351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 4)

351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 4)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Refer to the exhibit.Which statement best describes the problem?

  • Which three statements are true about the transparent firewall mode in Cisco ASA? ...

  • Which three statements about Cisco IOS RRI are correct? (Choose three.)

  • Which of the following describes the DHCP "starvation" attack?

  • Which Cisco technology protects against Spanning Tree Protocol manipulation?

  • Refer to the exhibit.Which two statements about this Cisco Catalyst switch configu...

  • Which three configuration components are required to implement QoS policies on Cis...

  • Which type of PVLAN ports can communicate among themselves and with the promiscuou...

  • Which statement is true about the Cisco NEAT 802.1X feature?

  • Which additional configuration component is required to implement a MACSec Key Agr...

  • With the Cisco FlexVPN solution, which four VPN deployments are supported? (Choose...

  • Which four techniques can you use for IP management plane security? (Choose four.)

  • Which three statements about remotely triggered black hole filtering are true? (Ch...

  • Which three statements about Cisco Flexible NetFlow are true? (Choose three.)

  • During a computer security forensic investigation, a laptop computer is retrieved ...

  • Which three statements about the IANA are true? (Choose three.)

  • What does the Common Criteria (CC) standard define?

  • Which three types of information could be used during the incident response invest...

  • Which of the following best describes Chain of Evidence in the context of security...

  • Which option is a benefit of implementing RFC 2827?

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:36 a.m.
    20 questions
    0 completed
    0 takers

  • 351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 4) QR code