2014 Latest Cisco 350-018 Dump Free Download(131-140)!

QUESTION 131
Which configuration implements an ingress traffic filter on a dual-stack ISR border router to prevent attacks from the outside to services such as DNSv6 and DHCPv6?

A.    !
ipv6 access-list test
deny ipv6 FF05::/16 any
deny ipv6 any FF05::/16
! output omitted
permit ipv6 any any
!
B.    !
ipv6 access-list test
permit ipv6 any FF05::/16
! output omitted
deny ipv6 any any
!
C.    !
ipv6 access-list test
deny ipv6 any any eq dns
deny ipv6 any any eq dhcp
! output omitted
permit ipv6 any any
!
D.    !
ipv6 access-list test
deny ipv6 any 2000::/3
! output omitted
permit ipv6 any any
!
E.    !
ipv6 access-list test
deny ipv6 any FE80::/10
! output omitted
permit ipv6 any any
!

Answer: A

QUESTION 132
Which two security measures are provided when you configure 802.1X on switchports that connect to corporate-controlled wireless access points? (Choose two.)

A.    It prevents rogue APs from being wired into the network.
B.    It provides encryption capability of data traffic between APs and controllers.
C.    It prevents rogue clients from accessing the wired network.
D.    It ensures that 802.1x requirements for wired PCs can no longer be bypassed by disconnecting the
AP and connecting a PC in its place.

Answer: AD

QUESTION 133
Which option explains the passive scan technique that is used by wireless clients to discover available wireless networks?

A.    listening for access point beacons that contain available wireless networks
B.    sending a null probe request
C.    sending a null association request
D.    listening for access point probe response frames that contain available wireless networks

Answer: A

QUESTION 134
Which protocol can be used to encrypt traffic sent over a GRE tunnel?

A.    SSL
B.    SSH
C.    IPsec
D.    DH
E.    TLS

Answer: C

QUESTION 135
Which three options are security measures that are defined for Mobile IPv6? (Choose three.)

A.    IPsec SAs are used for binding updates and acknowledgements.
B.    The use of IKEv1 or IKEv2 is mandatory for connections between the home agent and mobile node.
C.    Mobile nodes and the home agents must support ESP in transport mode with non-NULL payload authentication.
D.    Mobile IPv6 control messages are protected by SHA-2.
E.    IPsec SAs are used to protect dynamic home agent address discovery.
F.    IPsec SAs can be used to protect mobile prefix solicitations and advertisements.

Answer: ACF

QUESTION 136
Which three statements are true about DES? (Choose three.)

A.    A 56-bit key is used to encrypt 56-bit blocks of plaintext.
B.    A 56-bit key is used to encrypt 64-bit blocks of plaintext.
C.    Each block of plaintext is processed through 16 rounds of identical operations.
D.    Each block of plaintext is processed through 64 rounds of identical operations.
E.    ECB, CBC, and CBF are modes of DES.
F.    Each Block of plaintext is processed through 8 rounds of identical operations.
G.    CTR, CBC, and OFB are modes of DES.

Answer: BCE

QUESTION 137
Which three statements are true about the SSH protocol? (Choose three.)

A.    SSH protocol runs over TCP port 23.
B.    SSH protocol provides for secure remote login and other secure network services over an insecure network.
C.    Telnet is more secure than SSH for remote terminal access.
D.    SSH protocol runs over UDP port 22.
E.    SSH transport protocol provides for authentication, key exchange, confidentiality, and integrity.
F.    SSH authentication protocol supports public key, password, host based, or none as authentication methods.

Answer: BEF

QUESTION 138
Which two statements are true when comparing ESMTP and SMTP? (Choose two.)

A.    Only SMTP inspection is provided on the Cisco ASA firewall.
B.    A mail sender identifies itself as only able to support SMTP by issuing an EHLO command to the mail server.
C.    ESMTP mail servers will respond to an EHLO with a list of the additional extensions they support.
D.    SMTP commands must be in upper case, whereas ESMTP can be either lower or upper case.
E.    ESMTP servers can identify the maximum email size they can receive by using the SIZE command.

Answer: CE

QUESTION 139
How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?

A.    It is included in the CIADDR field.
B.    It is included as DHCP Option 50 in the OPTIONS field.
C.    It is included in the YIADDR field.
D.    It is the source IP address of the UDP/53 wrapper packet.
E.    The client cannot request its last IP address; it is assigned automatically by the server.

Answer: B

QUESTION 140
Which two statements about an authoritative server in a DNS system are true? (Choose two.)

A.    It indicates that it is authoritative for a name by setting the AA bit in responses.
B.    It has a direct connection to one of the root name servers.
C.    It has a ratio of exactly one authoritative name server per domain.
D.    It cannot cache or respond to queries from domains outside its authority.
E.    It has a ratio of at least one authoritative name server per domain.

Answer: AE

If you want to pass the Cisco 350-018 Exam sucessfully, recommend to read latest Cisco 350-018 Dumpfull version.

clip_image001