350-018 CCIE Security Written Exam (Exam 45)

350-018 CCIE Security Written Exam (Exam 45)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which three options correctly describe the AH protocol? (Choose three.)

  • Which three statements are true about TLS? (Choose three.)

  • Which three RADIUS protocol statements are true? (Choose three.)

  • Which three statements about OCSP are correct? (Choose three.)

  • Which three statements describe the security weaknesses of WEP? (Choose three.)

  • In HTTPS session establishment, what does the server hello message inform the client?

  • DHCPv6 is used in which IPv6 address autoconfiguration method?

  • Refer to the exhibit.Which statement regarding the output is true?

  • Which two options represent definitions that are found in the syslog protocol (RFC...

  • According to RFC-5426, syslog senders must support sending syslog message datagram...

  • Refer to the exhibit.What service is enabled on the router for a remote attacker t...

  • In an 802.11 wireless network, what would an attacker have to spoof to initiate a ...

  • What is the commonly known name for the process of generating and gathering initia...

  • According to RFC 4890, which four ICMPv6 types are recommended to be allowed to tr...

  • Which action is performed first on the Cisco ASA appliance when it receives an inc...

  • Refer to the exhibit.Which three statements about the Cisco ASDM screen seen in th...

  • Refer to the exhibit.Choose the correct description of the implementation that pro...

  • When you are configuring QoS on the Cisco ASA appliance, which four are valid traf...

  • Which command is required in order for the Botnet Traffic Filter on the Cisco ASA ...

  • Which four configuration steps are required to implement a zone-based policy firew...

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    1 completed
    1 takers

  • 350-018 CCIE Security Written Exam (Exam 45) QR code