2014 Latest Cisco 350-018 Dump Free Download(21-30)!

QUESTION 21
Which method of output queuing is supported on the Cisco ASA appliance?

A.    CBWFQ
B.    priority queuing
C.    MDRR
D.    WFQ
E.    custom queuing

Answer: B

QUESTION 22
Which four values can be used by the Cisco IPS appliance in the risk rating calculation? (Choose four.)

A.    attack severity rating
B.    target value rating
C.    signature fidelity rating
D.    promiscuous delta
E.    threat rating
F.    alert rating

Answer: ABCD

QUESTION 23
Which three authentication methods does the Cisco IBNS Flexible Authentication feature support? (Choose three.)

A.    cut-through proxy
B.    dot1x
C.    MAB
D.    SSO
E.    web authentication

Answer: BCE

QUESTION 24
Troubleshooting the web authentication fallback feature on a Cisco Catalyst switch shows that clients with the 802.1X supplicant are able to authenticate, but clients without the supplicant are not able to use web authentication. Which configuration option will correct this issue?

A.    switch(config)# aaa accounting auth-proxy default start-stop group radius
B.    switch(config-if)# authentication host-mode multi-auth
C.    switch(config-if)# webauth
D.    switch(config)# ip http server
E.    switch(config-if)# authentication priority webauth dot1x

Answer: D

QUESTION 25
Which option on the Cisco ASA appliance must be enabled when implementing botnet traffic filtering?

A.    HTTP inspection
B.    static entries in the botnet blacklist and whitelist
C.    global ACL
D.    NetFlow
E.    DNS inspection and DNS snooping

Answer: E

QUESTION 26
Which signature engine is used to create a custom IPS signature on a Cisco IPS appliance that triggers when a vulnerable web application identified by the “/runscript.php” URI is run?

A.    AIC HTTP
B.    Service HTTP
C.    String TCP
D.    Atomic IP
E.    META
F.    Multi-String

Answer: B

QUESTION 27
With the Cisco FlexVPN solution, which four VPN deployments are supported? (Choose four.)

A.    site-to-site IPsec tunnels?
B.    dynamic spoke-to-spoke IPSec tunnels? (partial mesh)
C.    remote access from software or hardware IPsec clients?
D.    distributed full mesh IPsec tunnels?
E.    IPsec group encryption using GDOI?
F.    hub-and-spoke IPsec tunnels?

Answer: ABCF

QUESTION 28
Which four techniques can you use for IP management plane security? (Choose four.)

A.    Management Plane Protection
B.    uRPF
C.    strong passwords
D.    RBAC
E.    SNMP security measures
F.    MD5 authentication

Answer: ACDE

QUESTION 29
Which three statements about remotely triggered black hole filtering are true? (Choose three.)

A.    It filters undesirable traffic.
B.    It uses BGP or OSPF to trigger a network-wide remotely controlled response to attacks.
C.    It provides a rapid-response technique that can be used in handling security-related events
and incidents.
D.    It requires uRPF.

Answer: ACD

QUESTION 30
Which three statements about Cisco Flexible NetFlow are true? (Choose three.)

A.    The packet information used to create flows is not configurable by the user.
B.    It supports IPv4 and IPv6 packet fields.
C.    It tracks all fields of an IPv4 header as well as sections of the data payload.
D.    It uses two types of flow cache, normal and permanent.
E.    It can be a useful tool in monitoring the network for attacks.

Answer: BCE

If you want to pass the Cisco 350-018 Exam sucessfully, recommend to read latest Cisco 350-018 Dump full version.

clip_image001