QUESTION 161
Which IOS QoS mechanism is used strictly to rate limit traffic destined to the router itself?
A. Single-Rate Policier.
B. Control Plane Policing
C. Dual-Rate Policier
D. Class-Based Policing
Answer: B
QUESTION 162
Which of the following statements are true regarding hashing?
A. SHA-256 is an extension to SHA-1 with a longer output
B. SHA-1 is stronger than MD5 because it can be used with a key to prevent modification
C. MD5 takes more CPU cycles to compute than SHA-1
D. MD5 produces a 160-bit result
E. Changing 1 bit of the input to SHA-1 changes 1 bit of the output
Answer: AE
QUESTION 163
After a client discovers a supportable wireless network, what is the correct sequence of operations that the client will take to join it?
A. association, then authentication
B. authentication, then association
C. probe request, then association
D. authentication, then authorization
Answer: B
QUESTION 164
Which authentication scheme, that is supported on the Cisco ASA, generates a unique key that is used in a single password challenge?
A. one-time passwords
B. disposable certificates
C. password management
D. Capcha web text
Answer: A
QUESTION 165
Which label is advertised by an LSR to inform neighboring LSRs to perform the penultimate hop popping operation?
A. 0x00
B. php
C. swap
D. push
E. imp-null
Answer: E
QUESTION 166
When the RSA algorithm is used for signing a message from Alice to Bob, which statement best describes that operation?
A. Alice signs the message with her private key, and Bob verifies that signature with Alice’s public key.
B. Alice signs the message with her public key, and Bob verifies that signature with Alice’s private key.
C. Alice signs the message with Bob’s private key, and Bob verifies that signature with his public key.
D. Alice signs the message with Bob’s public key, and Bob verifies that signature with his private key.
E. Alice signs the message with her public key, and Bob verifies that signature with his private key.
F. Alice signs the message with her private key, and Bob verifies that signature with his public key.
Answer: A
QUESTION 167
Which three statements about triple DES are true? (Choose three.)
A. For 3DES, ANSI X9.52 describes three options for the selection of the keys in a bundle, where all
keys are independent.
B. A 3DES key bundle is 192 bits long.
C. A 3DES keyspace is168 bits.
D. CBC, 64-bit CFB, OFB, and CTR are modes of 3DES.
E. 3DES involves encrypting a 64-bit block of plaintext with the 3 keys of the key bundle.
Answer: BCD
QUESTION 168
Which three options correctly describe the AH protocol? (Choose three.)
A. The AH protocol encrypts the entire IP and upper layer protocols for security.
B. The AH protocol provides connectionless integrity and data origin authentication.
C. The AH protocol provides protection against replay attacks.
D. The AH protocol supports tunnel mode only.
E. The AH protocol uses IP protocol 51.
F. The AH protocol supports IPv4 only.
Answer: BCE
QUESTION 169
Which three features are supported with ESP? (Choose three.)
A. ESP uses IP protocol 50.
B. ESP supports Layer 4 and above encryption only.
C. ESP provides confidentiality, data origin authentication, connectionless integrity, and antireplay service.
D. ESP supports tunnel or transport modes.
E. ESP has less overhead and is faster than the AH protocol.
F. ESP provides confidentiality, data origin authentication, connection-oriented integrity, and antireplay service.
Answer: ACD
QUESTION 170
Which three statements are true about TLS? (Choose three.)
A. TLS protocol uses a MAC to protect the message integrity.
B. TLS data encryption is provided by the use of asymmetric cryptography.
C. The identity of a TLS peer can be authenticated using public key or asymmetric cryptography.
D. TLS protocol is originally based on the SSL 3.0 protocol specification.
E. TLS provides support for confidentiality, authentication, and nonrepudiation.
Answer: ACD
If you want to pass the Cisco 350-018 Exam sucessfully, recommend to read latest Cisco 350-018 Dumpfull version.