[Free] Download New Updated (October 2016) Cisco 350-018 Real Exam 331-340

Ensurepass

QUESTION 331

Which two statements about NHRP are true? (Choose two.)

 

A.

NHRP is used for broadcast multi-access networks.

B.

NHRP allows NHC to dynamically learn the mapping of VPN IP to NBMA IP.

C.

NHRP allows NHS to dynamically learn the mapping of VPN IP to BMA IP.

D.

NHC registers with NHS.

E.

Traffic between two NHCs always flows through the NHS.

F.

NHRP provides Layer-2 to Layer-3 address mapping.

 

Correct Answer: BD

 

 

QUESTION 332

Which two statements about the AES algorithm are true? (Choose two)

 

A.

The AES algorithm is an asymmetric block cipher.

B.

The AES algorithm operates on a 128-bits block.

C.

The AES algorithm uses a fixed length-key of 128 bits.

D.

The AES algorithm does not give any advantage over 3DES due to the same key length.

E.

The AES algorithm consist of four functions. Three functions provide confusion-diffusion and one provides encryption.

 

Correct Answer: BE

 

 

QUESTION 333

Refer to the exhibit. Which two statements correctly describe the debug output that is shown in the exhibit? (Choose two.)

 

clip_image001

 

A.

The request is from NHS to NNC.

B.

The request is from NHC to NHS.

C.

69.1.1.2 is the local non-routable address.

D.

192.168.10.2 is the remote NBMA address.

E.

192.168.10.1 is the local VPN address.

F.

This debug output represents a failed NHRP request.

 

Correct Answer: BE

 

QUESTION 334

Which two statements about the RC4 algorithm are true? (Choose two.)

 

A.

The RC4 algorithm is an asymmetric key algorithm.

B.

The RC4 algorithm is a symmetric key algorithm.

C.

The RC4 algorithm is slower in computation than DES.

D.

The RC4 algorithm is used with wireless encryption protocols.

E.

The RC4 algorithm uses fixed-length keys.

 

Correct Answer: BD

 

 

QUESTION 335

Which two statements about the MD5 Hash are true? (Choose two.)

 

A.

Length of the hash value varies with the length of the message that is being hashed.

B.

Every unique message has a unique hash value.

C.

Its mathematically possible to find a pair of message that yield the same hash value.

D.

MD5 always yields a different value for the same message if repeatedly hashed.

E.

The hash value cannot be used to discover the message.

 

Correct Answer: BE

 

 

QUESTION 336

Which two statements about the SHA-1 algorithm are true? (Choose two)

 

A.

The SHA-1 algorithm is considered secure because it always produces a unique hash for the same message.

B.

The SHA-1 algorithm takes input message of any length and produces 160-bit hash output.

C.

The SHA-1 algorithm is considered secure because it is possible to find a message from its hash.

D.

The purpose of the SHA-1 algorithm is to provide data confidentiality.

E.

The purpose of the SHA-1 algorithm is to provide data authenticity.

 

Correct Answer: BE

 

 

QUESTION 337

Which two statements about the DES algorithm are true? (Choose two)

 

A.

The DES algorithm is based on asymmetric cryptography.

B.

The DES algorithm is a stream cipher.

C.

The DES algorithm is based on symmetric cryptography.

D.

The DES algorithm encrypts a block of 128 bits.

E.

The DES algorithm uses a 56-bit key.

 

Correct Answer: CE

 

 

QUESTION 338

Which statement about the 3DES algorithm is true?

 

A.

The 3DES algorithm uses the same key for encryption and decryption,

B.

The 3DES algorithm uses a public-private key pair with a public key for encryption and a private key for decryption.

C.

The 3DES algorithm is a block cipher.

D.

The 3DES algorithm uses a key length of 112 bits.

E.

The 3DES algorithm is faster than DES due to the shorter key length.

 

Correct Answer: C

 

 

QUESTION 339

Which two
statements about the DH group are true? (Choose two.)

 

A.

The DH group is used to provide data authentication.

B.

The DH group is negotiated in IPsec phase-1.

C.

The DH group is used to provide data confidentiality.

D.

The DH group is used to establish a shared key over an unsecured medium.

E.

The DH group is negotiated in IPsec phase-2.

 

Correct Answer: BD

 

 

QUESTION 340

Which statement describes the computed authentication data in the AH protocol?

 

A.

The computed authentication data is never sent across.

B.

The computed authentication data is part of a new IP header.

C.

The computed authentication data is part of the AH header.

D.

The computed authentication data is part of the original IP header.

 

Correct Answer: C

 

Free VCE & PDF File for Cisco 350-018 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

Comments are closed.