351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 18)

351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 18)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which statement describes the computed authentication data in the AH protocol?

  • Which statement about the AH is true?

  • Which three fields are part of the AH header? (Choose three.)

  • Which statement about the HTTP protocol is true?

  • Which statement about SMTP is true?

  • Which two statements about DHCP are true? (Choose two.)

  • Which two statements about SNMP are true? (Choose two)

  • Which two statement about the DNS are true? (Choose two.)

  • Which is an example of a network reconnaissance attack?

  • Which ICMP message could be used with traceroute to map network topology?

  • Which statement about the Firewalk attack is true?

  • Which pair of ICMP messages is used in an inverse mapping attack?

  • Which statement about a botnet attack is true?

  • Which two statements about IPS signatures are true? (Choose two.)

  • Which two statement about Infrastructure ACLs on Cisco IOS software are true? (Cho...

  • Which statement about the SYN flood attack is true?

  • The HTTP inspection engine has the ability to inspect traffic based on which three...

  • For which two reasons BVI is required in the Transparent Cisco IOS Firewall? (Choo...

  • Event Store is a component of which IPS application?

  • Which statement about the Cisco Secure ACS Solution Engine TACACS+ AV pair is true?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:36 a.m.
    help_outline
    20 questions
    dvr
    0 completed
    remove_red_eye
    4 views
    people
    0 takers
    folder

  • 351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 18) QR code

Ratings

star_borderstar_borderstar_borderstar_borderstar_border
ratings