2014 Latest Cisco 350-018 Dump Free Download(221-230)!

QUESTION 221
Which protocol provides the same functions in IPv6 that IGMP provides in IPv4 networks?

A.    ICMPv6
B.    ND
C.    MLD
D.    TLA

Answer: C

QUESTION 222
Which additional capability was added in IGMPv3?

A.    leave group messages support
B.    source filtering support
C.    group-specific host membership queries support
D.    IPv6 support
E.    authentication support between the multicast receivers and the last hop router

Answer: B

QUESTION 223
Beacons, probe request, and association request frames are associated with which category?

A.    management
B.    control
C.    data
D.    request

Answer: A

QUESTION 224
Which feature can be implemented to avoid any MPLS packet loss?

A.    IP TTL propagation
B.    LDP IGP sync
C.    label advertisement sync
D.    conditional label advertisement
E.    PHP

Answer: B

QUESTION 225
Which four types of VPN natively provide encryption of user traffic? (Choose four.)

A.    MPLS
B.    IPsec
C.    L2TPv3
D.    SSL
E.    VPLS
F.    AToM
G.    GETVPN
H.    Microsoft PPTP

Answer: BDGH

QUESTION 226
Which three options are components of Mobile IPv6? (Choose three.)

A.    home agent
B.    correspondent node
C.    mobile node
D.    binding node
E.    discovery probe

Answer: ABC

QUESTION 227
What are two uses of an RSA algorithm? (Choose two.)

A.    data encryption
B.    digital signature verification
C.    shared key generation
D.    message hashing

Answer: AB

QUESTION 228
What is needed to verify a digital signature that was created using an RSA algorithm?

A.    public key
B.    private key
C.    both public and private key
D.    trusted third-party certificate

Answer: A

QUESTION 229
Which algorithm is used to generate the IKEv2 session key?

A.    Diffie-Hellman
B.    Rivest, Shamir, and Adleman
C.    Secure Hash Algorithm
D.    Rivest Cipher 4

Answer: A

QUESTION 230
Which statement is true about IKEv2 and IKEv1?

A.    IKEv2 can be configured to use EAP, but IKEv1 cannot.
B.    IKEv2 can be configured to use AES encryption, but IKEv1 cannot.
C.    IKEv2 can be configured to interoperate with IKEv1 on the other end.
D.    IKEv2 consumes more bandwidth than IKEv1.

Answer: A

If you want to pass the Cisco 350-018 Exam sucessfully, recommend to read latest Cisco 350-018 Dumpfull version.

clip_image001