Free Download Pass4sure Cisco 350-018 Exam Questions And Answers (81-90)

QUESTION 81
Which two identifiers are used by a Cisco Easy VPN Server to reference the correct group policy information for connecting a Cisco Easy VPN Client? (Choose two.)

A.    IKE ID_KEY_ID
B.    OU field in a certificate that is presented by a client
C.    XAUTH username
D.    hash of the OTP that is sent during XAUTH challenge/response
E.    IKE ID_IPV4_ADDR

Answer: AB

QUESTION 82
Which multicast routing mechanism is optimal to support many-to-many multicast applications?

A.    PIM-SM
B.    MOSPF
C.    DVMRP
D.    BIDIR-PIM
E.    MSDP

Answer: D

QUESTION 83
Which three statements regarding VLANs are true? (Choose three.)

A.    To create a new VLAN on a Cisco Catalyst switch, the VLAN name, VLAN ID and VLAN type must
all be specifically configured by the administrator.
B.    A VLAN is a broadcast domain.
C.    Each VLAN must have an SVI configured on the Cisco Catalyst switch for it to be operational.
D.    The native VLAN is used for untagged traffic on an 802.1Q trunk.
E.    VLANs can be connected across wide-area networks.

Answer: BDE

QUESTION 84
Which technology, configured on the Cisco ASA, allows Active Directory authentication credentials to be applied automatically to web forms that require authentication for clientless SSL connections?

A.    one-time passwords
B.    certificate authentication
C.    user credentials obtained during authentication
D.    Kerberos authentication

Answer: C

QUESTION 85
In what subnet does address 192.168.23.197/27 reside?

A.    192.168.23.0
B.    192.168.23.128
C.    192.168.23.160
D.    192.168.23.192
E.    192.168.23.196

Answer: D

QUESTION 86
Given the IPv4 address 10.10.100.16, which two addresses are valid IPv4-compatible IPv6 addresses? (Choose two.)

A.    :::A:A:64:10
B.    ::10:10:100:16
C.    0:0:0:0:0:10:10:100:16
D.    0:0:10:10:100:16:0:0:0

Answer: BC

QUESTION 87
Refer to the exhibit. Which three fields of the IP header labeled can be used in a spoofing attack? (Choose one.)

871

A.    6, 7, 11
B.    6, 11, 12
C.    3, 11, 12
D.    4, 7, 11

Answer: A

QUESTION 88
What is the size of a point-to-point GRE header, and what is the protocol number at the IP layer?

A.    8 bytes, and protocol number 74
B.    4 bytes, and protocol number 47
C.    2 bytes, and protocol number 71
D.    24 bytes, and protocol number 1
E.    8 bytes, and protocol number 47

Answer: B

QUESTION 89
When implementing WLAN security, what are three benefits of using the TKIP instead of WEP? (Choose three.)

A.    TKIP uses an advanced encryption scheme based on AES.
B.    TKIP provides authentication and integrity checking using CBC-MAC.
C.    TKIP provides per-packet keying and a rekeying mechanism.
D.    TKIP provides message integrity check.
E.    TKIP reduces WEP vulnerabilities by using a different hardware encryption chipset.
F.    TKIP uses a 48-bit initialization vector.

Answer: CDF

QUESTION 90
Which two statements about SHA are correct? (Choose two.)

A.    Five 32-bit variables are applied to the message to produce the 160-bit hash.
B.    The message is split into 64-bit blocks for processing.
C.    The message is split into 512-bit blocks for processing.
D.    SHA-2 and MD5 both consist of four rounds of processing.

Answer: AC

Free Download Pass4sure Cisco 350-018 Exam Questions And Answers