QUESTION 51
Which three statements about GDOI are true? (Choose three.)
A. GDOI uses TCP port 848.
B. The GROUPKEY_PULL exchange is protected by an IKE phase 1 exchange.
C. The KEK protects the GROUPKEY_PUSH message.
D. The TEK is used to encrypt and decrypt data traffic.
E. GDOI does not support PFS.
Answer: BCD
QUESTION 52
Which three nonproprietary EAP methods do not require the use of a client-side certificate for mutual authentication? (Choose three.)
A. LEAP
B. EAP-TLS
C. PEAP
D. EAP-TTLS
E. EAP-FAST
Answer: CDE
QUESTION 53
When you compare WEP to WPA (not WPA2), which three protections are gained? (Choose three.)
A. a message integrity check
B. AES-based encryption
C. avoidance of weak Initialization vectors
D. longer RC4 keys
E. a rekeying mechanism
Answer: ACE
QUESTION 54
Which option shows the correct sequence of the DHCP packets that are involved in IP address assignment between the DHCP client and the server?
A. REQUEST, OFFER, ACK
B. DISCOVER, OFFER, REQUEST, ACK
C. REQUEST, ASSIGN, ACK
D. DISCOVER, ASSIGN, ACK
E. REQUEST, DISCOVER, OFFER, ACK
Answer: B
QUESTION 55
Which common FTP client command transmits a direct, byte-for-byte copy of a file?
A. ascii
B. binary
C. hash
D. quote
E. glob
Answer: B
QUESTION 56
Which option is a desktop sharing application, used across a variety of platforms, with default TCP ports 5800/5801 and 5900/5901?
A. X Windows
B. remote desktop protocol
C. VNC
D. desktop proxy
Answer: C
QUESTION 57
Which two of the following provide protect against man-in-the-middle attacks? (Choose two.)
A. TCP initial sequence number randomization?
B. TCP sliding-window checking
C. Network Address Translation
D. IPsec VPNs
E. Secure Sockets Layer
Answer: DE
QUESTION 58
Refer to the exhibit. Which statement is true?
A. This packet decoder is using relative TCP sequence numbering?.
B. This TCP client is proposing the use of TCP window scaling?.
C. This packet represents an active FTP data session?.
D. This packet contains no TCP payload.
Answer: D
QUESTION 59
An exploit that involves connecting to a specific TCP port and gaining access to an administrative command prompt is an example of which type of attack?
A. botnet
B. Trojan horse
C. privilege escalation
D. DoS
Answer: C
QUESTION 60
When configuring an Infrastructure ACL (iACL) to protect the IPv6 infrastructure of an enterprise network, where should the iACL be applied??
A. all infrastructure devices in both the inbound and outbound direction
B. all infrastructure devices in the inbound direction
C. all infrastructure devices in the outbound direction
D. all parameter devices in both the inbound and outbound direction
E. all parameter devices in the inbound direction
F. all parameter devices in the outbound direction
Answer: E
Free Download Pass4sure Cisco 350-018 Exam Questions And Answers