최신 350-018v4 무료덤프 - Cisco CCIE Security Exam (4.0)
Which three EAP methods require a server-side certificate? (Choose three.)
정답: A,B,C
What are too important guidelines to follow when implementing VTP? (Choose two.)
When using secure-mode VTP, configure management domain passwords only on VTP servers.
Use of the VTP multidomain feature should be restricted to migration and temporary implementation.
Enabling VTP pruning on a server will enable the feature for the entire management domain.
All switches in the VTP domain must run the same version of VTP.
CDP must be enabled on all switches in the VTP management domain.
When using secure-mode VTP, configure management domain passwords only on VTP servers.
Use of the VTP multidomain feature should be restricted to migration and temporary implementation.
Enabling VTP pruning on a server will enable the feature for the entire management domain.
All switches in the VTP domain must run the same version of VTP.
CDP must be enabled on all switches in the VTP management domain.
정답:
C,D
Enabling VTP pruning on a VTP server enables pruning for the entire management domain. Making VLANs pruning-
eligible or pruning-ineligible affects pruning eligibility for those VLANs on that trunk only (not on all switches in the
VTP domain).
* All switches in a VTP domain must have the same domain name, but they do not need to run the same VTP version.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swvtp.html#wp1225071
Enabling VTP pruning on a VTP server enables pruning for the entire management domain. Making VLANs pruning-
eligible or pruning-ineligible affects pruning eligibility for those VLANs on that trunk only (not on all switches in the
VTP domain).
* All switches in a VTP domain must have the same domain name, but they do not need to run the same VTP version.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swvtp.html#wp1225071
Many guidelines can be used to identify the areas that security policies should cover. In which four areas is coverage
most important? (Choose four.)
most important? (Choose four.)
정답: B,D,E,F
Which statement about the SYN flood attack is true?
정답: A
Which two options correctly describe Remote Triggered Black Hole Filtering (RFC 5635)? (Choose two.)
정답: E,F
Which two statements about cisco ASA authentication using LDAP are ture:
정답: E,F
Which item is not encrypted by ESP?
정답: D
What is the purpose of the SPI field in an IPsec packet?
정답: A
Which is a core function of the risk assessment process?
정답: A
Which three types of traffic are processed by CoPP configured on the device? (Choose three.)
정답: A,B,C
Which feature can you implement to protect against SYN-flooding DoS attacks?
정답: C
What is Cisco CKM (Centralized Key Management) used for?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which three parameters does the HTTP inspection engine use to inspect the traffic on Cisco IOS firewall? (Choose
three.)
three.)
정답: A,C,D
설명: (DumpTOP 회원만 볼 수 있음)
Refer to the exhibit.

Which statement about the exhibit is true?

Which statement about the exhibit is true?
정답: D