功能测试
首页 > Cisco 认证 > 正文

killtest题库网提供最新的350-018题库下载!

发布-admin | 查看- | 发表时间-2010-11-11

考试代号:350-018

认证名称:CCIE Pre-Qualification Test for Security

版本号:V11.02

考题数量:316

更新日期:2010-11-5

1. Which access control model provides access to system resources based on the job function of the user or the tasks that the user has been assigned?

A. Context Based Access Control

B. Rule Based Access Control

C. Mandatory Access Control

D. Discretionary Access Control

E. Role Based Access Control

Answer: E

2. Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?

A. Spoof attack

B. Buffer Overflow

C. Man-in-the middle attack

D. Trojan Horse

E. Day zero attack

F. Land.C attack

Answer: E

3. Which of the following are valid RADIUS packet flows'C indicates the user (such as a wireless laptop),N indicates the NAS,and S indicates an ACS Server(Choose 2)

A. N to S:RADIUS Access- Challenge S to N: RADIUS Access-Accept

B. N to S:RADIUS Access-Request S to N: RADIUS Access-Reject N to S:RADIUS Access- Challenge S to N: RADIUS Access-Accept

C. C to N: RADIUS Access-Request N to C: RADIUS Access- Reject C to N: RADIUS Access- Challenge N to C: RADIUS Access-Accept

D. C to N: RADIUS Access-Request N to C: RADIUS Access-Accept

E. N to S:RADIUS Access-Request S to N: RADIUS Access-Challenge N to S: RADIUS Access-Request S to N: RADIUS Access-Accept

Answer: DE

4. Choose the statement that best describes the correct characteristics pertinent to symmetric or

asymmetric keys.

A. Symmetric key cryptography uses two distinct and separate keys for encryption and decryption.

B. Symmetric key cryptography uses a single, shared key for encryption and decryption.

C. Asymetric key cryptography uses the same key for both encryption and decryption.

D. Asymetric key cryptography can only be used for decryption of information.

E. Both asymmetrivc and symmetric key cryptography can only encrypt information.

Answer: B

5 What functionality best defines the use of a 'stub' area within an OSPF environment?

A. A stub area appears only on remote areas to provide connectivity to the OSPF backbone.

B. A stub area is used to inject the default route for OSPF.

C. A stub area uses the no-summary keyword to explicitly block external routes, defines the non-transit area, and uses the default route to reach external networks.

D. A stub area is used to reach networks external to the sub area.

Answer: C

  以上只是部分的题库,登录killtest题库网可下载更多的关于思科认证考试的题库。

 

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。

最新文章
最近评论
Copyright 2010 killtest.com.cn Some Rights Reserved. 浙ICP备10016241号 | DESIGN BY Seanloo.cn