351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 14)

351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 14)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which protocol is superseded by AES?

  • What is the purpose of the SPI field in an IPsec packet?

  • Which IPsec protocol provides data integrity but no data encryption?

  • What entities decrypt a transmission sent by a GDOI group member?

  • What transport protocol and port are used by GDOI for its IKE sessions that are es...

  • What is the advantage of using the ESP protocol over the AH?

  • What applications take advantage of a DTLS protocol?

  • What mechanism does SSL use to provide confidentiality of user data?

  • What action does a RADIUS server take when it cannot authenticate the credentials ...

  • Which transport mechanism is used between a RADIUS authenticator and a RADIUS auth...

  • Which three statements about the TACACS protocol are correct? (Choose three.)

  • Which three EAP methods require a server-side certificate? (Choose three.)

  • Which statement is true about EAP-FAST?

  • Which four attributes are identified in an X.509v3 basic certificate field? (Choos...

  • What is the purpose of the OCSP protocol?

  • What are two reasons for a certificate to appear in a CRL? (Choose two.)

  • Which transport method is used by the IEEE 802.1X protocol?

  • Which encryption mechanism is used in WEP?

  • Which three statements about Security Group Tag Exchange Protocol are true? (Choos...

  • What does the SXP protocol exchange between peers?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:36 a.m.
    help_outline
    20 questions
    dvr
    0 completed
    remove_red_eye
    7 views
    people
    0 takers
    folder

  • 351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 14) QR code

Ratings

star_borderstar_borderstar_borderstar_borderstar_border
ratings