351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 13)

351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 13)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which three of these situations warrant engagement of a Security Incident Response...

  • What action will be taken by a Cisco IOS router if a TCP packet, with the DF bit s...

  • What will the receiving router do when it receives a packet that is too large to f...

  • Identify three IPv6 extension headers? (Choose three.)

  • Which three statements correctly describe the purpose and operation of IPv6 RS and...

  • Which three statements are true regarding the EIGRP update message? (Choose three.)

  • Which two OSPF network types support the concept of a designated router? (Choose t...

  • Which IPv6 routing protocol can use IPv6 ESP and AH to provide integrity, authenti...

  • Which three IPv6 tunneling methods are point-to-multipoint in nature? (Choose three.)

  • Which additional capability was added in IGMPv3?

  • Beacons, probe request, and association request frames are associated with which c...

  • Which feature can be implemented to avoid any MPLS packet loss?

  • Which four types of VPN natively provide encryption of user traffic? (Choose four.)

  • Which three options are components of Mobile IPv6? (Choose three.)

  • What are two uses of an RSA algorithm? (Choose two.)

  • What is needed to verify a digital signature that was created using an RSA algorithm?

  • Which algorithm is used to generate the IKEv2 session key?

  • Which statement is true about IKEv2 and IKEv1?

  • Which statement is true about IKEv2 preshared key authentication between two peers?

  • How does 3DES use the DES algorithm to encrypt a message?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:36 a.m.
    20 questions
    0 completed
    0 takers

  • 351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 13) QR code