Killtest题库

专业IT认证题库学习资料,助您通过IT认证考试!

« killtest题库网分享最新最全的70-691题库!最新最全的220-702题库免费下载! »

killtest题库网分享最新的350-018题库下载!

CCIE 350-018考试题库由我们专业IT认证讲师及产品专家精心打造,包括了当前最新的全真试题,全部附有正确答案。题库的覆盖率在96%以上,在考试认证厂商对考题做出变化时,网站都将在第一时间内更新题库,确保考生能一次通过考试。

考试代号:350-018

认证名称:CCIE Pre-Qualification Test for Security

版本号:V11.02

考题数量:316

更新日期:2010-11-5

1. Which access control model provides access to system resources based on the job function of the user or the tasks that the user has been assigned?

A. Context Based Access Control

B. Rule Based Access Control

C. Mandatory Access Control

D. Discretionary Access Control

E. Role Based Access Control

Answer: E

2. Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?

A. Spoof attack

B. Buffer Overflow

C. Man-in-the middle attack

D. Trojan Horse

E. Day zero attack

F. Land.C attack

Answer: E

3. Which of the following are valid RADIUS packet flows'C indicates the user (such as a wireless laptop),N indicates the NAS,and S indicates an ACS Server(Choose 2)

A. N to S:RADIUS Access- Challenge S to N: RADIUS Access-Accept

B. N to S:RADIUS Access-Request S to N: RADIUS Access-Reject N to S:RADIUS Access- Challenge S to N: RADIUS Access-Accept

C. C to N: RADIUS Access-Request N to C: RADIUS Access- Reject C to N: RADIUS Access- Challenge N to C: RADIUS Access-Accept

D. C to N: RADIUS Access-Request N to C: RADIUS Access-Accept

E. N to S:RADIUS Access-Request S to N: RADIUS Access-Challenge N to S: RADIUS Access-Request S to N: RADIUS Access-Accept

Answer: DE

4. Choose the statement that best describes the correct characteristics pertinent to symmetric or

asymmetric keys.

A. Symmetric key cryptography uses two distinct and separate keys for encryption and decryption.

B. Symmetric key cryptography uses a single, shared key for encryption and decryption.

C. Asymetric key cryptography uses the same key for both encryption and decryption.

D. Asymetric key cryptography can only be used for decryption of information.

E. Both asymmetrivc and symmetric key cryptography can only encrypt information.

Answer: B

5 What functionality best defines the use of a 'stub' area within an OSPF environment?

A. A stub area appears only on remote areas to provide connectivity to the OSPF backbone.

B. A stub area is used to inject the default route for OSPF.

C. A stub area uses the no-summary keyword to explicitly block external routes, defines the non-transit area, and uses the default route to reach external networks.

D. A stub area is used to reach networks external to the sub area.

Answer: C

  以上只是部分的题库,登录killtest题库网可下载更多的关于思科认证考试的题库。

 

发表评论:

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。

日历

最近发表

Powered By Z-Blog 1.8 Arwen Build 81206

Copyright xxxx-xxxx Your WebSite. Some Rights Reserved.