QUESTION 211
Which three of these situations warrant engagement of a Security Incident Response team? (Choose three.)
A. loss of data confidentiality/integrity
B. damage to computer/network resources
C. denial of service (DoS)
D. computer or network misuse/abuse
E. pornographic blogs/websites
Answer: ACD
QUESTION 212
Which three statements about the Cisco IPS sensor are true? (Choose three.)
A. You cannot pair a VLAN with itself.
B. For a given sensing interface, an interface used in a VLAN pair can be a member of another inline
interface pair.
C. For a given sensing interface, a VLAN can be a member of only one inline VLAN pair, however,
a given VLAN can be a member of an inline VLAN pair on more than one sensing interface.
D. The order in which you specify the VLANs in a inline pair is significant.
E. A sensing interface in inline VLAN pair mode can have from 1 to 255 inline VLAN pairs.
Answer: ACE
QUESTION 213
Which two VLSM subnets, when taken as a pair, overlap? (Choose two.)
A. 10.22.21.128/26
B. 10.22.22.128/26
C. 10.22.22.0/27
D. 10.22.20.0/23
E. 10.22.16.0/22
Answer: AD
QUESTION 214
The address of an inside client is translated from a private address to a public address by a NAT
router for access to an outside web server. What term describes the destination address (client) after the outside web server responds, and before it hits the NAT router?
A. inside local
B. inside global
C. outside local
D. outside global
Answer: B
QUESTION 215
What is the ICMPv6 type and destination IPv6 address for a Neighbor Solicitation packet that is sent by a router that wants to learn about a newly introduced network device?
A. ICMP type 136 and the Solicited-Node multicast address
B. ICMP type 135 and the Broadcast address
C. ICMP type 136 and the All-Routers multicast address
D. ICMP type 135 and the All-Routers multicast address
E. ICMP type 135 and the Solicited-Node multicast address
F. ICMP type 136 and the Broadcast address
Answer: E
QUESTION 216
Which three statements are true about Cryptographically Generated Addresses for IPv6? (Choose three.)
A. They prevent spoofing and stealing of existing IPv6 addresses.
B. They are derived by generating a random 128-bit IPv6 address based on the public key of the node.
C. They are used for securing neighbor discovery using SeND.
D. SHA or MD5 is used during their computation.
E. The minimum RSA key length is 512 bits.
F. The SHA-1 hash function is used during their computation.
Answer: ACF
QUESTION 217
Which three options are extension headers that are implemented in IPv6? (Choose three.)
A. Routing Header.
B. Generic Tunnel Header.
C. Quality of Service Header.
D. Fragment Header.
E. Encapsulating Security Payload Header.
F. Path MTU Discovery Header.
Answer: ADE
QUESTION 218
What is a key characteristic of MSTP?
A. always uses a separate STP instance per VLAN to increase efficiency
B. only supports a single STP instance for all VLANs
C. is a Cisco proprietary standard
D. several VLANs can be mapped to the same spanning-tree instance
Answer: D
QUESTION 219
Which spanning-tree mode supports a separate spanning-tree instance for each VLAN and also supports the 802.1w standard that has a faster convergence than 802.1D?
A. PVST+
B. PVRST+
C. PVST
D. CST
E. MST
F. RST
Answer: B
QUESTION 220
Which three LSA types are used by OSPFv3? (Choose three.)
A. Link LSA
B. Intra-Area Prefix LSA
C. Interarea-prefix LSA for ASBRs
D. Autonomous system external LSA
E. Internetwork LSA
Answer: ABD
If you want to pass the Cisco 350-018 Exam sucessfully, recommend to read latest Cisco 350-018 Dumpfull version.