: A, B, C, F
608) Which action is performed first on the Cisco ASA appliance when it receives an incoming packet on its outside
interface?
A. check if the packet is permitted or denied by the inbound ACL applied to the outside interface
F. check if the packet needs to be passed to the Cisco ASA AIP-SSM for inspections
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
Which three statements about the Cisco ASDM screen seen in the exhibit are true? (Choose three.)
A. This access rule is applied to all the ASA interfaces in the inbound direction.
B. The ASA administrator needs to expand the More Options tag to configure the inbound or outbound direction of
the access rule.
C. The ASA administrator needs to expand the More Options tag to apply the access rule to an interface.
D. The resulting ASA CLI command from this ASDM configuration is access-list global_access line 1 extended permit
ip host 1.1.1.1 host 2.2.2.1.
E. This access rule is valid only on the ASA appliance that is running software release 8.3 or later.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, D, E
610) If an incoming packet from the outside interface does not match an existing connection in the connection table,
which action will the Cisco ASA appliance perform next?
B. check the outside interface inbound ACL to determine if the packet is permitted or denied
D. check the MPF policy to determine if the packet should be passed to the SSM
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Choose the correct description of the implementation that produced this output on the Cisco ASA appliance.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
612) Which command is required in order for the Botnet Traffic Filter on the Cisco ASA appliance to function
properly?
B. dynamic-filter whitelist
C. inspect botnet
Answer: D
613) Which four configuration steps are required to implement a zone-based policy firewall configuration on a Cisco
IOS router? (Choose four.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, D, F, G
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
The client is protected by a firewall. An IPv6 SMTP connection from the client to the server on TCP port 25 will be
subject to which action?
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
615) Which Cisco IPS appliance signature engine defines events that occur in a related manner, within a sliding time
interval, as components of a combined signature?
A. Service engine
B. Sweep engine
C. Multistring engine
D. Meta engine
Answer: D
What is the cause of the issue that is reported in this debug output?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
which shows a partial configuration for the EzVPN server. Which three missing ISAKMP profile options are required
to support EzVPN using DVTI? (Choose three.)
B. trustpoint
C. virtual-interface
D. keyring
E. enable udp-encapsulation
G. virtual-template
Answer: A, F, G
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
618) In order to implement CGA on a Cisco IOS router for SeND, which three configuration steps are required?
(Choose three.)
Answer: A, D, E
619) When you are configuring the COOP feature for GETVPN redundancy, which two steps are required to ensure
the proper COOP operations between the key servers? (Choose two.)
A. Generate an exportable RSA key pair on the primary key server and export it to the secondary key server.
B. Enable dead peer detection between the primary and secondary key servers.
E. Enable NTP on both the primary and secondary key servers to ensure that they are synchronized to the same
clock source.
Answer: A, B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
620) During the establishment of an Easy VPN tunnel, when is XAUTH performed?
C. at the end of Phase 1 and before Phase 2 starts in IKEv1 and IKEv2
Answer: D
A customer has an IPsec tunnel that is configured between two remote offices. The customer is seeing these syslog
messages on Router B:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The customer has an LLQ QoS policy that is configured on the WAN interface of Router A.
E. Router A and Router B are not synchronized to the same timer source.
Answer: A
622) Which four types of VPN natively provide encryption of user traffic? (Choose four.)
A. MPLS
B. IPsec
C. L2TPv3
D. SSL
E. VPLS
F. AToM
G. GETVPN
H. Microsoft PPTP
Answer: B, D, G, H
623) Which three options are components of Mobile IPv6? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. home agent
B. correspondent node
C. mobile node
D. binding node
E. discovery probe
Answer: A, B, C
A. Data encryption
D. Message hashing
Answer: A, B
625) What is needed to verify a digital signature that was created using an RSA algorithm?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. public key
B. private key
Answer: A
A. Diffie-Hellman
D. Rivest Cipher 4
Answer: A
Answer: A
628) Which statement is true about IKEv2 preshared key authentication between two peers?
A. IKEv2 allows usage of different preshared keys for local and remote authentication.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. IKEv2 allows usage of only one preshared key and only in hub-and-spoke topology.
Answer: A
629) How does 3DES use the DES algorithm to encrypt a message?
A. encrypts a message with K1, decrypts the output with K2, then encrypts it with K3
B. encrypts a message with K1, encrypts the output with K2, then encrypts it with K3
C. encrypts K1 using K2, then encrypts it using K3, then encrypts a message using the output key
D. encrypts a message with K1, encrypts the output with the K2, then decrypts it with K3
Answer: A
630) Which three statements about IKEv2 are correct? (Choose three.)
D. Rekeying IKE and child SAs is facilitated by the IKEv2 CREATE_CHILD_SA exchange.
F. Attribute policy push (via the configuration payload) is only supported in REQUEST/REPLY mode.
Answer: A, C, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. the key server and the peer that is indicated by the key server
Answer: A
Answer: A
Explanation: DTLS is commonly used for delay-sensitive applications(voice & video).The greatest benefit that DTLS
can provide for standard TLS when operating delay-sensitive applications is the use of UDP, which allows for faster
transmission of application data without the additional overhead of TCP.DTLS was actually invented to achieve a
good user experience for delay-sensitive applications that natively user UDP, once DTLS is enabled & negotiated ,all
applications are actually tunneled over the DTLS VPN session.
633) What mechanism does SSL use to provide confidentiality of user data?
A. symmetric encryption
B. asymmetric encryption
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. Diffie-Hellman exchange
Answer: A
B. It is a proprietary protocol.
Answer: A
635) Which four attributes are identified in an X.509v3 basic certificate field? (Choose four.)
A. key usage
C. issuer
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. subject name
Answer: B, C, D, E
636) What are two reasons for a certificate to appear in a CRL? (Choose two.)
A. CA key compromise
B. cessation of operation
C. validity expiration
Answer: A, B
637) A Cisco Easy VPN software client is unable to access its local LAN devices once the VPN tunnel is established.
How can this issue be resolved?
A. The IP address that is assigned by the Cisco Easy VPN Server to the client must be on the same network as the
local LAN of the client.
B. The Cisco Easy VPN Server should apply split-tunnel-policy excludespecified with a split-tunnel-list containing the
local LAN addresses that are relevant to the client.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. The Cisco Easy VPN Server must push down an interface ACL that permits the traffic to the local LAN from the
client.
D. The Cisco Easy VPN Server should apply a split-tunnel-policy tunnelall policy to the client.
E. The Cisco Easy VPN client machine needs to have multiple NICs to support this.
Answer: B
Above error is received when generating RSA keys for SSH access on a router using the crypto key generate rsa
command. What are the reasons for this error? (Choose two.)
B. The image that is used on the router does not support the crypto key generate rsa command.
D. The crypto key generate rsa command is used to configure SSHv2, which is not supported on Cisco IOS devices.
Answer: B, C
Explanation: The error message is received when the router image is not a k9 image to support the security features.
Also, we can get this error message if the correct syntax is not used while generating key pairs.
vrf vpn1
keyring vpn1
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
interface Ethernet1/2
A. This configuration shows the VRF-Aware IPsec feature that is used to map the crypto ISAKMP profile to a specific
VRF.
B. VRF and ISAKMP profiles are mutually exclusive, so the configuration is invalid.
D. Peer command under the crypto map is redundant and not required.
Answer: A, C
640) MACsec, which is defined in 802.1AE, provides MAC-layer encryption over wired networks. Which two
statements about MACsec are true? (Choose two.)
A. Only links between network access devices and endpoint devices can be secured by using MACsec.
C. MACsec manages the encryption keys that the MKA protocol uses.
D. A switch that uses MACsec accepts either MACsec or non-MACsec frames, depending on the policy that is
associated with the client.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, D
641) Which two statements about OSPF authentication are true? (Choose two.)
Answer: B, F
A. to authenticate peers
C. to provide redundancy
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. The BGP TTL security check protects against CPU utilization-based attacks.
C. The BGP TTL security check checks for a TTL value in packet header of less than or equal to for successful peering.
E. The BGP TTL security check protects against routing table corruption.
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. An Initial warning message is displayed when 800 prefixes are received. A different message is displayed when
1000 prefixes received and the session will not be disconnected
E. An Initial warning message is displayed when 80 prefixes received. The same warning message is displayed when
1000 prefixes are received and the session will be disconnected.
Answer: D
F. The GRE tunnel interface remains down until it can see the remote tunnel end.
Answer: B, D
646) Which two statements about NHRP are true? (Choose two.)
B. NHRP allows NHC to dynamically learn the mapping of VPN IP to NBMA IP.
C. NHRP allows NHS to dynamically learn the mapping of VPN IP to BMA IP.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, D
A. Devices that perform IEEE 802.1X should be in the MAC address database for successful authentication.
B. IEEE 802.1x devices must fail MAB to perform IEEE 802.1X authentication.
C. If 802.1X fails, the device will be assigned to the default guest VLAN.
D. The device will perform subsequent IEEE 802.1X authentication if it passed MAB authentication.
Answer: B
B. when the authenticator is missing the dot1x guest VLAN under the port with which the supplicant is connected.
C. when the supplicant fails EAP-MD5 challenge with the authentication server.
D. when the supplicant fails to respond to EAPOL messages from the authenticator.
E. when the authenticator is missing the reauthentication timeout configuration under the port with which the
supplicant is connected.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
A. If the default route is not present, then the routing table is checked.
B. If the routing table has two matching entries, the packet is dropped.
C. If routing table has two matching entries with same prefix length, the first entry is used.
D. If routing table has two matching entries with different prefix lengths, the entry with the longer prefix length is
used.
Answer: D
A. It is a logical interface that combines two physical interfaces, both of which are active.
C. By default, the first physical interface that is configured in the pair is the active interface.
D. The redundant interface uses the MAC address of the second physical interface in the pair.
Answer: C
651) Which two pieces of information are communicated by the ASA failover link? (Choose two.)
A. unit state
B. connections State
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. routing tables
D. power status
Answer: A, E
652) When is a connection entry created on ASA for a packet that is received on the ingress interface?
Answer: D
653) Which two statements about the multiple context mode running Version 9.x are true? (Choose two.)
E. OSPFv3 is supported.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, G
654) Which two options describe how the traffic for the shared interface is classified in ASA multi context mode?
(Choose two.)
D. Traffic is classified by copying and sending the packet to all the contexts.
E. Traffic is classified by sending the MAC address for the shared interface.
Answer: C, E
655) Which two statements correctly describes ASA resource management in multiple context mode? (Choose two.)
A. The class sets the resource maximum limit for a context to which it belongs.
C. The resource limit can only be set as a percentage in the class and not as an absolute value.
E. The default class provides unlimited access for all the resources.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, D
656)Which two statements about ASA transparent mode are true? (Choose two.)
E. A configured route applies only to the traffic that is originated by the ASA.
Answer: C, E
A. Unlisted addresses: The addresses are malware addresses that are not identified by the dynamic database and
are hence defined statically.
B. Ambiguous addresses: In this case, the same domain name has multiple malware addresses but not all the
addresses are in the dynamic database. These addresses are on the graylist.
C. Known malware addresses: These addresses are identified as blacklist addresses in the dynamic database and
static list.
D. Known allowed addresses: These addresses are identified as whitelist addresses that are bad addresses but still
allowed.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Why does the EasyVPN session fail to establish between the client and server?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
What is the reason for the failure of the DMVPN session between R1 and R2?
Answer: E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
What is the reason for the failure of the DMVPN session between R1 and R2?
Answer: C
Explanation: There is Phase 1 policy mismatch. Under the crypto isakmp policy 1, on one side it is group 3 and on
another side it is group 2.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The tunnel configuration is incomplete and the DMVPN session will fail between R1 and R2.
C. A DMVPN session will establish between R1 and R2 provided that the BGP and EIGRP configurations are correct.
D. A DMVPN session will establish between R1 and R2 provided that the BGP configuration is correct.
E. A DMVPN session will fail to establish because R2 is missing the ISAKMP peer address.
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The ACL will drop both initial and noninitial fragments for port 80 only.
B. The ACL will pass both initial and noninitial fragments for port 80 only.
C. The ACL will pass the initial fragment for port 80 but drop the noninitial fragment for any port.
D. The ACL will drop the initial fragment for port 80 but pass the noninitial fragment for any port.
Answer: C
Explanation: The first packet will be permitted but the other packets will be dropped because of the top most
access-list that has an action of denying the traffic.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The ACL will drop both initial and noninitial fragments for port 80 only.
B. The ACL will pass both initial and non-initial fragments for port 80 only.
C. The ACL will pass the initial fragment for port 80 but drop the noninitial fragment for any port.
D. The ACL will drop the initial fragment for port 80 but pass the noninitial fragment for any port.
Answer: B
A. The dynamic ARP inspection feature must be enabled for DHCP snooping to work.
C. DHCP snooping builds a binding database using information that is extracted from intercepted ARP requests.
E. DHCP snooping is does not rate-limit DHCP traffic from trusted ports.
Answer: B
665) Which two statements about PCI DSS are true? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. PCI DSS is a proprietary security standard that defines a framework for credit, debit, and ATM cardholder
information.
D. One of the PCI DSS objectives is to restrict physical access to credit, debit, and ATM cardholder information.
E. PCI DSS is an IETF standard for companies to protect credit, debit, and ATM cardholder information.
Answer: B, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Why does the EasyVPN session fail to establish between the client and server?
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Why does the EasyVPN session fail to establish between the client and server?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
Explanation: Under the isakmp configuration on the server, this command is missing:
If this command is not applied then the client will not be able to obtain the ip address from the ip pool defined on
the server.
Which two items are not encrypted by ESP in tunnel mode? (Choose two)
A. ESP header
B. ESP trailer
C. Original IP header
D. Data
E. TCP-UDP header
F. Authentication Data
Answer: A, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
670) Which three statements about the RSA algorithm are true to provide data confidentiality? (Choose three.)
C. The RSA algorithm creates a pair of public-private keys and the public key is shared to perform encryption.
E. The public key is used to decrypt the message that was encrypted by the private key.
F. The private key is used to decrypt the message that was encrypted by the public key.
Answer: C, D, F
671) Which two statements correctly describe ASA resource management in multiple context mode? (Choose two.)
A. The class sets the resource maximum limit for a context to which it belongs.
C. The resource limit can only be set as a percentage in the class and not as an absolute value.
E. The default class provides unlimited access for all the resources.
Answer: A, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. InterfaceApp
B. MainApp
C. SensorApp
D. NotificationApp
E. AuthenticationApp
F. SensorDefinition
Answer: C
673) For what reason is BVI required in the Transparent Cisco IOS Firewall?
C. BVI is required if more than two interfaces are in the same bridge group.
Answer: C
674) Depending on configuration, which of the following two behaviors can the ASA classifier exhibit when receiving
unicast traffic on an interface shared by multiple contexts? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. Traffic is classified using the destination address of the packet using the connection table.
B. Traffic is classified using the destination address of the packet using the NAT table.
C. Traffic is classified using the destination address of the packet using the routing table.
D. Traffic is classified by copying and sending the packet to all the contexts.
Answer: B, E
675) Which Cisco IPS appliance signature engine inspects IPv6 Layer 3 traffic?
A. Atomic IP
B. Meta
C. Atomic IP Advanced
D. Fixed
E. Service
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
677) In Cisco IOS firewall the HTTP inspection engine has the ability to protect against which of the following?
Answer: B
678) Which two statements about the storm control implementation on the switch are true? (Choose two.)
A. Traffic storm level is the percentage of total available bandwidth of the port.
B. Traffic storm level is the rate at which layer 3 traffic is received on the port.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. Traffic storm control monitors the broadcast, multicast, and unicast traffic.
E. Traffic storm level is the rate at which layer 2 traffic is received on the port.
F. A Lower storm control level means more traffic is allowed to pass through.
Answer: A, D
679) Which three types of traffic are generally policed via CoPP policies? (Choose three.)
A. Transit traffic
C. IPsec traffic
Answer: B, D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which option describes the behavior of the ACL if it is applied inbound on E0/0?
A. The ACL will drop both initial and noninitial fragments for port 80 only.
B. The ACL will pass both initial fragments for port 80 and non-initial fragments.
C. The ACL will pass the initial fragment for port 80 but drop the noninitial fragment for any port.
D. The ACL will drop the initial fragment for port 80 but pass the noninitial fragment for any port.
Answer: B
Which AS-PATH access-list regular expression should be applied on R2 to allow only updates that originate from AS-
65001 or an AS that attaches directly to AS-65001?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. ^65001_[0-9]*$
B. _65001^[0-9]*
C. 65001_[0.9]$
D. ^65001_*$
Answer: A
B. Enables the switch to automatically authorize the connecting device if all the configured RADIUS servers are
unavailable
Answer: A
683) On Cisco routers, there are two mutually exclusive types of RSA key pairs: special-usage keys and general-
purpose keys. When you generate RSA key pairs, you are prompted to select either special-usage keys or general-
purpose keys. Which set of statements is true?
A. If you generate special-usage keys, two pairs of RSA keys are generated. One pair is used with any IKE policy that
specifies RSA signatures as the authentication method. The other pair is used with any IKE policy that specifies RSA
encrypted keys as the authentication method.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. If you generate a named key pair, only one pair of RSA keys is generated. This pair is used with IKE policies that
specify either RSA signatures or RSA encrypted keys. Therefore, a general-purpose key pair might be used more
frequently than a special-usage key pair.
C. If you generate general-purpose keys, you must also specify the usage-key keyword or the general-key keyword.
Named key pairs allow you to have multiple RSA key pairs, enabling the Cisco IOS Software to maintain a different
key pair for each identity certificate.
Answer: A
684) Cisco firewalls and routers can respond to a TCP SYN packet that is destined for a protected resource, by using
a SYN-ACK packet to validate the source of the SYN packet. What is this feature called?
D. TCP intercept
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which set of commands is required on an ASA to fix the problem that the exhibit shows?
A. ciscoasa(config)# webvpn
ciscoasa(config)# webvpn
B. ciscoasa(config-webvpn)#anyconnect enable
ciscoasa(config)# webvpn
ciscoasa(config)# webvpn
D. ciscoasa(config-webvpn)#anyconnect enable
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Client1 has an IPsec VPN tunnel established to a Cisco ASA adaptive security appliance in Chicago. The remote access
VPN client wants to access www.cisco.com, but split tunneling is disabled. Which of these is the appropriate
configuration on the Cisco ASA adaptive security appliance if the VPN client's public IP address is 209.165.201.10 and
it is assigned a private address from 192.168.1.0/24?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
687) Which statement about the Cisco Secure Desktop hostscan endpoint assessment feature is true?
A. Advanced endpoint assessment gives you the ability to turn on an antivirus active scan function if it has been
disabled.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. Advanced endpoint assessment cannot force the antivirus software to automatically update the dat file if it has
not been updated in n days.
C. With basic endpoint assessment, you cannot check for multiple antivirus vendors products and version.
D. Advanced endpoint assessment cannot enable the firewall if it has been disabled.
Answer: A
688) Which port is used by default to communicate between VPN load-balancing ASAs?
A. TCP 9022
B. UDP 9023
C. TCP 9023
D. UDP 9022
Answer: B
689) Which three statements apply to the behavior of Cisco AnyConnect client auto-reconnect? (Choose three.)
A. By default, Cisco AnyConnect attempts to re-establish a VPN connection when you lose connectivity to the secure
gateway.
B. With respect to VPN load balancing and Cisco AnyConnect reconnect, the client reconnects to the cluster member
with the highest priority.
C. Cisco AnyConnect reconnects when the network interface changes, whether the IP of the NIC changes or whether
connectivity switches from one NIC to another; for example, wireless to wired or vice versa.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. With respect to VPN load balancing and Cisco AnyConnect reconnect, the client reconnects directly to the cluster
member to which it was previously connected.
E. By default, Cisco AnyConnect attempts to re-establish a VPN connection following a system resume.
Answer: A, C, D
690) When you work on a change-management process, you generally identify potential change, review the change
request, implement change, then review the change and close the process. In which step should the stakeholder be
involved?
C. Implementation
Answer: E
691) Many guidelines can be used to identify the areas that security policies should cover. In which four areas is
coverage most important? (Choose four.)
A. Physical
B. Host
C. User
D. Document
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B, C, D
ip mtu 1400
Based on the above configuration, if the input packet size is 1300 bytes, what is the size of the packet leaves the
tunnel after encapsulation?
A. 1324
B. 1325
C. 1326
D. 1328
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
693) At the end of the Cisco TrustSec authentication process, which three pieces of information do both
authenticator and supplicant know? (Choose three.)
A. Peer device ID
C. SAP key
D. Server device ID
E. Service ID
Answer: A, B, C
694) You are preparing Control Plane Protection configurations for implementation on the router, which has the
EBGP peering address 1.1.1.2. Which ACL statement can you use to classify the related traffic into the EBGP traffic
compartment?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
695) Which of these configurations shows how to configure MPP when only SSH, SNMP, and HTTP are allowed to
access the router through the Gigabit Ethernet 0/3 interface and only HTTP is allowed to access the router through
the Gigabit Ethernet 0/2 interface?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
696) Which two EAP methods may be susceptible to offline dictionary attacks? (Choose two.)
A. EAP-MD5
B. LEAP
D. EAP-FAST
Answer: A, B
Which three fields of the IP header labeled can be used in a spoofing attack? (Choose one.)
A. 6, 7, 11
B. 6, 11, 12
C. 3, 11, 12
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. 4, 7, 11
Answer: A
698) What type of attack consists of injecting traffic that is marked with the DSCP value of EF into the network?
A. brute-force attack
Answer: B
699) An exploit that involves connecting to a specific TCP port and gaining access to an administrative command
prompt is an example of which type of attack?
A. botnet
B. Trojan horse
C. privilege escalation
D. DoS
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
700) Which two of the following provide protect against man-in-the-middle attacks? (Choose two.)
D. IPsec VPNs
Answer: D, E
701) Which three options are security measures that are defined for Mobile IPv6? (Choose three.)
B. The use of IKEv1 or IKEv2 is mandatory for connections between the home agent and mobile node.
C. Mobile nodes and the home agents must support ESP in transport mode with non-NULL payload authentication.
E. IPsec SAs are used to protect dynamic home agent address discovery.
F. IPsec SAs can be used to protect mobile prefix solicitations and advertisements.
Answer: A, C, F
702) Which three statements are true about DES? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, C, E
703) Comparing and contrasting IKEv1 and IKEv2, which three statements are true? (Choose three.)
A. IKEv2 adds EAP as a method of authentication for clients; IKEv1 does not use EAP.
B. IKEv1 and IKEv2 endpoints indicate support for NAT-T via the vendor_ID payload.
C. IKEv2 and IKEv1 always ensure protection of the identities of the peers during the negotiation process.
D. IKEv2 provides user authentication via the IKE_AUTH exchange; IKEv1 uses the XAUTH exchange.
F. IKEv1 supports config mode via the SET/ACK and REQUEST/RESPONSE methods; IKEv2 supports only
REQUEST/RESPONSE.
Answer: A, D, E
704) Which three statements about GDOI are true? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, C, D
705) To prevent a potential attack on a Cisco IOS router with the echo service enabled, what action should you take?
C. Disable tcp-small-servers.
Answer: C
Explanation: The Cisco IOS disables the service tcp-small-servers command by default. Enabling this command turns
on the following services on the router: Echo, Discard, Chargen, and Daytime.
706) Which query type is required for an nslookup on an IPv6 addressed host?
A. type=AAAA
B. type=ANY
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. type=PTR
D. type=NAME-IPV6
Answer: A
707) Which option is used to collect wireless traffic passively, for the purposes of eavesdropping or information
gathering?
A. network taps
C. wireless sniffers
Answer: C
708) Which traffic class is defined for non-business-relevant applications and receives any bandwidth that remains
after QoS policies have been applied?
A. scavenger class
B. best effort
C. discard eligible
D. priority queued
Answer: A
709) In the context of a botnet, what is true regarding a command and control server?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
710) Which option is used for anti-replay prevention in a Cisco IOS IPsec implementation?
A. session token
B. one-time password
C. time stamps
D. sequence number
E. nonce
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
When configuring a Cisco IPS custom signature, what type of signature engine must you use to block podcast clients
from accessing the network?
A. service HTTP
B. service TCP
C. string TCP
D. fixed TCP
E. service GENERIC
Answer: A
712) An attacker configures an access point to broadcast the same SSID that is used at a public hot-spot, and
launches a deauthentication attack against the clients that are connected to the hot-spot, with the hope that the
clients will then associate to the AP of the attacker.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. man-in-the-middle
B. MAC spoofing
C. Layer 1 DoS
D. disassociation attack
Answer: A
713) Which statement best describes the concepts of rootkits and privilege escalation?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
715) Which four values can be used by the Cisco IPS appliance in the risk rating calculation? (Choose four.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. promiscuous delta
E. threat rating
F. alert rating
Answer: A, B, C, D
B. VSAs are proprietary, and therefore may only be used on the RADIUS server of that vendor. For example, a Cisco
VSA may only be used on a Cisco RADIUS server, such as ACS or ISE.
Answer: A
717) Which four items may be checked via a Cisco NAC Agent posture assessment? (Choose four.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B, D, G
A. Exhaust the address space available on the DHCP servers so that an attacker can inject their own DHCP server for
malicious reasons.
B. Saturate the network with DHCP requests to prevent other network services from working.
C. Inject a DHCP server on the network for the purpose of overflowing DNS servers with bogus learned host names.
D. Send DHCP response packets for the purpose of overloading CAM tables.
Answer: A
719) Which Cisco technology protects against Spanning Tree Protocol manipulation?
A. spanning-tree protection
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. port security
Answer: B
720) Which statement is true about the Cisco NEAT 802.1X feature?
A. The multidomain authentication feature is not supported on the authenticator switch interface.
B. It allows a Cisco Catalyst switch to act as a supplicant to another Cisco Catalyst authenticator switch.
C. The supplicant switch uses CDP to send MAC address information of the connected host to the authenticator
switch.
D. It supports redundant links between the supplicant switch and the authenticator switch.
Answer: B
721) Which four techniques can you use for IP management plane security? (Choose four.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. uRPF
C. strong passwords
D. RBAC
F. MD5 authentication
Answer: A, C, D, E
722) During a computer security forensic investigation, a laptop computer is retrieved that requires content analysis
and information retrieval. Which file system is on it, assuming it has the default installation of Microsoft Windows
Vista operating system?
A. HSFS
B. WinFS
C. NTFS
D. FAT
E. FAT32
Answer: C
723) Which Cisco IPS appliance feature can automatically adjust the risk rating of IPS events based on the reputation
of the attacker?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. anomaly detection
D. reputation filtering
Answer: E
724) Which three control plane subinterfaces are available when implementing Cisco IOS Control Plane Protection?
(Choose three.)
A. CPU
B. host
C. fast-cache
D. transit
E. CEF-exception
F. management
Answer: B, D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
What service is enabled on the router for a remote attacker to obtain this information?
B. finger
D. chargen
E. Telnet
F. CEF
Answer:E
726) In an 802.11 wireless network, what would an attacker have to spoof to initiate a deauthentication attack
against connected clients?
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
727) What is the commonly known name for the process of generating and gathering initialization vectors, either
passively or actively, for the purpose of determining the security key of a wireless network?
A. WEP cracking
B. session hijacking
C. man-in-the-middle attacks
Answer: A
728) Which three options are the types of zones that are defined for anomaly detection on the Cisco IPS Sensor?
(Choose three.)
A. inside
B. outside
C. internal
D. external
E. illegal
F. baseline
Answer: C, D, E
729) Which four techniques can you use for IP data plane security? (Choose four.)
B. interface ACLs
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. uRPF
D. MD5 authentication
E. FPM
F. QoS
Answer: B, C, E, F
730) The Wi-Fi Alliance defined two certification programs, called WPA and WPA2, which are based on the IEEE
802.11i standard. Which three statements are true about these certifications? (Choose three.)
Answer: B, C, D
731) What action does a RADIUS server take when it cannot authenticate the credentials of a user?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. A RADIUS start-stop message is sent via the accounting service to disconnect the session.
Answer: A
732)Which transport mechanism is used between a RADIUS authenticator and a RADIUS authentication server?
E. UDP RADIUS encapsulated in the EAP mode enforced by the authentication server.
Answer: A
733) How are the username and password transmitted if a basic HTTP authentication is used?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
734) Which field in an HTTPS server certificate is compared to a server name in the URL?
A. Common Name
B. Issuer Name
C. Organization
D. Organizational Unit
Answer: A
735) Which three of these Window operating system services run automatically(are automatically started upon
appliance power up) on the Cisco secure ACS solution Engine? (Choose three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A , D, E
736) All of this statement about the cisco configuration professional tool are correct except which one?
Answer : C
737) Which of these command sequences will send an email to holly@invalid.com using SMTP?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. HTTP downloads of files with the ".batch" extension on the inside interface
C. FTP commands of GET or PUT for files with the ".bat" extension on all interfaces
D. FTP commands of GET or PUT for files with the ".batch" extension on the inside interface
Answer: C
739) Which two options correctly describe Remote Triggered Black Hole Filtering (RFC 5635)? (Choose two.)
A. RTBH destination based filtering can drop traffic destined to a host based on triggered entries in the FIB.
B. RTBH source based filtering will drop traffic from a source destined to a host based on triggered entries in the RIB
C. Loose uRPF must be used in conjunction with RTBH destination based filtering
D. Strict uRPF must be used in conjunction with RTBH source based filtering
E. RTBH uses a discard route on the edge devices of the network and a route server to send triggered route updates
F. When setting the BGP community attribute in a route-map for RTBH use the no-export community unless BGP
confederations are used then use local-as to advertise to sub-as confederations
Answer: A, E
740) EAP-MD5 provides one-way client authentication. The server sends the client a random challenge. The client
proves its identity by hashing the challenge and its password with MD5. What is the problem with EAP-MD5?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. EAP-MD5 is vulnerable to dictionary attack over an open medium and to spoofing because there is no server
authentication.
B. EAP-MD5 communication must happen over an encrypted medium, which makes it operationally expensive.
Answer: A
741) With ASM, sources can launch attacks by sending traffic to any groups that are supported by an active RP. Such
traffic might not reach a receiver but will reach at least the first-hop router in the path, as well as the RP, allowing
limited attacks. However, if the attacking source knows a group to which a target receiver is listening and there are
no appropriate filters in place, then the attacking source can send traffic to that group. This traffic is received as long
as the attacking source is listening to the group.
A. DoS
B. man-in-the-middle
C. compromised key
D. data modification
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Which two statements correctly describe the debug output that is shown in the exhibit? (Choose two.)
Answer: B, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. botnets
B. backdoor
C. ICMP sweep
D. firewalk
E. inverse mapping
Answer: C
744) Which ICMP message could be used with traceroute to map network topology?
A. Echo Reply
B. Redirect
C. Time Exceeded
D. Echo
E. Router Selection
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. The firewall attack uses ICMP sweep to find expected hosts behind the firewall.
C. The firewall attack uses traceroute with a predetermined TTL value to discover hosts behind the firewall.
D. The firewall attack is used to find the vulnerability in the Cisco IOS firewall code.
E. The firewall attack uses an ICMP echo message to discover firewall misconfiguration.
Answer: C
A. Echo-Echo Request
C. Echo-Time Exceeded
E. Echo-Host Unreachable
Answer: D
B. The botnet attack is a network sweeping attack to find hosts that are alive alive behind the filtering device.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. The botnet attack is a collection of infected computers that launch automated attacks.
E. The botnet attack enhances the efficiency of the computer for effective automated attacks.
Answer: C
B. The SYN flood attack target is to deplete server memory so that legitimate request cannot be served.
C. The SYN flood attack is meant to completely deplete the TCB SYN-Received state backlog.
D. The SYN flood attack can be launched for both UDP and TCP open ports on the server.
E. SYN-Received state backlog for TCBs is meant to protect server CPU cycles.
Answer: C
749) The HTTP inspection engine has the ability to inspect traffic based on which three parameters? (Choose three.)
A. Transfer Encoding
B. Request Method
C. Header
D. Application Type
E. Header Size
F. Source Address
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B, D
750) Which Cisco IOS IPS signature action denies an attacker session using the dynamic access list?
A. produce-alert
B. deny-attacker-inline
C. deny-connection-inline
D. reset-tcp-action
E. deny-session-inline
F. deny-packet-inline
Answer: C
751) Which IPS appliance signature engine inspects IPv6 Layer 3 traffic?
A. Atomic IP
B. Meta
C. Atomic IP Advanced
D. Fixed
E. Service
Answer: C
752) Which statement about the distributed SYN flood attack is true?
A. A distributed SYN flood attack is carried out only by the valid address.
D. A distributed SYN flood attack does not completely deplete TCBs SYN-Received state backlog.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
E. A distributed SYN flood attack is the most effective SYN flood attack because it targets server memory.
Answer: C
753) Which statement about the prelogin assessment module in Cisco Secure Desktop is true?
B. It checks for any viruses on the remote device and reports back to the security appliance.
D. It clears the browser cache on the remote device after successful authentication.
E. It quarantines the remote device for further assessment if specific registry keys are found.
Answer: C
A. botnets
B. ping of death
C. SYN flooding
D. inverse mapping
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D
C. Once the signature is removed from the sensing engine it cannot be restored.
D. It is recommended to retire a signature not being used to enhance the sensor performance.
Answer:D
756) Which statement correctly describes a category for the ASA Botnet Traffic Filter feature?
A. Unlisted addresses: The addresses are malware addresses that are not identified by the dynamic database and
are hence defined statically.
B. Ambiguous addresses: In this case, the same domain name has multiple malware addresses. These addresses are
on the graylist.
C. Known malware addresses: These addresses are identified as blacklist addresses in the dynamic database and
static list.
D. Known allowed addresses: These addresses are identified as whitelist addresses that are bad addresses but still
allowed.
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
758) In an operating system environment, which three attacks give a user elevated privileges to access resources
that are otherwise blocked? (Choose three.)
A. backdoor
B. rootkit
C. privilege escalation
D. DoS
E. smurf
Answer: A, B, C
759) Which two statements about the Cisco AnyConnect client Trusted Network Detection feature are true? (Choose
two.)
A. The feature relies only on the DNS server list to detect whether the client machine is in a trusted or untrusted
network.
B. An attacker can theoretically host a malicious DHCP server and return data that triggers the client to believe that
it resides in a trusted network.
C. If an attacker knows the DNS server value that is configured in the Cisco AnyConnect profile and provisions the
DHCP server to return both a real and spoofed value, then Cisco AnyConnect considers the endpoint to be in an
untrusted network.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. The feature does not provide AnyConnect ability to automatically establish VPN connection when the user is
outside the trusted network.
Answer: B, C
760) Which two statements apply to the method that ASA uses for tunnel-group lookup for LAN-to-LAN IPSec
connections when using PSK-based authentication? (Choose two.)
A. If the configuration does not contain the tunnel-group with the IKE ID or peer IP address DefaultRAGroup,
DefaultL2LGroup is used instead.
D. You can delete and create new default tunnels groups as needed.
Answer: A, B
761) Which command can be used on a Cisco IOS device to prevent it from being used as an amplifier in a fraggle
attack?
A. no service tcp-small-servers
B. no service udp-small-servers
C. no ip directed-broadcast
D. no ip redirects
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
762) Which option is used for anti-replay prevention in a Cisco IOS IPsec implementation using tunnel protection?
A. Session token
B. One-time password
C. Time stamps
D. Sequence number
E. Nonce
Answer: D
763) Which three actions are advisable when implementing desktop security? (Choose three.)
B. Educating users on the danger of opening files and attachments from un-trusted sources
C. Statically defining user password based on information like employee ID number to reduce incidence of forgotten
passwords
F. Configuring client firewalls to automatically disable during business hours as not to impact production traffic and
applications
Answer: A, B, E
764) Which three Cisco security product features assist in preventing TCP-based man-in-the-middle attacks? (Choose
three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B, C
765) Which would be the best method to deploy on a Cisco ASA to detect and prevent viruses and worms?
D. IP audit signatures
Answer: B
766) Which three statements about NetFlow version 9 are correct? (Choose three.)
D. Generating and maintaining valid template flow sets requires additional processing.
E. NetFlow version 9 does not access the NetFlow cache entry directly.
Answer: C, D, E
767) Which multicast capability is not supported by the Cisco ASA appliance?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B
768) Which method of output queuing is supported on the Cisco ASA appliance?
A. CBWFQ
B. priority queuing
C. MDRR
D. WFQ
E. custom queuing
Answer: B
769) Which three authentication methods does the Cisco IBNS Flexible Authentication feature support? (Choose
three.)
A. cut-through proxy
B. dot1x
C. MAB
D. SSO
E. web authentication
Answer: B, C, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
770) Which option on the Cisco ASA appliance must be enabled when implementing botnet traffic filtering?
A. HTTP inspection
C. global ACL
D. NetFlow
Answer: E
771) Which three options can be configured within the definition of a network object, as introduced in Cisco ASA
version 8.3(1)? (Choose three.)
A. range of IP addresses
B. subnet of IP addresses
Answer: A, B, D
772) Which three statements are true about the transparent firewall mode in Cisco ASA? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. The firewall can connect to the same Layer 3 network on its inside and outside interfaces.
Answer: A, B, C
773) Which three statements about Cisco IOS RRI are correct? (Choose three.)
B. Routes are created from ACL entries when they are applied to a static crypto map.
C. Routes are created from source proxy IDs by the receiver with dynamic crypto maps.
Answer: B, C, D
774) With the Cisco FlexVPN solution, which four VPN deployments are supported? (Choose four.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, B, C, F
775) Which three statements are true about the Cisco ASA object configuration below? (Choose three.)
B. This configuration requires the command same-security-traffic inter-interface for traffic that matches this NAT
rule to pass through the Cisco ASA appliance.
C. The NAT rule of this object will be placed in Section 1 (Auto-NAT) of the Cisco ASA NAT table?
D. This configuration is most likely used to provide Internet access to connected VPN clients.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, C, D
776) Which three statements are true about the Cisco NAC Appliance solution? (Choose three.)
A. In a Layer 3 OOB ACL deployment of the Cisco NAC Appliance, the discovery host must be configured as the
untrusted IP address of the Cisco NAC Appliance Server.
B. In a Cisco NAC Appliance deployment, the discovery host must be configured on a Cisco router using the "NAC
discovery-host" global configuration command.
C. In a VRF-style OOB deployment of the Cisco NAC Appliance, the discovery host may be the IP address that is on
the trusted side of the Cisco NAC Appliance Server.
D. In a Layer 3 IB deployment of the Cisco NAC Appliance, the discovery host may be configured as the IP address of
the Cisco NAC Appliance Manager.
Answer: A, C, D
777) Which three object tracking options are supported by Cisco IOS policy-based routing? (Choose three.)
Answer: C, D, E
778) In ISO 27001 ISMS, which three of these certification process phases are required to collect information for ISO
27001? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. discover
B. certification audit
C. post-audit
D. observation
E. pre-audit
F. major compliance
Answer: B, C, E
779) Which three statements regarding ISO 27002 and COBIT are correct? (Choose three.)
A. COBIT and ISO 27002 both define a best practices framework for IT controls.
B. COBIT focuses on information system processes, whereas ISO 27002 focuses on the security of the information
systems.
C. ISO 27002 addresses control objectives, whereas COBIT addresses information security management process
requirements.
D. Compared to COBIT, ISO 27002 covers a broader area in planning, operations, delivery, support, maintenance,
and IT governance.
E. Unlike COBIT, ISO 27002 is used mainly by the IT audit community to demonstrate risk mitigation and avoidance
mechanisms.
Answer: A, B, C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
780) The IETF is a collaborative effort by the international community of Internet professionals to improve the
design, use, and management of the Internet. Which international organization charters the activity of IETF?
A. IANA
B. ISO
C. ISOC
D. RIR
E. IEC
Answer: C
781) Which statement is correct about the Cisco IOS Control Plane Protection feature?
B. Traffic that is destined to the router with IP options will be redirected to the host control plane.
C. Disabling CEF will remove all active control-plane protection policies. Aggregate control-plane policies will
continue to operate.?
D. The open-port option of a port-filtering policy allows access to all TCP/UDP based services that are configured on
the router.
Answer: C
782) Which two statements about IPS signatures are true? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. Once the signature is removed from the sensing engine it cannot be restored
D. It is recommended not to retire a signature that is not being used because then it cannot be restored.
Answer: B, E
783)
Answer: <map><m x1="4" x2="505" y1="45" y2="78" ss="0" a="0" /><m x1="6" x2="504" y1="88" y2="119" ss="0"
a="0" /><m x1="1" x2="503" y1="133" y2="162" ss="0" a="0" /><m x1="3" x2="507" y1="174" y2="205" ss="0"
a="0" /><m x1="4" x2="504" y1="218" y2="246" ss="0" a="0" /><m x1="519" x2="1017" y1="43" y2="76" ss="1"
a="0" /><m x1="518" x2="1016" y1="90" y2="118" ss="1" a="0" /><m x1="519" x2="1016" y1="131" y2="160"
ss="1" a="0" /><m x1="517" x2="1017" y1="174" y2="207" ss="1" a="0" /><m x1="519" x2="1018" y1="216"
y2="248" ss="1" a="0" /><c start="4" stop="0" /><c start="2" stop="1" /><c start="1" stop="2" /><c start="3"
stop="3" /><c start="0" stop="4" /></map>
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
784)
Answer: <map><m x1="3" x2="507" y1="44" y2="75" ss="0" a="0" /><m x1="5" x2="508" y1="87" y2="120" ss="0"
a="0" /><m x1="5" x2="508" y1="130" y2="162" ss="0" a="0" /><m x1="6" x2="508" y1="176" y2="203" ss="0"
a="0" /><m x1="518" x2="1017" y1="44" y2="77" ss="1" a="0" /><m x1="520" x2="1017" y1="89" y2="123" ss="1"
a="0" /><m x1="520" x2="1021" y1="131" y2="164" ss="1" a="0" /><m x1="519" x2="1021" y1="174" y2="206"
ss="1" a="0" /><c start="2" stop="0" /><c start="1" stop="1" /><c start="3" stop="2" /><c start="0" stop="3"
/></map>
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
785)
Answer: <map><m x1="7" x2="507" y1="46" y2="75" ss="0" a="0" /><m x1="6" x2="507" y1="88" y2="119" ss="0"
a="0" /><m x1="6" x2="506" y1="132" y2="163" ss="0" a="0" /><m x1="5" x2="508" y1="177" y2="209" ss="0"
a="0" /><m x1="4" x2="505" y1="217" y2="252" ss="0" a="0" /><m x1="5" x2="505" y1="262" y2="292" ss="0"
a="0" /><m x1="518" x2="1016" y1="47" y2="77" ss="1" a="0" /><m x1="519" x2="1019" y1="89" y2="120" ss="1"
a="0" /><m x1="518" x2="1018" y1="132" y2="164" ss="1" a="0" /><m x1="519" x2="1019" y1="176" y2="206"
ss="1" a="0" /><m x1="518" x2="1017" y1="217" y2="247" ss="1" a="0" /><m x1="519" x2="1020" y1="261"
y2="292" ss="1" a="0" /><c start="2" stop="0" /><c start="0" stop="1" /><c start="1" stop="2" /><c start="4"
stop="3" /><c start="5" stop="4" /><c start="3" stop="5" /></map>
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
786)
Answer: <map><m x1="2" x2="505" y1="44" y2="75" ss="0" a="0" /><m x1="1" x2="506" y1="88" y2="117" ss="0"
a="0" /><m x1="1" x2="503" y1="130" y2="165" ss="0" a="0" /><m x1="2" x2="503" y1="175" y2="207" ss="0"
a="0" /><m x1="2" x2="504" y1="216" y2="251" ss="0" a="0" /><m x1="516" x2="1015" y1="43" y2="78" ss="1"
a="0" /><m x1="515" x2="1014" y1="91" y2="119" ss="1" a="0" /><m x1="518" x2="1017" y1="129" y2="163"
ss="1" a="0" /><m x1="518" x2="1015" y1="176" y2="207" ss="1" a="0" /><m x1="517" x2="1016" y1="216"
y2="249" ss="1" a="0" /><c start="4" stop="0" /><c start="0" stop="1" /><c start="1" stop="2" /><c start="2"
stop="3" /><c start="3" stop="4" /></map>
787)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: <map><m x1="1" x2="503" y1="46" y2="76" ss="0" a="0" /><m x1="0" x2="504" y1="86" y2="118" ss="0"
a="0" /><m x1="1" x2="505" y1="129" y2="160" ss="0" a="0" /><m x1="0" x2="502" y1="173" y2="205" ss="0"
a="0" /><m x1="0" x2="503" y1="214" y2="247" ss="0" a="0" /><m x1="516" x2="1015" y1="44" y2="79" ss="1"
a="0" /><m x1="514" x2="1017" y1="90" y2="120" ss="1" a="0" /><m x1="515" x2="1016" y1="132" y2="163"
ss="1" a="0" /><m x1="515" x2="1015" y1="172" y2="204" ss="1" a="0" /><m x1="519" x2="1014" y1="217"
y2="245" ss="1" a="0" /><c start="3" stop="0" /><c start="1" stop="1" /><c start="0" stop="2" /><c start="2"
stop="3" /><c start="4" stop="4" /></map>
788)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: <map><m x1="2" x2="504" y1="46" y2="75" ss="0" a="0" /><m x1="2" x2="503" y1="89" y2="121" ss="0"
a="0" /><m x1="3" x2="503" y1="128" y2="165" ss="0" a="0" /><m x1="3" x2="503" y1="173" y2="207" ss="0"
a="0" /><m x1="2" x2="505" y1="221" y2="247" ss="0" a="0" /><m x1="516" x2="1016" y1="46" y2="75" ss="1"
a="0" /><m x1="518" x2="1014" y1="88" y2="118" ss="1" a="0" /><m x1="514" x2="1017" y1="133" y2="161"
ss="1" a="0" /><m x1="514" x2="1014" y1="177" y2="203" ss="1" a="0" /><m x1="517" x2="1015" y1="220"
y2="246" ss="1" a="0" /><c start="1" stop="0" /><c start="0" stop="1" /><c start="2" stop="2" /><c start="4"
stop="3" /><c start="3" stop="4" /></map>
0x1000-0xFFFF
789)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: <map><m x1="2" x2="503" y1="44" y2="73" ss="0" a="0" /><m x1="4" x2="503" y1="85" y2="118" ss="0"
a="0" /><m x1="3" x2="506" y1="130" y2="161" ss="0" a="0" /><m x1="5" x2="505" y1="173" y2="204" ss="0"
a="0" /><m x1="4" x2="504" y1="215" y2="249" ss="0" a="0" /><m x1="3" x2="505" y1="257" y2="289" ss="0"
a="0" /><m x1="3" x2="505" y1="301" y2="338" ss="0" a="0" /><m x1="517" x2="1015" y1="45" y2="77" ss="1"
a="0" /><m x1="516" x2="1017" y1="88" y2="119" ss="1" a="0" /><m x1="519" x2="1017" y1="129" y2="162"
ss="1" a="0" /><m x1="519" x2="1017" y1="171" y2="203" ss="1" a="0" /><m x1="517" x2="1017" y1="214"
y2="244" ss="1" a="0" /><m x1="520" x2="1015" y1="256" y2="291" ss="1" a="0" /><m x1="514" x2="1017"
y1="303" y2="332" ss="1" a="0" /><c start="2" stop="0" /><c start="4" stop="1" /><c start="5" stop="2" /><c
start="6" stop="3" /><c start="3" stop="4" /><c start="1" stop="5" /><c start="0" stop="6" /></map>
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
790)
Answer: <map><m x1="2" x2="503" y1="42" y2="73" ss="0" a="0" /><m x1="3" x2="505" y1="83" y2="118" ss="0"
a="0" /><m x1="4" x2="505" y1="127" y2="160" ss="0" a="0" /><m x1="3" x2="505" y1="169" y2="201" ss="0"
a="0" /><m x1="517" x2="1016" y1="45" y2="73" ss="1" a="0" /><m x1="519" x2="1019" y1="84" y2="117" ss="1"
a="0" /><m x1="519" x2="1015" y1="128" y2="160" ss="1" a="0" /><m x1="516" x2="1015" y1="172" y2="203"
ss="1" a="0" /><c start="1" stop="0" /><c start="2" stop="1" /><c start="3" stop="2" /><c start="0" stop="3"
/></map>
791)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: <map><m x1="3" x2="505" y1="45" y2="74" ss="0" a="0" /><m x1="4" x2="506" y1="87" y2="117" ss="0"
a="0" /><m x1="4" x2="505" y1="131" y2="162" ss="0" a="0" /><m x1="5" x2="509" y1="175" y2="206" ss="0"
a="0" /><m x1="5" x2="506" y1="216" y2="248" ss="0" a="0" /><m x1="519" x2="1019" y1="44" y2="79" ss="1"
a="0" /><m x1="520" x2="1015" y1="89" y2="122" ss="1" a="0" /><m x1="519" x2="1017" y1="132" y2="162"
ss="1" a="0" /><m x1="516" x2="1015" y1="173" y2="203" ss="1" a="0" /><m x1="517" x2="1017" y1="219"
y2="245" ss="1" a="0" /><c start="0" stop="0" /><c start="1" stop="1" /><c start="4" stop="2" /><c start="2"
stop="3" /><c start="3" stop="4" /></map>
Explanation:
A security policy is a living document that allows an organization and its management team to draw very clear and
understandable objectives, goals, rules and formal procedures that help to define the overall security posture and
architecture for organization.
792)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: <map><m x1="3" x2="504" y1="45" y2="76" ss="0" a="0" /><m x1="4" x2="504" y1="88" y2="119" ss="0"
a="0" /><m x1="1" x2="502" y1="131" y2="165" ss="0" a="0" /><m x1="3" x2="503" y1="174" y2="205" ss="0"
a="0" /><m x1="3" x2="503" y1="217" y2="248" ss="0" a="0" /><m x1="517" x2="1016" y1="44" y2="78" ss="1"
a="0" /><m x1="517" x2="1015" y1="89" y2="122" ss="1" a="0" /><m x1="516" x2="1016" y1="133" y2="165"
ss="1" a="0" /><m x1="518" x2="1014" y1="175" y2="205" ss="1" a="0" /><m x1="519" x2="1016" y1="219"
y2="248" ss="1" a="0" /><c start="4" stop="0" /><c start="3" stop="1" /><c start="2" stop="2" /><c start="1"
stop="3" /><c start="0" stop="4" /></map>
793) Which three statements about the Cisco IPS sensor are true? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. For a given sensing interface, an interface used in a VLAN pair can be a member of another inline interface pair.
C. For a given sensing interface, a VLAN can be a member of only one inline VLAN pair, however, a given VLAN can
be a member of an inline VLAN pair on more than one sensing interface.
D. The order in which you specify the VLANs in a inline pair is significant.
E. A sensing interface in inline VLAN pair mode can have from 1 to 255 inline VLAN pairs.
Answer: A, C, E
Explanation:
For a given sensing interface, a VLAN can be a member of only one inline VLAN pair. However, a given VLAN can be a
member of an inline VLAN pair on more than one sensing interface.
The order in which you specify the VLANs in an inline VLAN pair is not significant.
A sensing interface in inline VLAN pair mode can have from 1 to 255 inline VLAN pairs.
794) According ISO27001 ISMS, which of the following are mandatory documents? (Choose 4)
A. ISMS Policy
C. IS Procedures
Answer: A, B, C, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
795) Which two statements describe the Cisco TrustSec system correctly? (Choose two.)
A. The Cisco TrustSec system is a partner program, where Cisco certifies third-party security products as extensions
to the secure infrastructure.
B. The Cisco TrustSec system is an approach to certifying multimedia and collaboration applications as secure.
C. The Cisco TrustSec system is an Advanced Network Access Control System that leverages enforcement intelligence
in the network infrastructure.
D. The Cisco TrustSec system tests and certifies all products and product versions that make up the system as
working together in a validated manner.
Answer: C, D
796)Which three attributes may be configured as part of the Common Tasks panel of an authorization profile in the
Cisco ISE solution? (Choose three.)
A. VLAN
B. voice VLAN
C. dACL name
E. SGT
Answer: A, C, D
797) Which three statements about Cisco Flexible NetFlow are true? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The packet information used to create flows is not configurable by the user.
C. It tracks all fields of an IPv4 header as well as sections of the data payload.
Answer: B, C, E
798) Which three statements are true regarding RFC 5176 (Change of Authorization)? (Choose three.)
D. It defines a DM.
E. It specifies that TCP port 3799 be used for transport of Change of Authorization packets.
Answer: A, C, D
799) Which three statements are true regarding Security Group Tags? (Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. When using the Cisco ISE solution, the Security Group Tag gets defined as a separate authorization result.
B. When using the Cisco ISE solution, the Security Group Tag gets defined as part of a standard authorization profile.
C. Security Group Tags are a supported network authorization result using Cisco ACS 5.x.
D. Security Group Tags are a supported network authorization result for 802.1X, MAC Authentication Bypass, and
WebAuth methods of authentication.
E. A Security Group Tag is a variable length string that is returned as an authorization result.
Answer: A, C, D
800) Which two certificate enrollment methods can be completed without an RA and require no direct connection
to a CA by the end entity? (Choose two.)
A. SCEP
B. TFTP
E. PKCS#12 import/export
Answer: C, E
801) Which two statements about the AES algorithm are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. The AES algorithm does not give any advantage over 3DES due to the same key length.
E. The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides
encryption.
Answer: B, E
802) Which two statements about the RC4 algorithm are true? (Choose two.)
Answer: B, D
803) Which three statements about the RSA algorithm are true? (Choose three.)
C. The RSA algorithm creates a pair of public-private keys that are shared by entities that perform encryption.
E. The public key is used to decrypt the message that was encrypted by the private key.
F. The private key is used to decrypt the message that was encrypted by the public key.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C, D, F
804) Which two statements about the MD5 Hash are true? (Choose two.)
A. Length of the hash value varies with the length of the message that is being hashed.
C. Its mathematically possible to find a pair of message that yield the same hash value.
D. MD5 always yields a different value for the same message if repeatedly hashed.
Answer: B, E
805) Which two statements about the SHA-1 algorithm are true? (Choose two)
A. The SHA-1 algorithm is considered secure because it always produces a unique hash for the same message.
B. The SHA-1 algorithm takes input message of any length and produces 160-bit hash output.
C. The SHA-1 algorithm is considered secure because it is possible to find a message from its hash.
Answer: B, E
806) Which two statements about the DES algorithm are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C, E
A. The 3DES algorithm uses the same key for encryption and decryption,
B. The 3DES algorithm uses a public-private key pair with a public key for encryption and a private key for
decryption.
E. The 3DES algorithm is faster than DES due to the shorter key length.
Answer: C
808) Which two statements about the DH group are true? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, D
809) Which two statement about Infrastructure ACLs on Cisco IOS software are true? (Choose two.)
A. Infrastructure ACLs are used to block-permit the traffic in the router forwarding path.
B. Infrastructure ACLs are used to block-permit the traffic handled by the route processor.
Answer: B, D
810) For which two reasons BVI is required in the Transparent Cisco IOS Firewall? (Choose two)
F. BVI can manage the device without having an interface that is configured for routing.
Answer: D, F
A. SensorApp
B. InterfaceApp
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. MainApp
D. NotificationApp
E. AuthenticationApp
Answer: C
812) Which statement about the Cisco Secure ACS Solution Engine TACACS+ AV pair is true?
A. AV pairs are only required to be enabled on Cisco Secure ACS for successful implementation.
B. The Cisco Secure ACS Solution Engine does not support accounting AV pairs.
Answer: C
A. 171.10.0.0/24
B. 0.0.0.0/8
C. 203.0.113.0/24
D. 192.80.90.0/24
E. 172.16.0.0/12
F. 198.50.100.0/24
Answer: B, C, E
A. ISO/IEC 27001 is only intended to report security breaches to the management authority.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
815) NWhich two statements about the ISO are true? (Choose two.)
B. The ISO has three membership categories: Member, Correspondent, and Subscribers.
E. Correspondent bodies are small countries with their own standards organization.
Answer: B, D
Member bodies are national bodies considered the most representative standards body in each country. These are
the only members of ISO that have voting rights.
816) Which three addresses are special uses as defined in RFC 5735? (Choose three.)
A. 171.10.0.0/24
B. 0.0.0.0/8
C. 203.0.113.0/24
D. 192.80.90.0/24
E. 172.16.0.0/12
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
F. 198.50.100.0/24
Answer: B, C, E
B. SOX is a US law.
D. SOX is a private organization that provides best practices for financial institution computer systems.
Answer: B
818) Which of the following two statements apply to EAP-FAST? (Choose two.)
A. EAP-FAST is useful when a strong password policy cannot be enforced and an 802.1X EAP type that does not
require digital certificates can be deployed.
B. EAP-FAST was developed only for Cisco devices and is not compliant with 802.1X and 802.11i.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. EAP-FAST provides protection from authentication forging and packet forgery (replay attack).
Answer: A, C
819) According to OWASP guidelines, what is the recommended method to prevent cross-site request forgery?
Answer: C
820) Which three statements about the IANA are true? (Choose three.)
Answer: B, C, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
821) Which of the following best describes Chain of Evidence in the context of security forensics?
B. Evidence is controlled and accounted for to maintain its authenticity and integrity.
D. Someone knows where the evidence is and can say who had it if it is not logged.
Answer: B
Answer: C
823) Which current RFC made RFCs 2409, 2407, and 2408 obsolete?
A. RFC 4306
B. RFC 2401
C. RFC 5996
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. RFC 4301
E. RFC 1825
Answer: A
824) Which of these is a core function of the risk assessment process? (Choose one.)
Answer: C
825) Which two answers describe provisions of the SOX Act and its international counterpart Acts? (Choose two.)
C. financial information handled by entities such as banks, and mortgage and insurance brokers
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B, D
826)A Cisco Easy VPN software client is unable to access its local LAN devices once the VPN tunnel is established.
What is the best way to solve this issue?
A. The IP address that is assigned by the Cisco Easy VPN Server to the client must be on the same network as the
local LAN of the client.
B. The Cisco Easy VPN Server should apply split-tunnel-policy excludespecified with a split-tunnel-list containing the
local LAN addresses that are relevant to the client.
C. The Cisco Easy VPN Server must push down an interface ACL that permits the traffic to the local LAN from the
client.
D. The Cisco Easy VPN Server should apply a split-tunnel-policy tunnelall policy to the client.
E. The Cisco Easy VPN client machine needs to have multiple NICs to support this.
Answer: B
A. RFC 3704
B. RFC 2827
C. RFC 3030
D. RFC 2267
E. RFC 1918
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A
828) Which two current RFCs discuss special use IP addresses that may be used as a checklist of invalid routing
prefixes for IPv4 and IPv6 addresses? (Choose two.)
A. RFC 5156
B. RFC 5735
C. RFC 3330
D. RFC 1918
E. RFC 2827
Answer: A, B
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. IP address allocation
Answer: A, D, E
831) Which two statements about RFC 2827 are true? (Choose two.)
C. RFC 2827 defines ingress packet filtering for the multihomed network.
D. RFC 2827 defines ingress packet filtering to defeat DoS using IP spoofing.
Answer: B, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
832) Which two statements about SOX are true? (Choose two.)
B. SOX is a US law.
D. SOX is a private organization that provides best practices for financial institution computer systems.
Answer: B, E
A. IP address allocation
Answer: A, D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. GET VPN
D. IPsec VPN
Answer: C
A. IP address allocation
Answer: A, D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
836)
Refer to the exhibit. What are two TLS inspection methods you could implement for outbond internet traffic
that can prevent the given untrusted error? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A , B
187) 837) Which two statements about the SeND protocol are true? (Choose two)
A. It uses IPsec as a baseline mechanism
B. It supports an autoconfiguration mechanism
C. It must be enabled before you can configure IPv6 addresses
D. It supports numerous custom neighbor discovery messages
E. It counters neighbor discovery threats
F. It logs IPv6-related threats to an external log server
Answer: B, E
838) When you are configuring QoS on the Cisco ASA appliance Which four are valid traffic selection
criteria? (Choose four)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A , C , E, F
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
840) According to RFC 2577, Which two options describe drawbacks of the FTP protocol? (Choose two)
Answer : D, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C) RC5
D) 3DES
E)AES
Answer : E
842)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
843) What is the name of the unique tool/feature in cisco security manager that is used to merge an access
list based on the source/destination IP address service or combination of these to provide a manageable
view of access policies?
Answer : E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
844)
Refer to the exhibit after you implement ingress filter 101 to deny all icmp traffic on your perimeter router
user complained of poor web performance and the router and the router display increase CPU load. The
debug ipicmp command returned the given output Which configuration you make to the router
configuration to correct the problem?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
845) All of these Cisco security products provide event correlation capabilities excepts which one?
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
846) Which three statements about the keying methods used by MAC Sec are true (Choose Three)
Answer : A B F
Answer : B , E , F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
848)
849)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : D
850) Which three of these are security properties that TLS v1.2 provides?(Choose three)?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B D F
851) Your IPv6 network uses a CA and trust anchor to implement secure network discover. What extension must
your CA certificates support?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
852) Which three global correlation feature can be enabled from cisco IPD device manager (Cisco IDM)? (Choose
three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : C D E
853) Which protocol does VNC use for remote access to a GUI?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : D
854) Which two statement about the IPv6 Hop-by-Hop option extension header (EH) are true?9Choose two)
Answer : B , C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
855) Drag and drop the desktop-security terms from the left onto their right definitions on the right?
Answer :
724) On an ASA firewall in multiple context mode running version8.X What is the default number of VPN site-to site
tunnels per context?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
856) By defaults which amount of time does the ASA add to the TTL value of a DNS entry to determine the amount
of time a DNS entry is valid?
Answer : A
857) A server with Ip address 209.165.202.150 is protected behind the inside of a cisco ASA or PIX security appliance
and the internet on the outside interface .User on the internet need to access the server at any time but the firewall
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
administrator does not want to apply NAT to the address of the server because it is currently a public address which
three of the following command can be used to accomplish this? (Choose three)
Answer : A D F
858) What are two feature that can be used to drop incoming traffic with spoofed bogon address? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A B
859)During a DoS attacks all of the data is lost from a users laptop and the user must now rebuild the system Which
tool can the user use to extract the outlook PST file from the Microsoft server database?
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
860) Which three of these situation warrant engagement of a security incident Response team?(Choose three)
Answer : C, D, E
861)
Refer to the exhibit. R1 and R2 are connected across and ASA with MD5 authentication. Which statement
about eBGP peering between the routers could be true?
A) eBGP peering will fail because ASA is transit lacks BGP support.
B) eBGP peering will be successful.
C) eBGP peering will fail because the two routers must be directly connected to allow peering.
D) eBGP peering will fail because of the TCP random sequence number feature.
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
862) Which two statements about the ISO are true? (Choose two)
863) What is the default communication port used by RSA SDI and ASA ?
A) UDP 500
B) UDP 848
C) UDP 4500
D) UDP 5500
Answer : D
864) Which three statement about VRF-Aware Cisco Firewall are true? (Choose three)
Answer : A D E
865) When configuration Cisco IOS firewall CBAC operation on Cisco routers, the inspection rule can be applied at
which two location?(Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :B,F
866) What message does the TACACS+ daemon send during the AAA authentication process to request additional
authentication information?
A)ACCEPT
B)REJECT
C)CONTINUE
D)ERROR
E)REPLY
Answer :C
867) What are two security controls you can implement to protect your organizations network from virus and worm
outbreak? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :B,C
868) Which two u.s government entities are authorized to execute and enforce the penalties for violations of the
Sarbanes-oxley(SOX)act?(choose two)
Answer :D,E
869) IKEv2 provide greater network attack resiliency against a DoS attack than IKEv1 by utilizing which two
functionalities?(Choose two)
A) with cookie challenge IKEv2 does not track the state of the initiator until the initiator respond with cookie.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
F) An IKEv2 responder does not initiate a DH exchange until the initiator responds with a cookie
Answer :A,F
870) What command can you use to protect a router from TCP SYN-flooding attacks?
A) ip igmp snooping
E) police <bps>
Answer :C
871) What IOS feature can prevent header attacks by using packet-header information to classify traffic?
A)CAR
B)FPM
C)TOS
D)LLQ
E) TTL
Answer :B
872) How can the tail drop algorithem support traffic when the queue is filled?
A) It drop older packet with a size of 64 byts or more until queue has more traffic
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B)It drop older packet with a size of less than 64 byts until queue has more traffic
C) It drops all new packets until the queue has room for more traffic
D) It drops older TCP packets that are set to be redelivered due to error on the link until the queue has room for
more traffic.
Answer :C
873)
Refer to the exhibit. Which statement about the effect of this configuration is true?
Answer :D
874) What technology can you implement on your network to allow IPv4-dependent applications to work with IPv6-
capable application?
A)NAT 6to4
B)DS-lite
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C)NAT-PT
D)ISATAP
E)NAT64
Answer :E
875)Which two statement about IPv6 path MTU discovery are true? (choose two)
B) the initial path MTU is the same as the MTU of the original nodes link layer interface
C)It can allow fragmentation when the minimum MTU is blow a configured value
E) If the source host receiver an ICMPv6 packet too BIG message from a router it reduces its path MTU
F) IF the destination host receives and ICMPv6 packet too Big message from a router it reduces its path MTU
Answer :B,E
876)What context-based access control (CBAC)command sets the maximum time that a router running Cisco IOS
Will wait for a new TCP session to reach the established state?
A) IP inspect max-incomplete
D) Ip inspect tcpsynwait-time
Answer :D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C) NO state is kept on the server machine state but is embedded in the initial sequence number
Answer :C
878) You have configured an authenticator switch in access mode on a network configured with NEAT what radius
attribute must the ISE server return to change the switchs port mode to trunk?
A) device-traffic-class=switch
B)device-traffic-class=trunk
C)framed-protocol=1
D)EAP-message-switch
E)Authenticate=Administrative
F)Acct-Authentic=radius
Answer :A
879) Drag each Cisco TrustSec feature on the left to its description on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
SXP: Protocol that allows devices unable to spport TrustSec to receive SGT attributes from ACS
880) What are the two mechanism that are used to authenticate OSPFv3 packets?(Choose two)
A) MD5
B)ESP
C)PLAIN TEXT
D)AH
E)SHA
Answer :B,D
881)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
refer to the exhibit you executed the show crypto key mypubkeyrsa command to verify that the RSA key is protected
and it generated the given output What command must you have entered to protect the key?
Answer :E
882) Drag each IPsec term on the left to the definition on the right?
Answer :
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
SA: The relationship between two peers that determine which algo and keys
SADB: A container that stores the policy requirements for a security ass to be esta
SPI: An identification tag that is added to the packet header of traffic intended to be tunneled
883) Which two statement about the multicast addresses query message are true?(choose two)
B) They are used to discover the multicast group to which listeners on a link are subscribed
C) They are used to discover whether a specified multicast address has listeners
D) They are send unsolicited when a node initializes the multicast process
Answer :B,C
884) What security element must an organization have in place before it can implement a security audit and validate
the audit results?
A)firewall
D) a security policy
Answer :D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
885)
A)GR
B)AH
C)ESP
D)IP
Answer :B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
886)
Refer to the exhibit Which as-path access-list regular expression should be applied on R2 as a neighbor filter list to
only allow update with and origin of AS 65503?
A)_65509.?$
B)_65503$
C)^65503.*
D)^65503$
E)_65503_
F)65503
Answer :C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) Category:internet
Protocol:FTP,HTTP,TFTP
B))Category:Network management
Protocol:ICMP,SNMP,SSH,telent
Protocol:mapi,pop3,smtp
D)Category:Enterprise applications
Protocal:citrixICA,PCAnywhere,SAP,IMAP
Answer :A
888) What are two action you can take to protect against DDOS attacks on cisco router and switches?(Choose two)
C) configuration IP snooping
E) Configuration PIM-SM
Answer :A,B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
889) Which one of the following Cisco ASA adaptive security appliance rule samples will send HTTP data to the AIP-
SSM module to evaluate and stop HTTP attacks?
Answer :C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
890) Drag each step in the configuration of a cisco ASA NSEL export to a NETFLOW collector on the left into the
correct order of operations on the right?
Answer :
1. Configure the NSEL collector.
2. Create Class-map to identify the desired traffic.
3. Call ACL under the class-map to match the desired traffic.
4. Create policy-map
5. Associate Class-map to policy map.
6. Configure flow-export action.
7. Associate Policy-map to service-policy.
891) Drag each OSPF security feature on the left to its description on the right.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
892) Which configuration is the correct way to change VPN key Encryption key lifetime to 10800 seconds on the key
server?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :A
893) Which of the following two options can you configure to avoid iBGP full mesh?(Choose two)
A) BGP NHT
B) route reflector
C) local preference
D)confederations
E) Virtual peering
Answer :B,D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
894)
Refer to the exhibit you have configured two route-map instances on R1 which passes traffic from switch 1 on both
VLAN 1 and VLAN 2.You wish to ensure that*the first route-map instance matches packets from VLAN 1 and sets
next hop to 3232::2/128.* the second route-map instance matches packets from VLAN 2 and sets the next hop to
3232::3/128 What feature can you implement on R1 to make this configuration possible?
A)PBR
B)BGP local-preference
C)BGP next-hop
D)VSSP
E)GLBP
Answer :C
895) Drag each IP transmission and fragmentation term on the left to the matching statement on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
DF bit: A value in the IP header that indicates whether packet fragmentation is permitted.
Fragment offset: A value in the IP packet that indicates the location of a fragment in the datagram.
MF bit: Indicates that this is last packet with the biggest offset.
MSS: The amount of data that the receiving host can accept in each TCP segment.
MTU: A value representing the maximum acceptable length of a packet to be transmitted over a link.
PMTUD: A technology used to prevent fragmentation as data travels between two end points.
Tunnel: A logical interface allows packet to be encapsulated inside a passenger protocol for transmission across a
different carrier protocol.
896)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A
897)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. What are three effect of the given firewall configuration? (Choose three.)
A) The firewall allows Echo Request packets from any source to pass server.
B) The firewall allows time Exceeded error messages from any source to pass to the server.
C) PCs outside the firewall are unable to communicate with the server over HTTP
D) The firewall allows Echo Reply packets from any source to pass to the server.
E) The firewall allows Destination Unreachable error messages from any source to pass to the server.
F) The firewall allows Packet too big error messages from any source to pass to the server.
Answer: A D F
898) What are two protocols that HTTP can use to secure sessions? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. HTTPS
B. AES
C. TLS
D. AH
E. SSL
Answer : E, A
899) Which statement regarding the routing functions of the Cisco ASA is true running software version 9.2?
A. In a failover pair of ASAs, the standby firewall establishes a peer relationship with OSPF neighbors
B. The ASA supports policy-based routing with route maps
C. Routes to the Null0 interface cannot be configured to black-hole traffic
D. The translations table cannot override the routing table for new connections
Answer : C
900) when you configure an ASA with RADIUS authentication and authorization, which attribute is used to
differentiate user roles?
A. login-ip-host
B. cisco-priv-level
C. service-type
D. termination-action
E. tunnel-type
Answer : C
901) Which two commands would enable secure logging on Cisco ASA to a syslog server at 10.0.0.1? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A,C
902) In Cisco Wireless LAN Controller (WLC) which web policy enables failed Layer 2 authentication to fall back to
WebAuth authentication with a user name and password?
Answer :A
903) Which three options are methods of load-balancing data in an ASA cluster environment?(Choose three)
A. HSRP
B. spanned EtherChannel
C. distance-vector routing
D. PBR
E. floating static routes
F. ECMP
Answer :B,D,F
904) Which two statements about the anti-replay feature are true? (Choose two)
Answer :B,D
905) Refer to the exhibit. What type of attack is represented in the given Wireshark packet capture?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. a SYN flood
B. spoofing
C. a duplicate ACK
D. TCP congestion control
E. a shrew attack
Answer : A
906) Which three statements about RLDP are true? (Choose three)
Answer : A, B,D
907) Drag each ESP header field on the left into corresponding field-length category on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
908) You want to enable users in your companys branch offices to deploy their own access points using
WAN link from the central office, but you are unable to a deploy a controller in the branch offices. What
lightweight access point wireless mode should you choose?
A) TLS mode
B) H-REAP mode
C) Monitor mode
D) REAP mode
E) Local mode
Answer : B
909) Drag each step in the SCEP workflow on the left into the correct order of operations on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
Step 3: Sent a request to SCEP server to confirm that the cert was signed.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
910) Drag each IPv6 extension header on the left into the recommended order for more than one extension
header In the same IPv6 packet on the right?
Answer :
1: IPv6 header; 2: Hop by Hop option; 3. Destination options; 4: Routing; 5: Fragment; 6: Authentication; 7:
Encapsulating Security Payload.
911) Which two statement about the Cisco ASA in a transparent-mode deployment are true? (Choose two)
B) It supports QoS.
C) It supports iBGP.
Ans: D,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
912) Drag each MACsec term on the left to the right matching statement on the right?
Answer :
913) What are two advantages of NBAR2 over NBAR? (Choose two)
A) Only NBAR2 support Flexible NetFlow for extracting and exporting fields from the packet header.
D) Only NBAR2 can use Sampled NetFlow to extract pre-defined packet headers for reporting.
Answer: A, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
914)
With this configuration you notice that the IKE and IPsec SAs come up between the spoke and the hub, but NHRP
registration fails Registration will continue to fail until you do which of these?
A) Modify the NHRP network IDs to match on the hub and spoke.
B) configure the ip nhrp caches non-authoritative command on the hubs tunnel interface.
D) modify the NHRP hold time to match on the hub and spoke.
Ans: C
915) Which two OSPF network types support the concept of a designated router? (Choose two.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. broadcast
B. NBMA
C. point-to-multipoint
D. point-to-multipoint nonbroadcast
E. loopback
Answer: A, B
916) What are three QoS features supported on the ASA running version 8.x? (Choose Three)
Answer : C,D,F
917) What are the two technologies that support AFT? (Choose two)
A) SNAT
B) NAT -6to4
C) DNAT
D) NAT PT
E) NAT PMP
F) NAT64
Answer:D,F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : B
919) Which five of these are criteria for rule-based rogue classification of access points by the cisco Wireless LAN
controller? (Choose five)
Answer : B, C,D, F, H
920) You have been asked to configure a Cisco ASA appliance in multiple mode with these settings:
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D) The physical interface name for G0/1 within contextA should be "inside".
E) All other context interfaces must be viewable via their physical interface names.
If the admin context is already defined and all interfaces are enabled, which command set will complete this
configuration?
A. context contextA
config-url disk0:/contextA.cfg
context contextB
config-url disk0:/contextB.cfg
B. context contexta
config-url disk0:/contextA.cfg
context contextb
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
config-url disk0:/contextB.cfg
C. context contextA
config-url disk0:/contextA.cfg
context contextB
config-url disk0:/contextB.cfg
D. context contextA
config-url disk0:/contextA.cfg
allocate-interface GigabitEthernet0/0
context contextB
config-url disk0:/contextB.cfg
allocate-interface GigabitEthernet0/0
allocate-interface GigabitEthernet0/2
E. context contextA
config-url disk0:/contextA.cfg
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
context contextB
config-url disk0:/contextB.cfg
Answer: A
921) What are two method of preventing DoS attacks on your network? (Choose two)
C) Disable the ICMP Unreachable response on the loopback and Null0 interfaces
Answer : A E
922) Which statement about the cisco anyconnect web security module is true ?
B) It is an endpoint component that is used with smart tunnel in a clientless SSL VPN.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C) It operates as an NAC agent when it is configured with the Anyconnect VPN client.
Answer : D
923) Which two statement about DHCP snooping are true ? (Choose Two)
C) The binding database stores information about both IP and MAC addresses.
Answer : C D
924) Drag each field in authentication header on the left into the order in which it appears in the header on
the right?
Answer :
1: Next header; 2: Payload; 3: Reserved; 4: Security Parameter Index; 5: Sequence #; 6: Authentication data.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
925) Which three fields are part of the AH header? (Choose three)
A) Destination address
B) Protocol ID
C) Packet ICV
D) SPI identifying SA
E) Next header
F) Application port
G) Source address
Answer : C D E
926) What are the three response types for SCEP enrollment requests? (Choose three.)
A. PKCS#7
B. Reject
C. Pending
D. PKCS#10
E. Success
F. Renewal
Answer : B, C, E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
927) What are the two most common methods that security auditors use to assess an organization's security processes?
(Choose two)
A. social engineering attempts
B. interviews
C. policy assessment
D. penetration testing
E. document review
F. physical observations
Answer :A, E
Answer : B
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
930) Drag each attack type on the left to the matching attack category on the right.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
931) What technique can an attacker use to obfuscate a malware application payload, allowing it to bypass standard
security mechanisms?
A. Teredo tunnelling
B. Decryption
C. A PE32 header
D. Steganography
E. BASE64
Answer : E
932) Which two statements about Network Edge Authentication Technology (NEAT) are true? (Choose two)
Answer : D,E
933) Drag and drop step in the flow of packets on a DMVPN network using GDOI on the left into the correct
sequence on the right
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
An encrypted DMVPN : 3
934) What is the purpose of the vulnerability risk method for assessing risk?
Answer : C
935) Given the IPv4 address 10.10.100.16, which two address are valid IPv4-compatible IPv6 addresses? (Choose
two)
A. 0:0:0:0:0:10:10:100:16
B. 0:0:10:10:10:16:0:0:0
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. 0:0:10:10:100:16:0:0:0
D. ::10:10:100:16
E. :::A:A:64:10
Answer : A, D
A. SCEP
B. DTLS
C. ESP
D. AH
E. GET
Answer : A
937) Drag each Management Frame Protection feature on the Left to the function it performs on the right?
Answer :
Infrastructure Frame validation: Enables and disables MFP protection and validation on selective basis.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Management frame protection: Enables an access point to report management frames with invalid MICs to the WLC.
Management frame validation: Enables an access point to verify that management frame from other access points
include a valid MIC IE from the sending access points BSSID.
938)
Refer to the exhibit if R1 is acting as a DHCP server ,What action can you take to enable the pc to receive
an ip address assignment from the DHCP server ?
Answer : C
939) Drag each type of spoofing attack on the left on an action you can take to prevent it on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
DNS spoofing: Apply current updates and zone transfers only from trusted sources regularly.
940)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. What is the meaning of the given error massage ?
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
942) Which of the following Cisco IPS signature engine has relatively high memory usage ?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : C
943) Which option describes the purpose of the RADIUS VAP-ID attribute?
Answer : B
944)
Refer to the exhibit. Which statement about this debug output is true ?
A. It was generated by a LAN controller when it responded to a join request from an access point
B. It was generated by a LAN controller when it generated a join request to an access point
C. It was generated by an access point when it sent a join reply message to a LAN controller
D. It was generated by an access point when it received a join request message from a LAN controller
Answer : A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
945)
Refer to the exhibit Flexible NetFlow is failing to export flow records from RouterA to your flow collector. What
action can you take to allow the IPv6 flow records to be sent to the colle
Answer : D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
946) Drag each ISE probe on the left to the matching statement on the right
Answer :
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Dhcp:Reprofiles endpoints
HTTP:Captures Packets
947) What is the effect of the Cisco Application Control Engine (ACE) command ipv6 fragment min-mtu 1024 ?
A. It configures the interface to fragment packets on connections with MTUs of 1024 or greater
B. It sets the MTU to 1024 bytes for an IPv6 VLAN interface that accepts fragmented packets
C. It configures the interface to attempt to reassemble only IPv6 fragments that are less than 1024 bytes
D. It configures the interface to fragment packets on connections with MTUs of 1024 or less
E. It configures the interface to attempt to reassemble only IPv6 fragments that are at least 1024 bytes
Answer : E
948 )when a client tries to connect to a WLAN using the MAC filter (RADIUS server), if the client fails the
authentication, what is the web policy used to fallback authentication to web authentication ?
A.Authentication
B.Passthrough
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : E
949)
Refer to the exhibit. After you configured routes R1 and R2 for IPv6 OSPFv3 authentication as shown, the
OSPFv3 neighbor adjacency failed to establish. What is a possible reason for the problem?
Answer : C
950) Drag and drop the DNS record types from the left to the matching descriptions to the right
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
951 ) You have configured an authenticator switch in access mode on a network configured with NEAT. What
RADIUS attribute must the ISE sever return to change the switch's port mode to trunk?
A. device-traffic-class=switch
B. device-traffic-class=trunk
C. Framed-protocol=1
D. EAP-message=switch
E. Acct-Authentic=RADIUS
F. Authenticate=Administrative
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A
952)
Refer to the exhibit. What are the two effects of the given configuration? (Choose two)
A. It permits Time Exceeded messages that indicate the fragment assembly time was exceeded
B. It permits Destination Unreachable messages that indicate the host specified in the datagram rejected the
message due to filtering
C. It permits Destination Unreachable messages that indicate a problem delivering the datagram to the
destination address specified in the datagram
D. It permits Parameter Problem messages that indicate an unrecognized value in the Next Header Filed
E. It permits Parameter Problem messages that indicate an error in the header
F. It permits Destination Unreachable messages that indicate an invalid port on the host specified in the
datagram
Answer : C, F
953) In ISO 27002, access control code of practice for information Security Management servers which of the
following objective?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : A
954)
Refer to the exhibit. You executed the show crypto key mypubkey rsa command to verify that the RSA key is
protected and it generated the given output. What command must you have entered to protect the key?
Answer : D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
955) Drag and drop the role on the left onto their responsibility in the change-management process on the right
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
956)
Refer to the exhibit You have received an advisory that your organization could be running a vulnerable product.
Using the Cisco Systems Rapid Risk Vulnerability Model, you determine that * Your organization is running an
affected product on a vulnerable version of code vulnerable component is enabled and there is no feasible
workaround * There is medium confidence of an attack without significant collateral damage to the organization.
According to the model what is the appropriate urgency for remediation?
Answer : E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
957)
Refer the exhibit. Which of the following is the correct output of the above executed command?
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
958) Which two statements about VPLS and VPWS are true? (Choose two)
Answer : E,F
959)
A) It will Drop all TTL packet with a value of 14 in the IP header field.
B) It will Drop all TTL packet with a TTL value less than 14.
Answer : B
960) Which Three statement about cisco IPS manager express are true? (Choose three)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
F) It supports up to 10 sensors.
Answer : A B F
C) Transport
D) IKE
E) Main
F) Tunnel
Answer : C F
962) Which two statement about MLD version 2 on the ASA are true ? (Choose two)
A) It allows the ASA to function as a multicast router.
B) It enables the ASA to discover multicast address listeners on attached and remote links.
C) It discover other multicast address listeners by listening to multicast listener reports.
D) It enables the ASA to discover multicast address listeners to attached links only.
Answer : D E
963)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit which two statement about the given IPV6 ZBF configuration are true? (Choose two)
A) It provides backward compability with legacy IPv6 inspection
B) It inspect TCP, UDP,ICMP and FTP traffic from Z1 to Z2.
C) It inspect TCP, UDP,ICMP and FTP traffic from Z2 to Z1.
D) It inspect TCP,UDP,ICMP and FTP traffic in both direction between z1 and z2
.
E) It passes TCP, UDP,ICMP and FTP traffic from z1 to z2.
F) It provide backward compatibility with legacy IPv4 inseption.
Answer : A B
964)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) It sets the duplicate address detection interval to 60 second and sets the IPv6 neighbor reachable time
to 3600 milliseconds.
B) It sets the number of neighbor solicitation massages to 60 and sets the retransmission interval to
3600 milliseconds.
C) It sets the number of duplicate address detection attempts to 60 and sets the duplicate address
detection interval to 3600 millisecond.
D) It sets the number of neighbor solicitation massage to 60 and set the duplicate address detection
interval to 3600 second.
E) It sets the duplicate address detection interval to 60 second and set the IPv6 neighbor solicitation
interval to 3600 millisecond.
Answer : E
965) What are two features of cisco IOS that can help mitigate Blaster worm attack on RPC ports? (Choose
two)
A) FPM
B) DCAR
C) NBAR
D) IP source Guard
E) URPF
F) Dynamic ARP inspection
Answer : D E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
966) What ASA feature can do use to restrict a user to a specific VPN group?
A) A webtypeACL
B) MPF
C) A VPN filter
D) Group-lock
Answer : D
967) Which two statement about PVLAN port types are true? (Choose two)
A) A community port can send traffic to community port in other communities on its broadcast domain.
B) An isolated port can send and receive traffic only to and from promiscuous ports.
C) An isolated port can receive traffic from promiscuous port in an community on its broadcast domain,
but can send traffic only to port in its own community.
D) A promiscuous port can send traffic promiscuous port in other communities on its broadcast
domain.
E) A community port can send traffic to promiscuous port in other communities on its broadcast
domain.
F) A Promiscuous port can send traffic to all ports within a broadcast domain.
Answer : B F
968)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) The
policy will
deny all IPv6 eBGP session.
B) The policy will disable IPv6 source routing.
C) The policy will deny all IPv6 routing packet.
D) The policy will deny all IPv6 routed packet.
Answer : B
969) Which two value must you configure on the cisco ASA firewall to support FQDN ACL ? (Choose
two)
A) A DNS server
B) A Service policy
C) An FQDN object
D) A Class map
E) A services object
F) A policy map
Answer : A C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
970) Drag each step in the cisco PRIST response to incidents and vulnerability involving cisco product on the left into
the correct order on the right?
Answer :
971) From what type of server can you to transfer files to ASAs internal memory ?
A) SSH
B) SFTP
C) Netlogon
D) SMB
Answer : D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
972) Drag each SSI encryption algorithm on the left to the encryption and hashing values it uses on the Right?
Answer :
Answer : B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) UDP 4500
B) UDP 1812
C) UDP 500
D) UDP 848
Answer : D
975) Which two statement about router Advertisement message are true? (Choose two)
Or that prefix.
E) Flag setting are shared in the massage and retransmitted on the link.
Answer : A,F
976) Which Two statement about the PCoIP protocol are true? (Choose two)
D) It is a TCP-based protocol.
Answer : A C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) TTL
B) source option
C) Destination options
D) Authentication
E) Segment
F) Hop-by-Hop options
Answer : C D F
979) What is the maximum pattern length supported by FPM searches within a packet ?
A) 256 bytes
B) 1500 bytes
C) 512 bytes
D) 128 bytes
Answer : A
A) It supports secure communication between cisco ironport Cisco and Microsoft Exchange.
B) It supports Ciscos trustsec solution by transporting information over network that are unable to support
SGT propagation.
C) It support secure communications between cisco ironport and cloud-based email servers.
D) It support ciscos trustsec implementation on virtual machines.
Answer : B
981)Which command sets the Key-length for the IPv6 send protocol?
A) IPv6 nd ns-interval
B) Ipv6 ndra-interval
C) IPv6 nd prefix
D) IPv6 nd inspection
E) IPv6 nd secured
Answer : E
982)What is the purpose of enabling the IP option selective Drop feature on your network routers?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer : D
983) What command specifies the peer from which MSDP SA message are accepted?
Answer : B
984) Drag and drop the description on the left on to the associated item on the right.
Answer :
Collection of similar programs that work together to execute specific tasks: Botnet
Programs that appear to have one function but actually performs a different function: Trojan horse
985) Drag each EAP variant in the 802.1x framework to the matching statement on the right?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer :
EAP-FAST: An encapsulated EAP variant that can travel through TLS tunnel
EAP-MD5: When used, EAP servers provide authentication to EAP peers only
EAP-SIM: Enables GSM users to access both voice and data services with unified authentication.
EAP-TTLS: An early EAP variant that uses certificates based authentication of both client and server
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
986)
Refer to the exhibit, which configuration prevents R2 from become a PIM neighbor with R1?
Answer : D
987) What are feature that can stop man-in-the-middle attacks? (Choose two)
A) ARP sniffing on specific ports
B) ARP spoofing
C) Dynamic ARP inspection
D) DHCP snooping
E) destination MAC ACLs
Answer : C,D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
988)When attempting to use basic Http authentication to authenticate a client,which type of HTTP massage should
the server use?
D) HTTP 407.
Answer : B
989)
Refer to the exhibit, what Is the effect of the given command sequence?
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
990) Drag each step in the configuration of flexiblenetflow IPv6 traffic Unicast flows on the left into the Correct
order of operation on the right?
Answer :
991) Which two statement about DTLS are true ? (choose two)
C) When DPD is enabled DTLS connection can automatically fall back to TLS.
D) It overcomes the latency and bandwidth problem that can with SSL.
Answer : C , D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
992) What feature enables extended secure access from non-secure physical location?
A) Port security
B) Strom control
C) NEAT
D) CBAC
Answer : C
993)
Refer to the
Exhibit which service or feature must be enabled on 209.165.200.255 produce the given output?
Answer : C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
994) What are three protocol that support layer 7 class maps and policy maps for zone based firewalls? (choose
three)
A) IMAP
B) RDP
C) MME
D) ICQ
E) POP3
F) IKE
Answer : A D E
995)
Refer to the Exhibit, What is a possible reason for the given error?
Answer : D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
996)
Refer to the Exhibit, Which two Statements about the given Configuration are true? (Choose two)
A) It is an inbound policy.
B) It will allow 209.165.202.129 to connect to 202.165.200.225 on an IMAP port.
C) It will allow 209.165.202.129 to connect to 202.165.200.225 on an RDP port.
D) It will allow 202.165.200.225 to connect to 209.165.202.129 on an RDP port.
E) It will allow 202.165.200.225 to connect to 209.165.202.129 on a VNC port.
F) It is an outbound policy.
Answer : C A
997) Which two statements about WPA 2 with AES CCMP encryption are true? (Choose two)
Answer: A,F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
998)
Refer to the exhibit, which conclusion can be drawn from this output?
A. The license of the device supports multiple virtual firewalls
B. The license of the device allows the establishment of the maximum number of client-based, full-
tunnel SSL VPNS for the platform
C. The license of the device allows for it to be used in a failover set
D. The license of the device allows a full-tunnel IPsec VPN using the Rijndael cipher
Answer : A
999) What feature on Cisco IOS router enables user identification and authorization based on per-user policies
A. CBAC
B. IPsec
C. Authentication proxy
D. NetFlow v9
E. Zone-based firewall
F. EEM
Answer : C
1000) Which two statements about CoPP are true? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. When a deny rule in an access list is used for MQC is matched, classification continues on the next
class
B. It allows all traffic to be rate limited and discarded
C. Access lists that are used with MQC policies for CoPP should omit the log and log-input keywords
D. The mls qos command disables hardware acceleration so that CoPP handles all QoS
E. Access lists that use the log keyword can provide information about the devices CPU usage
F. The policy-map command defines the traffic class
Answer: A,C
1001) What are three pieces of data you should review in response to a suspected SSL MITM attack?
(Choose three)
A. The IP address of the SSL server
B. The X.509 certificate of the SSL server
C. The MAC address of the attacker
D. The MAC address of the SSL server
E. The X.509 certificate of the attacker
F. The DNS name off the SSL server
Answer: A, B,F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1002.Refer to the exhibit. Routers R1, R2, and R3 have IPv6 reachability, and R1 and R3 are able to ping each other
with the IPv6 global unicast address. However, R1 and R3 are unable to ping each other with their
Answer: C
1003.What are three ways you can enforce a BCP38 policy on an internet edge policy?(choose three)
Answer: B,C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. An attacker can use IPv6 Next Header attacks to steal user data and launch phishing attacks.
B. An attacker can use HTTP Header attacks to launch a DoS attack.
C. An attacker can execute a spoofing attack by populating the RH0 routing header subtype with multiple
destination addresses.
D. An attacker can leverage an HTTP response header to write malicious cookies.
E. An attacker can leverage an HTTP response header to inject malicious code into an application layer.
F. An attacker can use vulnerabilities in the IPv6 routing header to launch attacks at the application layer.
Answer: B,C
1005.Which two network protocols can operate on the Application Layer?(Choose two)
A. DNS
B. UDP
C. TCP
D. NetBIOS
E. DCCP
F. SMB
Answer: A, F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The ASA stops LSA type 7 packets from flooding into OSPF area 1.
B. The ASA injects a static default route into OSPF area 1.
C. The ASA redistributes routes from one OSPF process to another.
D. The ASA redistributes routes from one routing protocol to another.
E. The ASA injects a static default route into OSPF process 1.
Answer:C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1007.Drag and Drop each Cisco Intrusion Prevention System anomaly detection event action on the left onto the
matching description on the right.
Answer: A-4,B-3,C-1,D-2,E-5,F-7,G-6
1008.Refer to the exhibit. A signature failed to compile and returned the given error messages. What is a possible
reason for the problem?
Answer: C
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1009.The computer at 10.10.10.4 on your network has been infected by a botnet that directs traffic to a malware
site at 168.65.201.120. Assuming that filtering will be performed on a Cisco ASA, What command can you use to
block all current and future connections from the infected host?
Answer: C
1010.Which command sequence can you enter to enable IP multicast for WCCPv2?
Router(config)#interface FastEthernet0/0
Router(config)#interface FastEthernet0/0
Router(config)#interface FastEthernet0/0
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Router(config)#interface FastEthernet0/0
Router(config)#interface FastEthernet0/0
Answer: D
1011.You have discovered unwanted device with MAC address 001c.0f12.badd on port FastEthernet1/1 on
VLAN 4.what command or command sequence can you enter on the switch to prevent the MAC address from passing
traffic on VLAN 4?
A.
B.
C.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D.
E.
Answer: D
1012.In a Cisco ASA multiple-context mode of operation configuration, what three session types are resource-
limited by default when their context is a member of the default class?(choose three).
A. Telnet sessions
B. ASDM sessions
C. IPSec sessions
D. SSH sessions
E. TCP sessions
F. SSL VPN sessions
Answer: A, B,D
1013.Which two statements about ICMP redirect messages are true? (choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A,B
1014.Refer to the exhibit. What is the effect of the given command sequence?
A. The HTTP server and client will negotiate the cipher suite encryption parameters.
B. The server will accept secure HTTP connections from clients with signed security certificates.
C. The client profile will match the authorization profile defined in the AAA server.
D. The clients are added to the cipher suite's profile.
E. The server will accept secure HTTP connections form clients defined in the AAA server.
Answer: B
A. UDP 4500
B. UDP 500
C. UDP 1812
D. UDP 848
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1016.when a host initiates a TCP session, what is the numerical range into which the initial sequence number must
fail?
A. 0 to 65535
B. 1 to 1024
C. 0 to 4,294,967,295
D. 1 to 65535
E. 1 to 4,294,967,295
F. 0 to 1024
Answer: C
1017.Which three statements about Unicast RPF in strict mode and loose mode are true? (choose three)
A. Inadvertent packet loss can occur when loose mode is used with asymmetrical routing.
B. Strict mode requires a default route to be associated with the uplink network interface.
C. Both loose and strict modes are configured globally on the router.
D. Loose mode requires the source address to be present in the routing table.
E. Strict mode is recommended on interfaces that will receive packets only form the same subnet to which the
interface is assigned.
F. Interfaces in strict mode drop traffic with return routes that point to the NULL 0 interface.
Answer: D,E,F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1018.Refer to the exhibit. If you apply the given command to a Cisco device running IOS or IOS XE, which two
statements about connections to the HTTP server on the device are true?(Choose two)
A. The device will close each connection after 90 seconds even if a connection is actively processing a request.
B. Connections will close after 60 seconds without activity or 90 seconds with activity.
C. Connections will close after 60 seconds or as soon as the first request is processed.
D. When you apply the command , the device will immediately close any existing connections that have been
open for longer than 90 seconds.
E. Connections will close after 60 seconds without activity or as soon as the first request is processed.
Answer: C,E
1019.what is the most commonly used technology to establish an encrypted HTTP connection?
Answer: D
Answer: B,C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. It sends a high-power RF pulse that can damage the internals of the AP.
B. It spoofs disassociation frames from the access point.
C. It uses a brute force attack to crack the encryption.
D. It exhausts the access client association table.
Answer: D
1022.Refer to the exhibit . What is the meaning of the given error message?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1023)
Refer to the exhibit. If R1 is connected upstream to R2 and R3 at different ISPs as shown, what action must be taken
to prevent Unicast Reverse Path Forwarding (uRPF) from dropping asymmetric traffic?
Answer: E
1024.Which feature can you implement to protect against SYN-flooding DoS attacks?
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1025.Drag and drop each RADIUS packet field on the left onto the matching decription on the right.
Answer: A-5,B-2,C-1,D-3,E-4
1026.Which two effects of configuring the tunnel path-mtu-discovery command on a GRE tunnel interface are true?(
Choose two)
A. The maximum path MTU across the GRE tunnel is set to 65534 bytes.
B. If a lower MTU link between the IPsec peers is detected , the GRE tunnel MTU are changed.
C. The router adjusts the MTU value it sends to the GRE tunnel interface in the TCP SYN packet.
D. It disables PMTUD discovery for tunnel interfaces.
E. The DF bit are copied to the GRE IP header.
F. The minimum path MTU across the GRE tunnel is set to 1476 bytes.
Answer: B,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D. They use a special assembly instruction set to process remote code without conflicting with other remote
processes.
E. They can be invoked by the client and the server.
Answer: D
1028.Which two statements about role-based access control are true?(Choose two)
A. Server profile administrators have read and write access to all system logs by default.
B. If the same user name is used for a local user account and a remote user account, the roles defined in the
remote user account override the local user account.
C. A view is created on the Cisco IOS device to leverage role-based access controls.
D. Network administrators have read and write access to all system logs by default.
E. The user profile on an AAA server is configured with the roles that grant user privileges.
Answer: D,E
1029.If the ASA interfaces on a device are configured in passive mode, which mode must be configured on the
remote device to enable EtherChannel?
A. standby
B. active
C. on
D. passive
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
1031.What protocol does IPv6 Router Advertisement use for its messages?
A. TCP
B. ICMPv6
C. ARP
D. UDP
Answer: B
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1033.Refer to the exhibit. What feature must be implemented on the network to produce the given output?
A. PQ
B. CQ
C. WFQ
D. NBAR
E. CAR
Answer:D
A. AES
B. TLS
C. Telnet
D. SSH
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1035.Which command can you enter to cause the locally-originated Multicast Source Discovery Protocol Source-
Active to be prevented from going to specific peers?
Answer: C
1036.Refer to the exhibit. What IPSec function does the given debug output demonstrate?
A. DH exchange initiation
B. setting SPIs to pass traffic
C. PFS parameter negotiation
D. crypto ACL confirmation
Answer: B
1037.Which object table contains information about the clients know to the server in Cisco NHRP MIB
implementation?
Answer: D
1038.Which two statements about NAT-PT with IPv6 are true?(choose twp)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A, E
1039.What are two features that help to mitigate man-in-the-middle attacks?(Choose two)
Answer: A,E
1040.You are developing an application to manage the traffic flow of a switch using an OpenDaylight controller.
Knowing you use a Northbound REST API ,which statement is true?
A) Different applications, even in different languages, cannot use the same functions in a REST API at same
time.
B) The server retains client state records
C) We must teach our applications about the Southbound protocol(s) used
D) The applications are considered to be the clients, and the controller is considered to be the server
Answer: D
1041.What is the maximum pattern length supported by FPM searches within a packet?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) 256 bytes
B) 128 bytes
C) 512 bytes
D) 1500 bytes
Answer: A
A) An on-demand configurable pool of shared software applications allocated within a public cloud
environment, which provides tenant isolation
B) An on-demand configurable pool of shared data resources allocated within a private cloud environment,
which provides assigned DMZ zones
C) An on-demand configurable pool of shared networking resources allocated within a private cloud
environment, which provides tenant isolation
D) An on-demand configurable pool of shared computing resources allocated within a public cloud
environment, which provides tenant isolation
Answer: D
1043.Which technology builds on the vPathconcept and can be used in virtual and physical environments?
A) VXLAN
B) ACI
C) NSH
D) SDN
Answer: C
1044.What are the two technologies that support AFT? (Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) NAT-PT
B) SNAT
C) NAT64
D) DNAT
E) NAT-PMP
F) NAT-6to4
Answer: A,C
1045.Which two options are differences between automation and orchestration? (Choose two)
Answer: B,C
1046.You want to allow existing network hardware (which is not part of the ACI infrastructure) to be governed
by the APIC, by installing device packages. Where must these packages be installed?
Answer: A
1047.Which Cisco product solution is designed for workload mobility between public-public and private-public
clouds?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: C
1048.A cloud service provider is designing a large multilenant data center to support thousands of tenants. The
provider is concerned about the scalability of the Layer 2 network and providing Layer 2 segmentation to
potentially thousands of tenants. Which Layer 2 technology is best suited in this scenario?
A) LDP
B) VXLAN
C) VRF
D) Extended VLAN ranges
Answer: B
1049.What are two characteristics of RPL, used in loT environments? (Choose two)
Answer: B,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A) OpenContrail
B) OpenDaylight
C) Big Cloud Fabric
D) Virtual Application Networks SDN Controller
E) Application Policy Infrastructure Controller
Answer: A,B
Answer: A
1052.Which significant change to PCI DSS standards was made in PCI DSS version 3.1?
Answer:D
1053.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit.While troubleshooting a router issue ,you executed the show ntp associationcommand and it
returned this output.Which condition is indicated by the reach value of 357?
Answer:C
1054.
A. The current public key of the router is deleted from the cache when the router reboots, and the router
generates a new one.
B. The CA revokes the public key certificate of the router.
C. The public key of the remote peer is deleted from the router cache.
D. The router immediately deletes its current public key from the cache and generates a new one.
E. The router sends a request to the CA to delete the router certificate from its configuration.
Answer:C
A. CoPP
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B. CBAC
C. ARP spoofing
D. TCP Intercept
E. Unicast RPF
F. CAR
Answer:E
A. Rdesktop
B. UDP
C. RFB
D. Terminal Services Client
E. CoRD
F. TCP
Answer:C,F
1057.
A. The router sends PIM messages only to other routers on the same LAN.
B. The router sends PIM messages, but it rejects any PIM message it receives.
C. The router acts as a stub multicast router for the EIGRP routing protocol.
D. The router accepts all PIM control messages.
E. The router acts as the DR and DF for all bidir-PIM group ranges.
Answer:E
1058.According to RFC 4890, which three message must be dropped at the transit firewall/router?(Choose three.)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:A,B,D
A. 3DES
B. Blowfish
C. RC5
D. AES
E. IDEA
Answer:D
1060.Drag and drop each step in the SCEP process on the left into the correct order of operations on the right.
Answer:A:5,B:4,C:2,D:3,E:1,F:6.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:B,C
1062.Which two statements about the 3DES encryption protocol are true?(Choose two)
A. It can operate in the Electronic Code Book and Asymmetric Block Chaining modes.
B. Its effective key length is 168 bits.
C. It encrypts and decrypts data in three 64-bit blocks with an overall key length of 192 bits.
D. The algorithm is most efficient when it is implemented in software instead of hardware.
E. It encrypts and decrypts data in three 56-bit blocks with an overall key length of 168 bits.
F. Its effective key length is 112 bits.
Answer:E,F
1063.Which three statements about the Unicast RPF in strict mode and loose mode are true?(Choose three)
A. Loose mode requires the source address to be present in the routing table.
B. Inadvertent packet loss can occur when loose mode is used with asymmetrical routing.
C. Interfaces in strict mode drop traffic with return that point to the Null 0 Interface.
D. Strict mode requires a default route to be associated with the uplink network interface.
E. Strict mode is recommended on interfaces that will receive packets only from the same subnet to which is
assigned.
F. Both loose and strict modes are configured globally on the router.
Answer:A,C,E
1064.Which object table contains information about the clients know to the server in Cisco NHRP MIB
implementaion?
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:A
1065.
Refer to the exhibit. Which effect of this Cisco ASA policy map is true?
Answer:B
1066.Which two options are differences between a automation and orchestration?(Choose two)
Answer:B,C
1067.Which two options are system requirements for single sign-on on Cisco Unified Communications Manager?
(Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:B,E
1068.
Answer:C
1069.Which three statements about the SHA-2 algorithm are true? (Choose three)
Answer:B,C,E
1070.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
A. The WLC accepts self-signed certificates from the RADIUS server to authorize APs.
B. The WLC adds the MAC addresses listed in the ssc ap-policy to its internal authorization list.
C. The WLC adds the ssc access point to the auth-list internal authorization list.
D. The WLC accepts the manufacture-installed certificate from the local access point.
E. The WLC accepts self-signed certificates from devices added to itsa internal authorization list.
Answer:D
1071.Which two statements about implementing GDOI in a DMVPN network are true?(Choose true)
Answer:D,E
1072.Drag and drop each syslog facility code on the left onto its description on the right.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer:A:1,B2,C:3,D:4,E:5,F:6
1073.
Refer to the exhibit. Which two effect of this configuration are true ? (Choose two)
A. The Cisco ASA first check the user credentials against the AD tree of the security.cisco.com.
B. The Cisco ASA use the cisco directory as the starting point for the user search.
C. The AAA server SERVERGROUP is configured on host 10.10.10.1 with the timeout of 20 seconds.
D. The Cisco ASA uses the security account to log in to the AD directory and search for the user cisco.
E. The Cisco ASA authentication directly with the AD server configured on host 10.10.10.1 with the timeout of
20 second.
F. The admin user is authenticated against the members of the security.cisco.com group.
Answer:C,F
1074) Which of the following statement is true about the ARP attack?
A) Attackers sends the ARP request with the MAC address and IP address of a legitimate resource in the
network.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
B) Attackers sends the ARP request with the MAC address and IP address of its own.
C) ARP spoofing does not facilitate man-in-the middle attack of the attackers.
D) Attackers sends the ARP request with its own MAC address and IP address of a legitimate resource in the
network.
Answer: D
1075) Which two statements about WPA 2 in enterprise mode are true? (choose two)
A) TKIP generates a MCI to provide data integrity for the wireless frame.
B) The PMK is generated dynamically by the servers and passed to the access point.
C) 802.1x authentication is performed in the second of two authentication phases.
D) It is commonly used in home environments as well as enterprises.
E) 802.1x authentication is performed in the first of two authentication phases.
F) Session keys can be shared with multiple clients.
Answer : B, E
1076) Which two options are benefits of shortcut Switching Enhancements for NHRP on DMVPN networks?
(choose two)
A) Its enables the NHRP FIB lookup process to perform route summarization on the hub.
B) It allows data packets to be fast switched while spoke-to-spoke tunnels are being established.
C) It is most beneficial with partial full-mesh DVMPN setup.
D) It supports layered network topologies with the central hubs and direct spoke-to spoke tunnels between
spokes on different hubs.
E) It enables spokes to use a summary route to build spoke-to-spoke tunnels.
Answer: B, E
1077) Which two options are disadvantages of MPLS layers 3 VPN services? (choose two)
A) They requires cooperation with the service provider to implement transport of non-IP traffic.
B) SLAs are not supported by the service provider.
C) It requires customers to implement QoS to manage congestion in the network.
D) Integration between Layers 2 and 3 peering services is not supported.
E) They may be limited by the technology offered by the service provider.
F) They can transport only IPv6 routing traffic.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: D, E
1078)
Answer: E
1079) In which class of applications security threads does HTTP header manipulation reside?
A) Session management
B) Parameter manipulation
C) Software tampering
D) Exception managements
Answer: A
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1080) Which of the following statement is true about the ARP spoofing attack?
A) Attacker sends the ARP request with the MAC address and IP address of the legitimate resource in the
network.
B) Attacker of ends the ARP request with MAC address and IP address of its own.
C) ARP spoofing does not facilitate man in-the-middle attack for the attacker.
D) Attacker sends the ARP request with its own MAC address and IP address of legitimate resource in the
network.
Answer: D
1081) Which command can you enter on the Cisco ASA to disable SSH?
A) Crypto key generate ecdsa label
B) Crypto key generate rsa usage-keys noconfirm
C) Crypto keys generate rsa general-keys modulus 768
D) Crypto keys generate ecdsa noconfirm
E) Crypto keys zeroize rsa noconfirm
Answer: E
1082) Which two router configurations block packets with the Type 0 Routing header on the interface? (choose
two)
A) Ipv6 access-list Deny_Loose_Routing
interface FastEthernet0/0
B) Ipv6 access-list-Deny_Loose_Source_Routing
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Interface FastEthernet/0
Ipv6 tr
Affic-filter Deny_Loose_Source_Routing in
Interface FastEthernet0/0
Sequence 2 permit ipv6 any any flow label 0 routing interface Fastethernet0/0
Answer: C, D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1083) Which two statement about the DES algorithm are true?(choose two)
A) It uses a 64-bit key block size and its effective key length is 65 bits
B) It uses a 64-bits key block size and its effective key length is 56 bits
C) It is a stream cripher that can be used with any size input
D) It is more efficient in software implements than hardware implementations.
E) It is vulnerable to differential and linear cryptanalysis
F) It is resistant to square attacks
Answer: B, E
1084) Which two statements about LEAP are true? (Choose two)
A. It is compatible with the PAP and MS-CHAP protocols
B. It is an ideal protocol for campus networks
C. A symmetric key is delivered to the authenticated access point so that future connections from the
same client can be encrypted with different keys
D. It is an open standard based on IETF and IEEE standards
E. It is compatible with the RADIUS authentication protocol
F. Each encrypted session is authentication by the AD server
Answer: E,F
1085) Which Cisco ASA firewall mode supports ASDM one-time-password authentication using RSA SecurID?
A. Network translation mode
B. Single-context routed mode
C. Multiple-context mode
D. Transparent mode
Answer: B
1086) Which two statements about Cisco ASA authentication using LDAP are true? (Choose two)
A. It uses attribute maps to map the AD memberOf attribute to the cisco ASA Group-Poilcy attribute
B. It uses AD attribute maps to assign users to group policies configured under the WebVPN context
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
C. The Cisco ASA can use more than one AD memberOf attribute to match a user to multiple group
policies
D. It can assign a group policy to a user based on access credentials
E. It can combine AD attributes and LDP attributes to configure group policies on the Cisco ASA
F. It is a closed standard that manages directory-information services over distributed networks
Answer: A,B
1087)
Answer: E
1088) Which two statements about IKEv2 are true? (Choose two)
A. It uses EAP authentication
B. It uses X.509 certificates for authentication
C. The profile is a collection of transforms used to negotiate IKE SAs
D. It supports DPD and Nat-T by default
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: E,F
1089) Which two options are benefits of the Cisco ASA Identity Firewall? (Choose two)
Answer: A,D
1090)
Answer: D
1091) Which two statements about SGT Exchange Protocol are true? (Choose two)
A. It propagates the IP-to-SGT binding table across network devices that do not have the ability to perform
SGT tagging at Layer 2 to devices that support it
B. SXP runs on UDP port 64999
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A,C
1092) Drag and drop ESP header field on the left to the appropriate field length on the right
Answer:
1093)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Refer to the exhibit. Which two effects of this configuration are true? (Choose two)
A. The BGP neighbor session tears down after R1 receives 100 prefixes from the neighbor 1.1.1.1
B. The BGP neighbor session between R1 and R2 re-establishes after 50 minutes
C. A warning message is displayed on R2 after it receives 50 prefixes
D. A warning message is displayed on R2 after it receives 100 prefixes from neighbor 1.1.1.1
E. The BGP neighbor session tears down after R1 receives 200 prefixes from neighbor 2.2.2.2
F. The BGP neighbor session between R1 and R2 re-establishes after 100 minutes
Answer: D,E
1094) From the list below, which one is the major benefit of AMP Threat GRID?
A. AMP Threat Grid collects file information from customer servers and run tests on them to see if they
are infected with viruses
B. AMP Threat Grid learns ONLY from data you pass on your network and not from anything else to
monitor for suspicious behavior. This makes the system much faster and efficient
C. AMP Threat Grid combines Static, and Dynamic Malware analysis with threat intelligence into one
combined solution
D. AMP Threat Grid analyzes suspicious behavior in your network against exactly 400 behavioral
indicators
Answer: C
Answer: A,E
1096) Which two of the following ICMP types and code should be allowed in a firewall to enable traceroute?
(Choose two)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: B,C
1097) Which three types of addresses can the Botnet Traffic Filter feature of the Cisco ASA monitor? (Choose
three)
A. Ambiguous addresses
B. Known malware addresses
C. Listed addresses
D. Dynamic addresses
E. Internal addresses
F. Known allowed addresses
Answer: A,B,F
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1098)
Refer to the exhibit. Which configuration option will correctly process network authentication and
authorization using both single port ?
A.
B.
C.
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
D.
Answer: B
1099) What is the effect of the following command on Cisco IOS router?
Answer: D
1100) Which of the following is one of the components of cisco Payment Card Industry Solution?
A. Virtualization
B. Risk Assessment
C. Monitoring
D. Disaster Management
Answer: B
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1101) Which three Cisco attributes for LDAP authorization are supported on the ASA? (Choose three)
A. L2TP-Encryption
B. Web-VPN-ACL-Filters
C. IPsec-Client-Firewall-Filter-Name
D. Authenticated-User-Idle-Timeout
E. IPsec-Default-Domain
F. Authorization-Type
Answer: B,D,E
1102) Which two statements about global ACLs are true? (Choose two)
Answer: A,B
1103) When TCP intercept is enabled in its default mode, how does it react to a SYN request?
A. It intercepts the SYN before it reaches the server and responds with a SYN-ACK
B. It drops the connection
C. It monitors the attempted connection and drops it if it fails to establish within 30 seconds
D. It allows the connection without inspection
E. It monitors the sequence of SYN, SYN-ACK, and ACK messages until the connection is fully
established
Answer: E
1104) Which two statements about IPsec in a NAT-enabled environment are true? (Choose two)
A. The hashes of each peers IP address and port number are compared to determine whether NAT-T is
required
B. NAT-T is not supported when IPsec Phase 1 is set to Aggressive Mode
C. The first two messages of IPsec Phase 2 are used to determine whether the remote host supports
NAT-T
D. NAT-T is not supported when IPsec Phase 1 is set to Main Mode
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
Answer: A,D
1105) You have configured a DMVPN hub and spoke a follows (assume the IPsec profile dmvpnprofile is
configured correctly):
With this configuration, you notice that the IKE and IPsec SAs come up between the spoke and the hub, but NHRP
registration fails. Registration will continue to fail until you do which of these?
A. Configure the ipnhrp cache non-authoritative command on the hubs tunnel interface
B. Modify the NHRP hold times to match on the hub and spoke
C. Modify the NHRP network IDs to match on the hub and spoke
D. Modify the tunnel keys to match on the hub and spoke
Answer: D
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
1106) Which two options are unicast address types for IPv6 addressing? (Choose two)
A. Established
B. Static
C. Global
D. Dynamic
E. Link-local
Answer: C,E
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM
www.writtendumps.com 350-018 20-JAN-2017
OUR CCIE WRITTEN ENGINEERS ARE AVAILABLE ON SKYPE CHAT OR LIVE SUPPORT CHAT FROM
WEBSITE
ACTIVE CLIENTS WILL GET VERY SPECIAL DISCOUNTS ON OTHER CCIE TRACKS
WORLD FIRST REAL LAB RACK RENTAL FOR ALL CCIE TRACKS
CCIE RACK RENTALS -----> WWW.CCIERACK.RENTALS (CRR)
WWW.WRITTENDUMPS.COM WWW.PASSWRITTEN.COM