351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 7)

351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 7)

created by Fisher BRink (@fisher) at Feb. 8, 2016
  • Which two options best describe the authorization process as it relates to network...

  • If ISE is not Layer 2 adjacent to the Wireless LAN Controller, which two options s...

  • Refer to the exhibit.To configure the Cisco ASA, what should you enter in the Name...

  • Refer to the exhibit.On R1, encrypt counters are incrementing. On R2, packets are ...

  • Which two methods are used for forwarding traffic to the Cisco ScanSafe Web Securi...

  • Which four statements about SeND for IPv6 are correct? (Choose four.)

  • What is the recommended network MACSec policy mode for high security deployments?

  • Which three statements about NetFlow version 9 are correct? (Choose three.)

  • Which three statements about VXLANs are true? (Choose three.)

  • Which two identifiers are used by a Cisco Easy VPN Server to reference the correct...

  • Which multicast routing mechanism is optimal to support many-to-many multicast app...

  • Which three statements regarding VLANs are true? (Choose three.)

  • Which technology, configured on the Cisco ASA, allows Active Directory authenticat...

  • In what subnet does address reside?

  • Given the IPv4 address, which two addresses are valid IPv4-compatible...

  • What is the size of a point-to-point GRE header, and what is the protocol number a...

  • Refer to the exhibit.Which three fields of the IP header labeled can be used in a ...

  • When implementing WLAN security, what are three benefits of using the TKIP instead...

  • Which two statements about SHA are correct? (Choose two.)

  • Which three statements about IKEv2 are correct? (Choose three.)

Be the first to review
Login and Review
  • info
    Quiz Info
  • date_range
    Feb. 8, 2016, 3:36 a.m.
    20 questions
    1 completed
    1 takers

  • 351-018 CCIE Security Written Exam v4.0 (Beta) (Exam 7) QR code