350-018 CCIE Security Written Exam (Exam 20)

350-018 CCIE Security Written Exam (Exam 20)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which option describes the actions that can be taken when an IPS 5.x signature fires?

  • Which statement below is true about the command "nat control" on the ASA?

  • Given the topology of a server (with IP protected behind the insi...

  • In ISO 27001 ISMS what are the main certification process phases required to colle...

  • What group in Cisco IOS does 1536-bit Diffie-Hellman prime modulus equivalent too?

  • Which can control the per-user authorization of commands on a company router?

  • How could you deny telnet access to the aux port of your router?

  • Assume that you are a network technician of your company. Look at the following Ci...

  • In Unix, where are failed super-user level access attempts stored?

  • What Cisco IOS feature examines packets received to make sure that the source addr...

  • You want to filter traffic using IOS firewall (CBAC). Your traffic is HTTP, TFTP, ...

  • What command is used to set the TACACS+ server and its encryption key, in the Cisc...

  • Your BGP router receives two routes. Both of their next hops are reachable, neithe...

  • During IKE negotiation, how do two peers compare policies? And what must policies ...

  • What traffic is allowed through the following access-list (select the best answer)...

  • Without a CA, what would you have to configure on each router, whenever a new rout...

  • In Unix, what is syslogd? And what does it do?

  • How many useable hosts can you get from a /30 subnet mask?

  • Crypto maps do which of the following? (Select all that apply)

  • How do you change EAP from running in its default mode?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    0 completed
    0 takers

  • 350-018 CCIE Security Written Exam (Exam 20) QR code