[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 101-110

Ensurepass

QUESTION 101

When you compare WEP to WPA (not WPA2), which three protections are gained? (Choose three.)

 

A.

a message integrity check

B.

AES-based encryption

C.

avoidance of weak Initialization vectors

D.

longer RC4 keys

E.

a rekeying mechanism

 

Correct Answer: ACE

 

 

QUESTION 102

Which option shows the correct sequence of the DHCP packets that are involved in IP address assignment between the DHCP client and the server?

 

A.

REQUEST, OFFER, ACK

B.

DISCOVER, OFFER, REQUEST, ACK

C.

REQUEST, ASSIGN, ACK

D.

DISCOVER, ASSIGN, ACK

E.

REQUEST, DISCOVER, OFFER, ACK

 

Correct Answer: B

 

 

QUESTION 103

Which common FTP client command transmits a direct, byte-for-byte copy of a file?

 

A.

ascii

B.

binary

C.

hash

D.

quote

E.

glob

 

Correct Answer: B

 

 

 

 

QUESTION 104

Which option is a desktop sharing application, used across a variety of platforms, with default TCP ports 5800/5801 and 5900/5901?

 

A.

X Windows

B.

remote desktop protocol

C.

VNC

D.

desktop proxy

 

Correct Answer: C

 

 

QUESTION 105

Which two of the following provide protect against man-in-the-middle attacks? (Choose two.)

 

A.

TCP initial sequence number randomization?

B.

TCP sliding-window checking

C.

Network Address Translation

D.

IPsec VPNs

E.

Secure Sockets Layer

 

Correct Answer: DE

 

 

QUESTION 106

Refer to the exhibit. Which statement is true?

 

clip_image002

 

A.

This packet decoder is using relative TCP sequence numbering?.

B.

This TCP client is proposing the use of TCP window scaling?.

C.

This packet represents an active FTP data session?.

D.

This packet contains no TCP payload.

 

Correct Answer: D

 

 

QUESTION 107

An exploit that involves connecting to a specific TCP port and gaining access to an administrative command prompt is an example of which type of attack?

 

A.

botnet

B.

Trojan horse

C.

privilege escalation

D.

DoS

 

Correct Answer: C

 

 

QUESTION 108

When configuring an Infrastructure ACL (iACL) to protect the IPv6 infrastructure of an enterprise network, where should the iACL be applied??

 

A.

all infrastructure devices in both the inbound and outbound direction

B.

all infrastructure devices in the inbound direction

C.

all infrastructure devices in the outbound direction

D.

all parameter devices in both the inbound and outbound direction

E.

all parameter devices in the inbound direction

F.

all parameter devices in the outbound direction

 

Correct Answer: E

 

 

QUESTION 109

What feature on the Cisco ASA is used to check for the presence of an up-to-date antivirus vendor on an AnyConnect client?

 

A.

Dynamic Access Policies with no additional options

B.

Dynamic Access Policies with Host Scan enabled

C.

advanced endpoint assessment

D.

LDAP attribute maps obtained from Antivirus vendor

 

Correct Answer: B

 

 

QUESTION 110

What type of attack consists of injecting traffic that is marked with the DSCP value of EF into the network?

 

A.

brute-force attack

B.

QoS marking attack

C.

DHCP starvation attack

D.

SYN flood attack

 

Correct Answer: B

 

Free VCE & PDF File for Cisco 350-018 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …