350-018 practice test

Free Download Pass4sure Cisco 350-018 Exam Questions And Answers (101-110)

QUESTION 101
Which two statements describe the Cisco TrustSec system correctly? (Choose two.)

A.    The Cisco TrustSec system is a partner program, where Cisco certifies third-party security products as extensions to the secure infrastructure.
B.    The Cisco TrustSec system is an approach to certifying multimedia and collaboration applications as secure.
C.    The Cisco TrustSec system is an Advanced Network Access Control System that leverages enforcement
intelligence in the network infrastructure.
D.    The Cisco TrustSec system tests and certifies all products and product versions that make up the system as working together in a validated manner.

Continue reading

Free Download Pass4sure Cisco 350-018 Exam Questions And Answers (61-70)

QUESTION 61
What feature on the Cisco ASA is used to check for the presence of an up-to-date antivirus vendor on an AnyConnect client?

A.    Dynamic Access Policies with no additional options
B.    Dynamic Access Policies with Host Scan enabled
C.    advanced endpoint assessment
D.    LDAP attribute maps obtained from Antivirus vendor

Continue reading

Free Download Pass4sure Cisco 350-018 Exam Questions And Answers (51-60)

QUESTION 51
Which three statements about GDOI are true? (Choose three.)

A.    GDOI uses TCP port 848.
B.    The GROUPKEY_PULL exchange is protected by an IKE phase 1 exchange.
C.    The KEK protects the GROUPKEY_PUSH message.
D.    The TEK is used to encrypt and decrypt data traffic.
E.    GDOI does not support PFS.

Continue reading

Free Download Pass4sure Cisco 350-018 Exam Questions And Answers (41-50)

QUESTION 41
Which of the following best describes Chain of Evidence in the context of security forensics?

A.    Evidence is locked down, but not necessarily authenticated.
B.    Evidence is controlled and accounted for to maintain its authenticity and integrity.
C.    The general whereabouts of evidence is known.
D.    Someone knows where the evidence is and can say who had it if it is not logged.

Continue reading