[Free] Download New Updated (April 2016) Cisco 350-018 Actual Tests 251-260

Ensurepass

QUESTION 251

Beacons, probe request, and association request frames are associated with which category?

 

A.

management

B.

control

C.

data

D.

request

 

Correct Answer: A

 

 

QUESTION 252

Which feature can be implemented to avoid any MPLS packet loss?

 

A.

IP TTL propagation

B.

LDP IGP sync

C.

label advertisement sync

D.

conditional label advertisement

E.

PHP

 

Correct Answer: B

 

 

QUESTION 253

Which four types of VPN natively provide encryption of user traffic? (Choose four.)

 

A.

MPLS

B.

IPsec

C.

L2TPv3

D.

SSL

E.

VPLS

F.

AToM

G.

GETVPN

H.

Microsoft PPTP

 

Correct Answer: BDGH

 

QUESTION 254

Which three options are components of Mobile IPv6? (Choose three.)

 

A.

home agent

B.

correspondent node

C.

mobile node

D.

binding node

E.

discovery probe

 

Correct Answer: ABC

 

 

QUESTION 255

What are two uses of an RSA algorithm? (Choose two.)

 

A.

Data encryption

B.

Digital signature verification

C.

Shared key generation

D.

Message hashing

 

Correct Answer: AB

 

 

QUESTION 256

What is needed to verify a digital signature that was created using an RSA algorithm?

 

A.

public key

B.

private key

C.

both public and private key

D.

trusted third-party certificate

 

Correct Answer: A

 

 

QUESTION 257

Which algorithm is used to generate the IKEv2 session key?

 

A.

Diffie-Hellman

B.

Rivest, Shamir, and Adleman

C.

Secure Hash Algorithm

D.

Rivest Cipher 4

 

Correct Answer: A

 

 

QUESTION 258

Which statement is true about IKEv2 and IKEv1?

 

A.

IKEv2 can be configured to use EAP, but IKEv1 cannot.

B.

IKEv2 can be configured to use AES encryption, but IKEv1 cannot.

C.

IKEv2 can be configured to interoperate with IKEv1 on the other end.

D.

IKEv2 consumes more bandwidth than IKEv1.

Correct Answer: A

 

 

QUESTION 259

Which statement is true about IKEv2 preshared key authentication between two peers?

 

A.

IKEv2 allows usage of different preshared keys for local and remote authentication.

B.

IKEv2 allows usage of only one preshared key.

C.

IKEv2 allows usage of only one preshared key and only in hub-and-spoke topology.

D.

IKEv2 does not allow usage of preshared key authentication.

 

Correct Answer: A

 

 

QUESTION 260

How does 3DES use the DES algorithm to e
ncrypt a message?

 

A.

encrypts a message with K1, decrypts the output with K2, then encrypts it with K3

B.

encrypts a message with K1, encrypts the output with K2, then encrypts it with K3

C.

encrypts K1 using K2, then encrypts it using K3, then encrypts a message using the output key

D.

encrypts a message with K1, encrypts the output with the K2, then decrypts it with K3

 

Correct Answer: A

 

Free VCE & PDF File for Cisco 350-018 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …