2014 Latest Cisco 350-018 Dump Free Download(141-150)!

QUESTION 141
Which three security features were introduced with the SNMPv3 protocol? (Choose three.)

A.    Message integrity, which ensures that a packet has not been tampered with in-transit
B.    DoS prevention, which ensures that the device cannot be impacted by SNMP buffer overflow
C.    Authentication, which ensures that the message is from a valid source
D.    Authorization, which allows access to certain data sections for certain authorized users
E.    Digital certificates, which ensure nonrepudiation of authentications
F.    Encryption of the packet to prevent it from being seen by an unauthorized source

Answer: ACF

QUESTION 142
Which common Microsoft protocol allows Microsoft machine administration and operates over TCP port 3389?

A.    remote desktop protocol
B.    desktop mirroring
C.    desktop shadowing
D.    Tarantella remote desktop

Answer: A

QUESTION 143
To prevent a potential attack on a Cisco IOS router with the echo service enabled, what action should you take?

A.    Disable the service with the no ip echo command.
B.    Disable the service with the no echo command.
C.    Disable tcp-small-servers.
D.    Disable this service with a global access-list.

Answer: C

QUESTION 144
Which query type is required for an nslookup on an IPv6 addressed host?

A.    type=AAAA
B.    type=ANY
C.    type=PTR
D.    type=NAME-IPV6

Answer: A

QUESTION 145
Which three features describe DTLS protocol? (Choose three.)

A.    DTLS handshake does not support reordering or manage loss packets.
B.    DTLS provides enhanced security, as compared to TLS.
C.    DTLS provides block cipher encryption and decryption services.
D.    DTLS is designed to prevent man-in-the-middle attacks, message tampering, and message forgery.
E.    DTLS is used by application layer protocols that use UDP as a transport mechanism.
F.    DTLS does not support replay detection.

Answer: CDE

QUESTION 146
Which statement regarding TFTP is not true?

A.    Communication is initiated over UDP port 69.
B.    Files are transferred using a secondary data channel.
C.    Data is transferred using fixed-size blocks.
D.    TFTP authentication information is sent in clear text.
E.    TFTP is often utilized by operating system boot loader procedures.
F.    The TFTP protocol is implemented by a wide variety of operating systems and network devices.

Answer: D

QUESTION 147
User A at Company A is trying to transfer files to Company B, using FTP. User A can connect to the FTP server at Company B correctly, but User A cannot get a directory listing or upload files.
The session hangs.
What are two possible causes for this problem? (Choose two.)

A.    Active FTP is being used, and the firewall at Company A is not allowing the returning data connection
to be initiated from the FTP server at Company B.
B.    Passive FTP is being used, and the firewall at Company A is not allowing the returning data connection
to be initiated from the FTP server at Company B.
C.    At Company A, active FTP is being used with a non-application aware firewall applying NAT to the
source address of User A only.
D.    The FTP server administrator at Company B has disallowed User A from accessing files on that server.
E.    Passive FTP is being used, and the firewall at Company B is not allowing connections through to port 20
on the FTP server.

Answer: AC

QUESTION 148
Which three new capabilities were added to HTTP v1.1 over HTTP v1.0? (Choose three.)

A.    chunked transfer encoding
B.    HTTP pipelining
C.    POST method
D.    HTTP cookies
E.    keepalive mechanism

Answer: ABE

QUESTION 149
Which three Cisco security product features assist in preventing TCP-based man-in-the-middle attacks? (Choose three.)

A.    Cisco ASA TCP initial sequence number randomization?
B.    Cisco ASA TCP sliding-window conformance validation?
C.    Cisco IPS TCP stream reassembly?
D.    Cisco IOS TCP maximum segment size adjustment?

Answer: ABC

QUESTION 150
Which would be the best method to deploy on a Cisco ASA to detect and prevent viruses and worms?

A.    deep packet inspection
B.    content security via the Control Security Services Module
C.    Unicast Reverse Path Forwarding
D.    IP audit signatures

Answer: B

If you want to pass the Cisco 350-018 Exam sucessfully, recommend to read latest Cisco 350-018 Dumpfull version.

clip_image001