[Free] Download New Latest (January 2016) Cisco 350-018 Real Exam 391-400

Ensurepass

QUESTION 391

Refer to the exhibit. Identify the behavior of the ACL if it is applied inbound on E0/0.

 

clip_image002

 

A.

The ACL will drop both initial and noninitial fragments for port 80 only.

B.

The ACL will pass both initial and noninitial fragments for port 80 only.

C.

The ACL will pass the initial fragment for port 80 but drop the noninitial fragment for any port.

D.

The ACL will drop the initial fragment for port 80 but pass the noninitial fragment for any port.

 

Correct Answer: C

 

 

QUESTION 392

Refer to the exhibit. Identify the behavior of the ACL if it is applied inbound on E0/0.

 

clip_image004

 

A.

The ACL will drop both initial and noninitial fragments for port 80 only.

B.

The ACL will pass both initial and non-initial fragments for port 80 only.

C.

The ACL will pass the initial fragment for port 80 but drop the noninitial fragment for any port.

D.

The ACL will drop the initial fragment for port 80 but pass the noninitial fragment for any port.

 

Correct Answer: B

 

 

QUESTION 393

Which three are RFC 5735 addresses? (Choose three.)

 

A.

171.10.0.0/24

B.

0.0.0.0/8

C.

203.0.113.0/24

D.

192.80.90.0/24

E.

172.16.0.0/12

F.

198.50.100.0/24

 

Correct Answer: BCE

 

 

QUESTION 394

Which statement about ISO/IEC 27001 is true?

 

A.

ISO/IEC 27001 is only intended to report security breaches to the management authority.

B.

ISO/IEC 27001 was reviewed by the International Organization for Standardization.

C.

ISO/IEC 27001 is intend to bring information security under management control.

D.

ISO/IEC 27001 was reviewed by the International Electrotechnical Commission.

E.

ISO/IEC 27001 was published by ISO/IEC.

 

Correct Answer: C

 

 

QUESTION 395

Which two statements about the ISO are true? (Choose two.)

 

A.

The ISO is a government-based organization.

B.

The ISO has three membership categories: Member, Correspondent, and Subscribers.

C.

Subscriber members are individual organizations.

D.

Only member bodies have voting rights.

E.

Correspondent bodies are small countries with their own standards organization.

 

Correct Answer: BD

 

 

QUESTION 396

Which three IP resources is the IANA responsible? (Choose three.)

 

A.

IP address allocation

B.

detection of spoofed address

C.

criminal prosecution of hackers

D.

autonomous system number allocation

E.

root zone management in DNS

F.

BGP protocol vulnerabilities

Correct Answer: ADE

 

 

QUESTION 397

Which two statements about RFC 2827 are true? (Choose two.)

 

A.

RFC 2827 defines egress packet filtering to safeguard against IP spoofing.

B.

A corresponding practice is documented by the IEFT in BCP 38.

C.

RFC 2827 defines ingress packet filtering for the multihomed network.

D.

RFC 2827 defines ingress packet filtering to defeat DoS using IP spoofing.

E.

A corresponding practice is documented by the IEFT in BCP 84.

 

Correct Answer: BD

 

 

QUESTION 398

Which two statements about SOX are true? (Choose two.)

 

A.

SOX is an IEFT compliance procedure for computer systems security.

B.

SOX is a US law.

C.

SOX is an IEEE compliance procedure for IT management to produce audit reports.

D.

SOX is a private organization that provides best practices for financial institution computer systems.

E.

Section 404 of SOX is related to IT compliance.

 

Correct Answer: BE

 

 

QUESTION 399

Refer to the exhibit. Which three statements correctly describe the configuration? (Choose three).

 

clip_image006

 

A.

The tunnel is not providing peer authentication

B.

The tunnel encapsulates multicast traffic.

C.

This is a point-to-point GRE tunnel.

D.

The configuration is on the NHS.

E.

The configuration is on the NHC.

F.

The tunnel provides data confidentiality.

G.

The tunnel IP address represents the NBMA address.

 

Correct Answer: BDF

QUESTION 400

Refer to the exhibit. Which statement correctly describes the configuration?

 

clip_image008

 

A.

The configuration is the super view configuration of role-based access control.

B.

The configuration would not work unless the AAA server is configured for authentication and authorization.

C.

The exec commands in the configuration will be excluded from the test view.

D.

The configuration is the CLI configuration of role-based ac
cess control.

 

Correct Answer: D

 

Free VCE & PDF File for Cisco 350-018 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

Comments are closed.