[Free] 2018(May) EnsurePass Testking Cisco 350-018 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 May Cisco Official New Released 350-018
100% Free Download! 100% Pass Guaranteed!

CCIE Security Exam (v4.1)

Question No: 41 – (Topic 1)

A cloud service provider is designing a large multitenant data center to support thousands of tenants. The provider is concerned about the scalability the layer 2 network and providing layer 2 segmentation to potentially thousands of tenants .Which layer 2 technology is best suited in this scenario?

  1. extended VLAN ranges

  2. VXLAN

  3. VRF

  4. LDP

Answer: B

Question No: 42 – (Topic 1)

Which two statements about cisco ASA authentication using LDAP are ture:

  1. it uses AD attribute maps to assign users to group policies configured under the webvpn contant.

  2. It is a closed standard that manages directory-information services over distributed networks

  3. It can assign a group policy to a user based on access credentials.

  4. It uses attribute maps to map the AD member of attribute to the cisco ASA group policy attribute.

  5. The cisco ASA can use more than one AD . member of attribute to match a user to multiple group policies.

  6. It can combine AD attributes and LDAP attribute to configure group policies on the cisco ASA.

Answer: C,D

Question No: 43 – (Topic 1)

On an ASA firewall in multiple context mode running version 8.X, what is the default number of VPN site-to-site tunnels per context?

  1. 2 sessions

  2. 4 sessions

  3. 1 session

  4. 0 sessions

Answer: A

Question No: 44 – (Topic 1)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which command caused the above messages

  1. neighbor 101.0.0.1 maximun-prefix 500 70 warning-only

  2. neighbor 101.0.0.1 maximun-prefix 500 70

  3. neighbor 101.0.0.1 maximun-prefix 500 80 warning-only

  4. neighbor 101.0.0.1 maximun-prefix 500 90

Answer: B

Question No: 45 – (Topic 1)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which effect of this configuration is true ?

  1. It configures the node to generate a link-locak group report when it joins the solicited- node multicast group

  2. It enables local group membership for MLDv1 and MLDv2

  3. It enables hosts to send MLD report messages for groups in 224.0.0.0/24

  4. It enables MLD query messages for all link-local groups

  5. It enables the host to send MLD report messages for nonlink local groups

Answer: C

Question No: 46 – (Topic 1)

The computer at 10.10.10.4 on your network has been infected by a bontnet that directs traffic to a malware site at 168.65.201.120 Assuming that filtering will be performed on a Cisco ASA,What command can you use to block all current and future connections from the infected host ?

A. B.shun 168.65.201.120 10.10.10.4 6000 80

B. C.ip access-list extended BLOCK_BOT_OUT deny ip host 10.10.10.4 host 168.65.201.120

C. D.shun 10.10.10.4 68.65.201.120 6000 80

Answer: B

Question No: 47 – (Topic 1)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

Which effect of this configuration is true ?

  1. The MSS of TCP SYN packets is set to 1452 bytes and the IP MTU of the interface is set to 1942 bytes

  2. The maximum size of TCP SYN ACK packets passing the transient host is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes

  3. The PMTUD values sets itself to 1452 bytes when the interface MTU is set to 1492 bytes

  4. SYN packets carries 1452 bytes in the payload when the Ethernet MTU of the interface is to 1492 bytes

  5. The maximum size of TCP SYN ACK packets passing the router is set to 452 bytes and the IP MTU of the interface is set to 1492 bytes

Answer: A

Question No: 48 – (Topic 1)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

What type of attack is illustrated?

  1. IP address spoofing

  2. ICMP flood

  3. CAM overflow

  4. ARP spoofing

Answer: D

Question No: 49 – (Topic 1)

Which statement about remote procedure calls is true?

  1. They can be invoked by the client and the server

  2. They can emulate different hardware specifications on a single platform

  3. They support synchronous and asynchronous requests

  4. They use a special assembly instruction set to process remote code without conflicting with other remote processes

  5. They support optimized data replication among multiple machines

Answer: D

Question No: 50 – (Topic 1)

What are two features that help to mitigate man-in-the-middle attacks?(Choose two)

  1. DHCP snooping

  2. dynamic ARP inspection

  3. destination MAC ACLS

  4. ARP sniffing on specific ports

  5. ARP spoofing

Answer: A,B

100% Ensurepass Free Download!
Download Free Demo:350-018 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass 350-018 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply