★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 350-018 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/350-018-dumps.html


It is more faster and easier to pass the Cisco 350-018 exam by using Tested Cisco CCIE Pre-Qualification Test for Security questuins and answers. Immediate access to the Up to the immediate present 350-018 Exam and find the same core area 350-018 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Feb 350-018 ccie security exam:

Q61. Which two are valid SMTP commands, according to RFC 821? (Choose two.) 

A. EHLO 

B. HELO 

C. RCPT 

D. AUTH 

Answer: BC 


Q62. The HTTP inspection engine has the ability to inspect traffic based on which three parameters? (Choose three.) 

A. Transfer Encoding 

B. Request Method 

C. Header 

D. Application Type 

E. Header Size 

F. Source Address 

Answer: ABD 


Q63. Which SSL protocol takes an application message to be transmitted, fragments the data into manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit in a TCP segment? 

A. SSL Handshake Protocol 

B. SSL Alert Protocol 

C. SSL Record Protocol 

D. SSL Change CipherSpec Protocol 

Answer:


Q64. Which standard prescribes a risk assessment to identify whether each control is required to decrease risks and if so, to which extent it should be applied? 

A. ISO 27001 

B. ISO 27002 

C. ISO 17799 

D. HIPPA 

E. ISO 9000 

Answer:


Q65. Which three traffic conditions can be matched when configuring single rate, dual token bucket traffic policing on Cisco routers? (Choose three.) 

A. conform 

B. normal 

C. violate 

D. peak 

E. exceed 

F. average 

Answer: ACE 


Refresh 350-018 braindump:

Q66. Which three statements are true about PIM-SM operations? (Choose three.) 

A. PIM-SM supports RP configuration using static RP, Auto-RP, or BSR. 

B. PIM-SM uses a shared tree that is rooted at the multicast source. 

C. Different RPs can be configured for different multicast groups to increase RP scalability. 

D. Candidate RPs and RP mapping agents are configured to enable Auto-RP. 

E. PIM-SM uses the implicit join model. 

Answer: ACD 


Q67. Which two statements about the ISO are true? (Choose two.) 

A. The ISO is a government-based organization. 

B. The ISO has three membership categories: Member, Correspondent, and Subscribers. 

C. Subscriber members are individual organizations. 

D. Only member bodies have voting rights. 

E. Correspondent bodies are small countries with their own standards organization. 

Answer: BD 


Q68. Which statement applies to Flexible NetFlow? 

A. Flexible NetFlow uses seven key fields in IP datagrams to identify the flow. 

B. Flexible NetFlow uses key fields of IP datagram to identify fields from which data is captured. 

C. User-defined flows can be defined in Flexible NetFlow. 

D. Flexible NetFlow cannot be used for billing and accounting applications. 

E. Flexible NetFlow does not have any predefined records. 

Answer:


Q69. Which additional configuration component is required to implement a MACSec Key Agreement policy on user-facing Cisco Catalyst switch ports? 

A. PKI 

B. TACACS+ 

C. multi-auth host mode 

D. port security 

E. 802.1x 

Answer:


Q70. Which three RADIUS protocol statements are true? (Choose three.) 

A. RADIUS protocol runs over TCP 1645 and 1646. 

B. Network Access Server operates as a server for RADIUS. 

C. RADIUS packet types for authentication include Access-Request, Access-Challenge, Access-Accept, and Access-Reject. 

D. RADIUS protocol runs over UDP 1812 and 1813. 

E. RADIUS packet types for authentication include Access-Request, Access-Challenge, Access-Permit, and Access-Denied. 

F. RADIUS supports PPP, PAP, and CHAP as authentication methods. 

Answer: CDF