350-018 CCIE Security Written Exam (Exam 37)

350-018 CCIE Security Written Exam (Exam 37)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which protocol does 802.1X use between the supplicant and the authenticator to aut...

  • Which two statements are correct regarding the AES encryption algorithm? (Choose t...

  • What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access...

  • DNSSEC was designed to overcome which security limitation of DNS?

  • Which two statements about SHA are correct? (Choose two.)

  • Which three statements about IKEv2 are correct? (Choose three.)

  • Which three statements about LDAP are true? (Choose three.)

  • Which two EAP methods may be susceptible to offline dictionary attacks? (Choose two.)

  • Which PKCS is invoked during IKE MM5 and MM6 when digital certificates are used as...

  • Which three statements are true about MACsec? (Choose three.)

  • Which option is a benefit of implementing RFC 2827?

  • IPsec SAs can be applied as a security mechanism for which three options? (Choose ...

  • Which four options are valid EAP mechanisms to be used with WPA2? (Choose four.)

  • Which three features describe DTLS protocol? (Choose three.)

  • Which three statements are true about the SSH protocol? (Choose three.)

  • Which statement regarding TFTP is not true?

  • Which two statements are true when comparing ESMTP and SMTP? (Choose two.)

  • How does a DHCP client request its previously used IP address in a DHCP DISCOVER p...

  • Which two statements about an authoritative server in a DNS system are true? (Choo...

  • User A at Company A is trying to transfer files to Company B, using FTP. User A ca...

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    2 completed
    1 takers

  • 350-018 CCIE Security Written Exam (Exam 37) QR code