[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 111-120

Ensurepass

QUESTION 111

Which statement is true regarding Cisco ASA operations using software versions 8.3 and later?

 

A.

The global access list is matched first before the interface access lists.

B.

Both the interface and global access lists can be applied in the input or output direction.

C.

When creating an access list entry using the Cisco ASDM Add Access Rule window, choosing “global” as the interface will apply the access list entry globally.

D.

NAT control is enabled by default.

E.

The static CLI command is used to configure static NAT translation rules.

 

Correct Answer: C

 

 

QUESTION 112

Which three multicast features are supported on the Cisco ASA? (Choose three.)

 

A.

PIM sparse mode?

B.

IGMP forwarding?

C.

Auto-RP

D.

NAT of multicast traffic?

 

Correct Answer: ABD

 

 

QUESTION 113

Which three configuration tasks are required for VPN clustering of AnyConnect clients that are connecting to an FQDN on the Cisco ASA?? (Choose three.)

 

A.

The redirect-fqdn command must be entered under the vpn load-balancing sub-configuration.

B.

Each ASA in the VPN cluster must be able to resolve the IP of all DNS hostnames that are used in the cluster?.

C.

The identification and CA certificates for the master FQDN hostname must be imported into each VPN cluster-member device?.

D.

The remote-access IP pools must be configured the same on each VPN cluster-member interface.

 

Correct Answer: ABC

 

 

QUESTION 114

Which three statements are true about objects and object groups on a Cisco ASA appliance that is running Software Version 8.4 or later? (Choose three.)

 

A.

TCP, UDP, ICMP, and ICMPv6 are supported service object protocol types.

B.

IPv6 object nesting is supported.

C.

Network objects support IPv4 and IPv6 addresses.

D.

Objects are not supported in transparent mode.

E.

Objects are supported in single- and multiple-context firewall modes.

 

Correct Answer: ACE

QUESTION 115

Which command is used to replicate HTTP connections from the Active to the Standby Cisco ASA appliance in failover?

 

A.

monitor-interface http

B.

failover link fover replicate http

C.

failover replication http

D.

interface fover replicate http standby

E.

No command is needed, as this is the default behavior.

 

Correct Answer: C

 

 

QUESTION 116

Refer to the exhibit. Given the Cisco ASA configuration above, which commands need to be added in order for the Cisco ASA appliance to deny all IPv6 packets with more than three extension headers?

 

policy-map type inspect ipv6 IPv6-map

match header routing-type range 0 255

drop

class-map outside-class

match any

policy-map outside-policy

class outside-class

inspect ipv6 IPv6-map

service-policy outside-policy interface outside

 

clip_image002

A.

policy-map type inspect ipv6 IPv6-map

match ipv6 header

count > 3

B.

policy-map outside-policy

class outside-class

inspect ipv6 header count gt 3

C.

class-map outside-class

match ipv6 header count greater 3

D.

policy-map type inspect ipv6 IPv6-map

match header count gt 3

drop

 

Correct Answer: D

 

 

QUESTION 117

Which C3PL configuration component is used to tune the inspection timers such as setting the tcp idle-time and tcp synwait-time on the Cisco ZBFW?

 

A.

class-map type inspect

B.

parameter-map type inspect

C.

service-policy type inspect

D.

policy-map type inspect tcp

E.

inspect-map type tcp

 

Correct Answer: B

 

 

QUESTION 118

Which three NAT types support bidirectional traffic initiation? (Choose three.)

 

A.

static NAT

B.

NAT exemption

C.

policy NAT with nat/global

D.

static PAT

E.

identity NAT

 

Correct Answer: ABD

 

 

QUESTION 119

Which IPS module can be installed on the Cisco ASA 5520 appliance?

 

A.

IPS-AIM

B.

AIP-SSM

C.

AIP-SSC

D.

NME-IPS-K9

E.

IDSM-2

 

Correct Answer: B

 

 

 

QUESTION 120

Which two options best describe the authorization process as it relates to network access? (Choose two.)

 

A.

the process of identifying the validity of a certificate, and validating specific fields in the certificate against an identity store

B.

the process of providing network access to the end user

C.

applying enforcement controls, such as downloadable ACLs and VLAN assignment, to the network access session of a user

D.

the process of validating the provided credentials

 

Correct Answer: BC

 

Free VCE & PDF File for Cisco 350-018 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …