2014 Latest Cisco 350-018 Dump Free Download(41-50)!

QUESTION 41
If a host receives a TCP packet with an SEQ number of 1234, an ACK number of 5678, and a length of 1000 bytes, what will it send in reply?

A.    a TCP packet with SEQ number: 6678, and ACK number: 1234
B.    a TCP packet with SEQ number: 2234, and ACK number: 5678
C.    a TCP packet with SEQ number: 1234, and ACK number: 2234
D.    a TCP packet with SEQ number: 5678, and ACK number 2234

Answer: D

QUESTION 42
A network administrator uses a LAN analyzer to troubleshoot OSPF router exchange messages sent to all OSPF routers. To which one of these MAC addresses are these messages sent?

A.    00-00-1C-EF-00-00
B.    01-00-5E-00-00-05
C.    01-00-5E-EF-00-00
D.    EF-FF-FF-00-00-05
E.    EF-00-00-FF-FF-FF
F.    FF-FF-FF-FF-FF-FF

Answer: B

QUESTION 43
Comparing and contrasting IKEv1 and IKEv2, which three statements are true? (Choose three.)

A.    IKEv2 adds EAP as a method of authentication for clients; IKEv1 does not use EAP.
B.    IKEv1 and IKEv2 endpoints indicate support for NAT-T via the vendor_ID payload.
C.    IKEv2 and IKEv1 always ensure protection of the identities of the peers during the negotiation process.
D.    IKEv2 provides user authentication via the IKE_AUTH exchange; IKEv1 uses the XAUTH exchange.
E.    IKEv1 and IKEv2 both use INITIAL_CONTACT to synchronize SAs.
F.    IKEv1 supports config mode via the SET/ACK and REQUEST/RESPONSE methods; IKEv2 supports
only REQUEST/RESPONSE.

Answer: ADE

QUESTION 44
Which three statements about GDOI are true? (Choose three.)

A.    GDOI uses TCP port 848.
B.    The GROUPKEY_PULL exchange is protected by an IKE phase 1 exchange.
C.    The KEK protects the GROUPKEY_PUSH message.
D.    The TEK is used to encrypt and decrypt data traffic.
E.    GDOI does not support PFS.

Answer: BCD

QUESTION 45
Which three nonproprietary EAP methods do not require the use of a client-side certificate for mutual authentication? (Choose three.)

A.    LEAP
B.    EAP-TLS
C.    PEAP
D.    EAP-TTLS
E.    EAP-FAST

Answer: CDE

QUESTION 46
When you compare WEP to WPA (not WPA2), which three protections are gained? (Choose three.)

A.    a message integrity check
B.    AES-based encryption
C.    avoidance of weak Initialization vectors
D.    longer RC4 keys
E.    a rekeying mechanism

Answer: ACE

QUESTION 47
Which option shows the correct sequence of the DHCP packets that are involved in IP address assignment between the DHCP client and the server?

A.    REQUEST, OFFER, ACK
B.    DISCOVER, OFFER, REQUEST, ACK
C.    REQUEST, ASSIGN, ACK
D.    DISCOVER, ASSIGN, ACK
E.    REQUEST, DISCOVER, OFFER, ACK

Answer: B

QUESTION 48
Which common FTP client command transmits a direct, byte-for-byte copy of a file?

A.    ascii
B.    binary
C.    hash
D.    quote
E.    glob

Answer: B

QUESTION 49
Which option is a desktop sharing application, used across a variety of platforms, with default TCP ports 5800/5801 and 5900/5901?

A.    X Windows
B.    remote desktop protocol
C.    VNC
D.    desktop proxy

Answer: C

QUESTION 50
Which two of the following provide protect against man-in-the-middle attacks? (Choose two.)

A.    TCP initial sequence number randomization?
B.    TCP sliding-window checking
C.    Network Address Translation
D.    IPsec VPNs
E.    Secure Sockets Layer

Answer: DE

If you want to pass the Cisco 350-018 Exam sucessfully, recommend to read latest Cisco 350-018 Dump full version.

clip_image001