350-018 CCIE Security Written Exam (Exam 15)

350-018 CCIE Security Written Exam (Exam 15)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Referring to the debug output shown, which two statements are true?(Choose two)

  • What Cisco technology protects against Spanning-Tree Protocol manipulation?

  • Which of the following is an example of a security technology that could be enable...

  • What new features were added to the PIX in version 7.0?

  • In the example shown, Host A has attempted a D-COM attack using metasploit form Ho...

  • What two things must you do on the router before generating an SSH key with the "c...

  • Which AS-Path ACL is used to deny all the prefixes that originate in AS 65104 and ...

  • Whenever a failover takes place on the ASA running in failover mode, all active co...

  • Select two statements that correctly describe the ESP protocol

  • Which SSL protocol takes an application message to be transmitted, fragments the d...

  • RFC 2827 ingress filtering is used to help prevent which type of attacks?

  • What is NTP crucial for?

  • CS-MARS works with which IOS feature to accomplish anomaly detection?

  • Referring to the partial IOS configuration shown in the exhibit, which statements ...

  • In an L2TP voluntary tunneling scenario, the VPDN tunel is terminated between:

  • Which one of the following is NOT a supported IKE attribute?

  • Referring to the DMVPN topology diagram shown in the exhibit, which two statements...

  • Referring to the network diagram and the partial router's configuration shown, whi...

  • When enrolling a Cisco IOS router to a CA server using the SCEP protocol, which on...

  • Which two steps does a receiver perform to validate a message using HMAC? (Choose ...

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    0 completed
    0 takers

  • 350-018 CCIE Security Written Exam (Exam 15) QR code