350-018 CCIE Security Written Exam (Exam 83)

350-018 CCIE Security Written Exam (Exam 83)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Crypto maps do which of the following? (Select all that apply)

  • Which of the following does CBAC do?

  • How many useable hosts can you get from a /30 subnet mask?

  • You want to create an access-list to allow only ssh to your RFC1918 network. Which...

  • What can you do if storing large certificate revocation lists in your routers NVRA...

  • On a PIX firewall, which of these rules are part of the ASA, by default? (Select a...

  • Which of these are distance-vector routing protocols and support VLSM? (Select all...

  • What command is this output from?nameif ethernet0 outside security0nameif ethernet...

  • Without a CA, what would you have to configure on each router, whenever a new rout...

  • What protocol does TACACS+ use to communicate?

  • What traffic is allowed through the following access-list (select the best answer)...

  • What command will show the security levels, configured for interfaces, on a PIX fi...

  • Which of these are based on the Bellman-Ford algorithm? (Select all that apply)

  • What is the easiest way to clear your router of RSA keys that have been generated?

  • During IKE negotiation, how do two peers compare policies? And what must policies ...

  • With a CA, what do you have to do when adding a new router to your existing IPSec ...

  • Which of these use store-and-forward & cut-through?

  • With a 10Mb Ethernet link, what is the formula for calculating OSPF cost?

  • Once a user enters their username and password, which are valid responses that a R...

  • What does CSPM do that PDM does not? (Select all that apply)

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:41 a.m.
    20 questions
    0 completed
    0 takers

  • 350-018 CCIE Security Written Exam (Exam 83) QR code