350-018 CCIE Security Written Exam (Exam 27)

350-018 CCIE Security Written Exam (Exam 27)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which of the following are the four possible states of spanning tree?

  • When using MD5 route authentication on routers running RIP or EIGRP, which two imp...

  • Why should a Route Reflector be used in a BGP environment?

  • For the following items, which two statements are correct? (Choose two.)

  • Which of the following types of traffic is NOT subject to inspection in the 105 Fi...

  • Which two statements best describe the SSH protocol? (Choose two.)

  • What functionality best defines the use of a `stub' area within an OSPF environment?

  • Cisco Security Agent can protect a host from which three attack points according t...

  • Which is the correct GLOP address for AS 456 according to RFC 3180?

  • Which three of the following are attributes of the RADIUS protocol? (Choose three....

  • Which two of the following statements are true about Cisco IOS IPS functionality?

  • What is the main reason for using the ip ips deny-action ips-interface Cisco IOS c...

  • Refer to the exhibit.Which as-path access-list regular expression should be applie...

  • Cisco ASA or PIX security appliance software version 7.0 introduced Modular Policy...

  • With active/active failover in a load-balanced environment, which of the following...

  • Two routers running Cisco IOS Software are failing to negotiate the IPsec tunnel. ...

  • Of the following which can be identified as valid host IP addresses on the Interne...

  • On an Ethernet LAN, a jam signal causes a collision to last long enough for all ot...

  • A Network Administrator is trying to configure IPSec with a remote system. When a ...

  • A SYN flood attack is when:

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    1 completed
    0 takers

  • 350-018 CCIE Security Written Exam (Exam 27) QR code