ITExamDump의 제품을 구매하시면 우리는 일년무료업데이트 서비스를 제공함으로 여러분을 인증시험을 패스하게 도와줍니다. 만약 인증시험내용이 변경이 되면 우리는 바로 여러분들에게 알려드립니다.그리고 최신버전이 있다면 바로 여러분들한테 보내드립니다. ITExamDump는 한번에Cisco 351-018인증시험을 패스를 보장합니다.
IT업계에 종사하시는 분들은 IT인증시험을 통한 자격증취득의 중요성을 알고 계실것입니다. ITExamDump에서 제공해드리는 인증시험대비 고품질 덤프자료는 제일 착한 가격으로 여러분께 다가갑니다. ITExamDump덤프는 IT인증시험에 대비하여 제작된것으로서 높은 적중율을 자랑하고 있습니다.덤프를 구입하시면 일년무료 업데이트서비스, 시험불합격시 덤프비용환불 등 퍼펙트한 서비스도 받을수 있습니다.
시험 번호/코드: 351-018
시험 이름: Cisco (CCIE Security written)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 560 문항
업데이트: 2013-09-28
ITExamDump 는 완전히 여러분이 인증시험 준비와 안전한 시험패스를 위한 완벽한 덤프제공 사이트입니다.우리 ITExamDump의 덤프들은 응시자에 따라 ,시험 ,시험방법에 따라 알 맞춤한 퍼펙트한 자료입니다.여러분은 ITExamDump의 알맞춤 덤프들로 아주 간단하고 편하게 인증시험을 패스할 수 있습니다.많은 it인증관연 응시자들은 우리 ITExamDump가 제공하는 문제와 답으로 되어있는 덤프로 자격증을 취득하셨습니다.우리 ITExamDump 또한 업계에서 아주 좋은 이미지를 가지고 있습니다.
요즘 같은 인재가 많아지는 사회에도 많은 업계에서는 아직도 관련인재가 부족하다고 합니다.it업계에서도 이러한 상황입니다.Cisco 351-018시험은 it인증을 받을 수 있는 좋은 시험입니다. 그리고ITExamDump는Cisco 351-018덤프를 제공하는 사이트입니다.
ITExamDump에는Cisco 351-018인증시험의 특별한 합습가이드가 있습니다. 여러분은 많은 시간과 돈을 들이지 않으셔도 많은 IT관련지식을 배우실수 있습니다.그리고 빠른 시일 내에 여러분의 IT지식을 인증 받으실 있습니다. ITExamDump인증자료들은 우리의 전문가들이 자기만의 지식과 몇 년간의 경험으로 준비중인 분들을 위하여 만들었습니다.
ITExamDump에서 출시한 Cisco인증 351-018덤프는Cisco인증 351-018시험에 대비하여 IT전문가들이 제작한 최신버전 공부자료로서 시험패스율이 100%입니다.ITExamDump는 고품질 Cisco인증 351-018덤프를 가장 친근한 가격으로 미래의 IT전문가들께 제공해드립니다. ITExamDump의 소원대로 멋진 IT전문가도 거듭나세요.
Cisco 351-018인증시험은 전업적지식이 강한 인증입니다. IT업계에서 일자리를 찾고 계시다면 많은 회사에서는Cisco 351-018있는지 없는지에 알고 싶어합니다. 만약Cisco 351-018자격증이 있으시다면 여러분은 당연히 경쟁력향상입니다.
351-018 덤프무료샘플다운로드하기: http://www.itexamdump.com/351-018.html
NO.1 After the client opens the command channel (port 21) to the FTP server and requests passive mode,
what will be the next step?
A. The FTP server sends back an ACK to the client.
B. The FTP server allocates a port to use for the data channel and transmits that port number to the client.
C. The FTP server opens the data channel to the client using the port number indicated by the client.
D. The FTP client opens the data channel to the FTP server on port 20.
E. The FTP client opens the data channel to the FTP server on port 21.
Answer: B
Cisco 351-018 351-018 351-018 pdf 351-018자료
NO.2 A DNS open resolver is vulnerable to which three of these malicious activities? (Choose three.)
A. cache poisoning attack
B. amplification attack
C. Ping of Death attack
D. Resource Utilization attack
E. Blue Screen of Death
F. Nachi worm attack
Answer: ABD
Cisco 351-018 351-018 351-018
NO.3 When a failover takes place on an adaptive security appliance configured for failover, all active
connections are dropped and clients must reestablish their connections, unless the adaptive security
appliance is configured in which two of the following ways? (Choose two.)
A. active/stand by failover
B. active/active failover
C. active/active failover and a state failover link has been configured
D. active/standby failover and a state failover link has been configured
E. to use a serial cable as the failover link
F. LAN-based failover
Answer: CD
Cisco최신덤프 351-018최신덤프 351-018인증
NO.4 Referring to the partial debug output shown in the exhibit, which of these values is contained inside the
brackets [4] in line 1?
A. RADIUS identifier field value
B. RADIUS attribute type value
C. RADIUS VSA number
D. RADIUS VSA length
E. vendor ID
Answer: B
Cisco 351-018 351-018 351-018최신덤프
NO.5 Which three of these protocols are supported when using TACACS+? (Choose three.)
A. AppleTalk
B. CHAP
C. NASI
D. NetBIOS
E. Kerberos
Answer: ACD
Cisco 351-018 351-018시험문제 351-018인증
NO.6 Which two of these commands are required to implement a Cisco Catalyst 6500 Series Firewall
Services Module (FWSM) in a Catalyst 6500 running Cisco IOS? (Choose two.)
A. firewall multiple-vlan-interfaces
B. firewall module vlan-group
C. module secure-traffic
D. firewall vlan-group <vlan-x>
E. firewall module secure-traffic
Answer: BD
Cisco dumps 351-018 351-018 pdf 351-018
NO.7 Refer to the exhibit.
Which three of the following statements are correct? (Choose three.)
A. The exhibit shows an example of a NAC Framework network.
B. The exhibit shows an example of a NAC Appliance network.
C. The network utilizes in-band admission control.
D. The network utilizes out-of-band admission control.
E. Cisco NAC Appliance Agent is used to verify end-user PC compliance with the security policy
F. Cisco Trust Agent is used to verify end-user PC compliance with the security policy.
Answer: BDE
Cisco 351-018 351-018 pdf 351-018 351-018
NO.8 How does using DHCP Option 82 on a Cisco Wireless LAN Controller make a network more secure?
A. by preventing rogue DHCP servers from returning unauthorized addresses
B. by ensuring that DHCP addresses are parity-checked before being issued
C. by ensuring that clients receive proper routing information as part of their DHCP responses
D. by preventing DHCP address requests from untrusted relay agents
E. by adding fully qualified domain information that the client can use for SSL authentication
Answer: D
Cisco최신덤프 351-018 351-018
NO.9 The ARP functionality in IPv4 is accomplished using which type of messages, as defined in ICMPv6?
A. router solicitation and advertisement
B. neighbor solicitation and advertisement
C. redirect
D. neighbor solicitation and router advertisement
E. router solicitation and neighbor advertisement
Answer: B
Cisco 351-018 351-018시험문제 351-018 dump
NO.10 Refer to the exhibit.
Which of these statements is correct for the Fidelity Rating and Base RR values?
A. Both the Fidelity Rating and Base RR values are computed from the Severity Factor value.
B. The Fidelity Rating value is computed from the Base RR value.
C. The Severity Factor value is computed from the Fidelity Rating and Base RR values.
D. The Fidelity Rating value is computed from the Base RR and Severity Factor values.
E. The Base RR value is computed from the Fidelity Rating and Severity Factor values.
Answer: E
Cisco dump 351-018인증 351-018 351-018자료 351-018
NO.11 ASDM on the Cisco ASA adaptive security appliance platform is executed as which of the following?
A. an ActiveX application or a JavaScript application
B. a JavaScript application and a PHP application
C. a fully compiled .Net Framework application
D. a fully operational Visual Basic application
E. a Java applet or a standalone application using the Java Runtime Environment
Answer: E
Cisco 351-018시험문제 351-018
NO.12 Which two of these are valid TACACS+ Accounting packets? (Choose two.)
A. REQUEST
B. REPLY
C. RESPONSE
D. CONTINUE
E. START
Answer: AC
Cisco 351-018최신덤프 351-018 351-018덤프 351-018자격증
NO.13 Which of these best represents a typical attack that takes advantage of RFC 792, ICMP type 3
messages?
A. blind connection-reset
B. large packet echo request
C. packet fragmentation offset
D. broadcast-based echo request
E. excessive bandwidth consumption
Answer: A
Cisco 351-018 351-018최신덤프
NO.14 Which two of these statements about SMTP and ESMTP are the most correct? (Choose two.)
A. Open mail relays are often used for spamming.
B. ESMTP does not provide more security features than SMTP.
C. SMTP provides authenticated e-mail sending.
D. Worms often spread via SMTP.
Answer: AD
Cisco 351-018 351-018 pdf 351-018 351-018최신덤프
NO.15 Which one of the following is not a valid RADIUS packet type.?
A. access-reject
B. access-response
C. access-challenge
D. access-reply
E. access-accept
Answer: B
Cisco 351-018 351-018인증 351-018자료 351-018
NO.16 In ISO 27001 ISMS, which three of these certification process phases are required to collect
information for ISO 27001? (Choose three.)
A. discover
B. certification audit
C. post-audit
D. observation
E. pre-audit
F. major compliance
Answer: BCE
Cisco 351-018 351-018 351-018인증 351-018 351-018
NO.17 Which two of these are true about TFTP? (Choose two.)
A. TFTP includes a basic username/password authentication mechanism.
B. While "putting" files via TFTP is possible, it is good practice to disallow it, because TFTP lacks access
control mechanisms.
C. TFTP uses a very basic "stop and wait" mechanism for flow control, for which each packet needs to be
acknowledged before the next one is sent.
D. TFTP root directories need to be world-readable and -writable due to the lack of security controls in the
protocol.
E. TFTP can list remote directory contents, but only if advanced options (as defined in RFC 2347) are
negotiated between client and server at initial connection time.
Answer: BC
Cisco 351-018 351-018 351-018 dump
NO.18 In the example shown, Host A has attempted a DCOM attack using Metasploit from Host A to Host
Which three statements best describe how event logs and IPS alerts can be used in conjunction with each
other to determine if the attack was successful? (Choose three.)
A. Cisco Security MARS will collect the syslog and the IPS alerts based on time.
B. The IPS event will suggest that an attack may have occurred because a signature was triggered.
C. IPS and Cisco ASA adaptive security appliance will use the Unified Threat Management protocol to
determine that both devices saw the attack
D. Cisco ASA adaptive security appliance will see the attack in both directions and will be able to
determine if an attack was successful.
E. The syslog event will indicate that an attack is likely because a TCP SYN and an ACK followed the
attempted attack.
Answer: ABE
Cisco기출문제 351-018 351-018 351-018 351-018
NO.19 Refer to the exhibit.
Switch SW2 has just been added to Fa0/23 on SW1. After a few seconds, interface Fa0/23 on SW1 is
placed in the error-disabled state. SW2 is removed from port 0/23 and inserted into SW1 port Fa0/22 with
the same result. What is the most likely cause of this problem?
A. The spanning-tree PortFast feature has been configured on SW1.
B. BPDU filtering has been enabled either globally or on the interfaces of SW1.
C. The BPDU guard feature has been enabled on the Fast Ethernet interfaces of SW1.
D. The Fast Ethernet interfaces of SW1 are unable to autonegotiate speed and duplex with SW2.
E. PAgP is unable to correctly negotiate VLAN trunk characteristics on the link between SWI and SW2.
Answer: C
Cisco 351-018 dumps 351-018 pdf 351-018인증
NO.20 Which two of these Cisco Catalyst security features offer the best ways to prevent ARP cache poisoning?
(Choose two.)
A. Dynamic ARP Inspection
B. port security
C. MAC address notification
D. DHCP snooping
E. PortFast
F. 802.1x authentication
Answer: AD
Cisco 351-018자료 351-018기출문제 351-018
NO.21 Cisco ASA 5500 Series Adaptive Security Appliance application layer protocol inspection is
implemented using which of these?
A. Protocol Header Definition File (PHDF)
B. Cisco Modular Policy Framework
C. Reverse Path Forwarding (RPF)
D. NetFlow version 9
E. Traffic Classification Definition File (TCDF)
Answer: B
Cisco자격증 351-018 351-018 351-018 351-018인증 351-018자격증
NO.22 When using Cisco Easy VPN Remote (hardware client deployment) in the client-mode setup, all of the
following statements are correct except which one?
A. Perform split tunneling on the Cisco Easy VPN Remote device.
B. Initiate a connection from a network behind the Cisco Easy VPN Server to the network behind the
Cisco Easy VPN Remote client.
C. Set the Cisco Easy VPN Remote to allow an administrator or user to manually initiate a connection.
D. Set the Cisco Easy VPN Remote to automatically connect to the Cisco Easy VPN Server.
Answer: B
Cisco pdf 351-018 351-018덤프 351-018
NO.23 Which of these statements best describes the advantage of using Cisco Secure Desktop, which is part
of the Cisco ASA VPN solution?
A. Cisco Secure Desktop creates a separate computing environment that is deleted when you finish,
ensuring that no confidential data is left on the shared or public computer.
B. Cisco Secure Desktop is used to protect access to your registry and system files when browsing to
SSL VPN protected pages.
C. Cisco Secure Desktop ensures that an SSL protected password cannot be exploited by a man-
in-the-middle attack using a spoofed certificate
D. Cisco Secure Desktop hardens the operating system of the machines you are using at the time it is
launched.
Answer: A
Cisco 351-018자격증 351-018 351-018최신덤프
NO.24 Which two of these statements regarding Authentication Header (AH) are true? (Choose two.)
A. AH requires the use of Encapsulating Security Payload (ESP) to work correctly.
B. AH provides authentication for most of the "outer" IP header, as well as the upper layer protocols.
C. AH can be deployed in tunnel mode only.
D. AH is not commonly used, because it can only encrypt the original packet using a DES encryption
algorithm.
E. AH will work through a NAT (one-to-one) device, but not through a PAT (one-to-many) device.
F. AH uses an IP protocol number of 51.
Answer: BF
Cisco인증 351-018 dump 351-018 351-018인증
NO.25 Which method is used by Cisco Security Agent to get user state information from the operating
system?
A. secure SSL using HTTPS session
B. application (Layer 7)-based (Cisco proprietary) encryption
C. NetBIOS socket on TCP port 137-139 and UDP port 137-139
D. Win32 application binary interface (ABI)
E. Win32 application programming interface (API)
Answer: E
Cisco 351-018 dumps 351-018 351-018 351-018
NO.26 For a router to obtain a certificate from a CA, what is the first step of the certificate enrollment process?
A. The router generates a certificate request and forwards it to the CA.
B. The router generates an RSA key pair.
C. The router sends its public key to the CA.
D. The CA sends its public key to the router.
E. The CA verifies the identity of the router.
F. The CA generates a certificate request and forwards it to the router.
Answer: B
Cisco자료 351-018시험문제 351-018 351-018
NO.27 To provide a separation of duties within Cisco Security Manager, which mode would the Cisco Security
Manager administrator use?
A. Activity mode
B. Change Control mode
C. Workflow mode
D. Task-Based mode
E. Task Isolation mode
Answer: C
Cisco기출문제 351-018 351-018 351-018기출문제
NO.28 What is the net effect of using ICMP type 4 messages to attack RFC 1122-compliant hosts?
A. Hosts will perform a soft TCP reset and restart the connection.
B. Hosts will perform a hard TCP reset and tear down the connection.
C. Hosts will reduce the rate at which they inject traffic into the network.
D. Hosts will redirect packets to the IP address indicated in the ICMP type 4 message.
E. Hosts will retransmit the last frame sent prior to receiving the ICMP type 4 message.
Answer: C
Cisco pdf 351-018덤프 351-018
NO.29 How do TCP SYN attacks take advantage of TCP to prevent new connections from being established
to a host under attack?
A. sending multiple FIN segments, forcing TCP connection release
B. filling up a host listen queue by failing to ACK partially opened TCP connections
C. taking advantage of the host transmit backoff algorithm by sending jam signals to the host
D. incrementing the ISN of each segment by a random number, causing constant TCP retransmissions
E. sending TCP RST segments in response to connection SYN+ACK segments, forcing SYN
retransmissions
Answer: B
Cisco덤프 351-018 351-018 351-018 351-018 dump
NO.30 A DNS Client sends DNS messages to obtain information about the requested domain name space.
The information is known as which of these?
A. Resource Record
B. Resolver
C. Branch
D. Authoritative Client
E. Recursive Client
Answer: A
Cisco dumps 351-018 351-018 351-018 dump 351-018기출문제 351-018자격증
ITexamdump의 ICBB덤프의 VCE테스트프로그램과 CUR-009덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 000-N45시험에 대비한 고품질 덤프와 000-N32시험 최신버전덤프를 제공해드립니다. 최고품질 LOT-440시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.
댓글 없음:
댓글 쓰기