350-018 CCIE Security Written Exam (Exam 5)

350-018 CCIE Security Written Exam (Exam 5)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • What of the following statements that describe Diffie Hellman Key exchange are cor...

  • Refer to the exhibit. Which as-path access-list regular expression should be appli...

  • Which is a function of a Cisco router acting as a Network Access Device (NAD ) in ...

  • Refer to the Exhibit. A Cisco security appliance has been inserted between a multi...

  • Which is a benefit of implementing RFC 2827?

  • What is Chain of Evidence in the context of security forensics?

  • Referring to the ASDM screen shot shown in the exhibit, which of the following tra...

  • What security reporting system is analogous to CS-MARS?

  • What is NTP crucial for?

  • Based on the following partial configuration shown, which statement is true?Interf...

  • Which of the following is one way to configure the security appliance to protect a...

  • Refer the the Exhibit . A Cisco 10/100/1000 Mbps switch is inserted in a small off...

  • Which of the following statements are true regarding hashing?

  • Which of the following describes the DHCP "starvation" attack?

  • Which two are correct functions of the Cisco Anomaly Guard and Detector for preven...

  • Which of the following are valid RADIUS packet flows? C indicates the user (such a...

  • Which of these is the best way to provide sender non-repudiation?

  • Refer to the exhibit.Which three of the following statements arecorrect?(choose 3)

  • Whenever a failover takes place on the ASA running in failover mode,all active con...

  • Select two statements that correctly describe the ESP protocol

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    0 completed
    0 takers

  • 350-018 CCIE Security Written Exam (Exam 5) QR code