[Free] 2018(Aug) Ensurepass Cisco 350-018 Dumps with VCE and PDF 341-350

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 350-018
100% Free Download! 100% Pass Guaranteed!

CCIE Security Exam (v4.1)

Question No: 341 – (Topic 4)

Which statement about the HTTP protocol is true?

  1. The request method does not include the protocol version.

  2. The proxy acts as an intermediary receiving agent in the request-response chain.

  3. The tunnel acts as an intermediary relay agent in the request-response chain.

  4. The gateway acts as an intermediary forwarding agent in the request-response chain.

  5. The success and error codes are returned in the response message by the user-agent.

Answer: C

Question No: 342 – (Topic 4)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

What is the cause of the issue that is reported in this debug output?

  1. The identity of the peer is not acceptable.

  2. There is an esp transform mismatch.

  3. There are mismatched ACLs on remote and local peers.

  4. The SA lifetimes are set to 0.

Answer: C

Question No: 343 – (Topic 4)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which statement about this Cisco Catalyst switch 802.1X configuration is true?

  1. If an IP phone behind the switch port has an 802.1X supplicant, MAC address bypass will still be used to authenticate the IP Phone.

  2. If an IP phone behind the switch port has an 802.1X supplicant, 802.1X authentication will be used to authenticate the IP phone.

  3. The authentication host-mode multi-domain command enables the PC connected behind the IP phone to bypass 802.1X authentication.

  4. Using the authentication host-mode multi-domain command will allow up to eight PCs connected behind the IP phone via a hub to be individually authentication using 802.1X.

Answer: B

Question No: 344 – (Topic 4)

What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access IPsec VPNs? (Choose two.)

  1. IKEv2 supports EAP authentication methods as part of the protocol.

  2. IKEv2 inherently supports NAT traversal.

  3. IKEv2 messages use random message IDs.

  4. The IKEv2 SA plus the IPsec SA can be established in six messages instead of nine messages.

  5. All IKEv2 messages are encryption-protected.

Answer: A,B

Question No: 345 – (Topic 4)

Which statement about the AH is true?

  1. AH authenticates only the data.

  2. AH authenticates only the IP header.

  3. AH authenticates only the TCP-UDP header.

  4. AH authenticates the entire packet and any mutable fields.

  5. AH authenticates the entire packet except for any mutable fields.

Answer: E

Question No: 346 – (Topic 4)

Which two statements are correct regarding the AES encryption algorithm? (Choose two.)

  1. It is a FIPS-approved symmetric block cipher.

  2. It supports a block size of 128, 192, or 256 bits.

  3. It supports a variable length block size from 16 to 448 bits.

  4. It supports a cipher key size of 128, 192, or 256 bits.

  5. The AES encryption algorithm is based on the presumed difficulty of factoring large integers.

Answer: A,D

Question No: 347 – (Topic 4)

Which protocol is superseded by AES?

  1. DES

  2. RSA

  3. RC4

  4. MD5

Answer: A

Question No: 348 – (Topic 4)

How does 3DES use the DES algorithm to encrypt a message?

  1. encrypts a message with K1, decrypts the output with K2, then encrypts it with K3

  2. encrypts a message with K1, encrypts the output with K2, then encrypts it with K3

  3. encrypts K1 using K2, then encrypts it using K3, then encrypts a message using the output key

  4. encrypts a message with K1, encrypts the output with the K2, then decrypts it with K3

Answer: A

Question No: 349 – (Topic 4)

Which three options correctly describe the AH protocol? (Choose three.)

  1. The AH protocol encrypts the entire IP and upper layer protocols for security.

  2. The AH protocol provides connectionless integrity and data origin authentication.

  3. The AH protocol provides protection against replay attacks.

  4. The AH protocol supports tunnel mode only.

  5. The AH protocol uses IP protocol 51.

  6. The AH protocol supports IPv4 only.

Answer: B,C,E

Question No: 350 – (Topic 4)

What is the purpose of the OCSP protocol?

  1. checks the revocation status of a digital certificate

  2. submits a certificate signing request

  3. verifies a signature of a digital certificate

  4. protects a digital certificate with its private key

Answer: A

100% Ensurepass Free Download!
350-018 PDF
100% Ensurepass Free Guaranteed!
350-018 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.