350-018 CCIE Security Written Exam (Exam 48)

350-018 CCIE Security Written Exam (Exam 48)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which two OSPF network types support the concept of a designated router? (Choose t...

  • Which IPv6 routing protocol can use IPv6 ESP and AH to provide integrity, authenti...

  • Which three IPv6 tunneling methods are point-to-multipoint in nature? (Choose three.)

  • Which additional capability was added in IGMPv3?

  • Beacons, probe request, and association request frames are associated with which c...

  • Which feature can be implemented to avoid any MPLS packet loss?

  • Which four types of VPN natively provide encryption of user traffic? (Choose four.)

  • Which three options are components of Mobile IPv6? (Choose three.)

  • What are two uses of an RSA algorithm? (Choose two.)

  • What is needed to verify a digital signature that was created using an RSA algorithm?

  • Which algorithm is used to generate the IKEv2 session key?

  • Which statement is true about IKEv2 and IKEv1?

  • Which statement is true about IKEv2 preshared key authentication between two peers?

  • How does 3DES use the DES algorithm to encrypt a message?

  • Which protocol is superseded by AES?

  • What is the purpose of the SPI field in an IPsec packet?

  • Which IPsec protocol provides data integrity but no data encryption?

  • What entities decrypt a transmission sent by a GDOI group member?

  • What transport protocol and port are used by GDOI for its IKE sessions that are es...

  • What is the advantage of using the ESP protocol over the AH?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    0 completed
    0 takers

  • 350-018 CCIE Security Written Exam (Exam 48) QR code