Cisco 351-018 (CCIE Security Qualification) 인증시험 패스는 아주 어렵습니다.하지만 Pass4Test의 자료로 충분히 시험 패스할 수 있습니다.만약 Pass4Test 선택여부에 대하여 망설이게 된다면 여러분은 우선 우리Pass4Test 사이트에서 제공하는 Cisco 351-018 (CCIE Security Qualification) 관련 자료의 일부분 문제와 답 등 샘플을 무료로 다운받아 체험해볼 수 있습니다. 체험 후 Pass4Test에 신뢰감을 느끼게 됩니다. Pass4Test는 여러분이 안전하게 Cisco 351-018 (CCIE Security Qualification) 시험을 패스할 수 있는 최고의 선택입니다. Pass4Test을 선택함으로써 여러분은 성공도 선택한것이라고 볼수 있습니다.
Pass4Test 의 Cisco 351-018 (CCIE Security Qualification) 자료로 자신만만한 시험 준비 하시기를 바랍니다. 우리를 선택함으로 자신의 시간을 아끼는 셈이라고 생각하시면 됩니다. Cisco 351-018 (CCIE Security Qualification) 로 빠른 시일내에 자격증 취득하시고 Cisco 351-018 (CCIE Security Qualification) IT업계중에 엘리트한 전문가로 되시기를 바랍니다.
Pass4Test 는 백프로 여러분들한테 편리함과 통과율을 보장 드립니다. 여러분이 안전하게 Cisco 351-018 (CCIE Security Qualificati on) 시험을 패스할 수 있는 곳은 바로 Pass4Test입니다.인증시험을 패스하려면 시험대비 자료 선택은 필수입니다. Pass4Test의 전문가들은 모두 경험도 많고 그들이 연구해낸 자료는 실제시험의 문제를 많이 적중하고 있습니다.
NO.1 Refer to the exhibit.
Switch SW2 has just been added to Fa0/23 on SW1. After a few seconds, interface Fa0/23 on SW1 is
placed in the error-disabled state. SW2 is removed from port 0/23 and inserted into SW1 port Fa0/22 with
the same result. What is the most likely cause of this problem?
A. The spanning-tree PortFast feature has been configured on SW1.
B. BPDU filtering has been enabled either globally or on the interfaces of SW1.
C. The BPDU guard feature has been enabled on the Fast Ethernet interfaces of SW1.
D. The Fast Ethernet interfaces of SW1 are unable to autonegotiate speed and duplex with SW2.
E. PAgP is unable to correctly negotiate VLAN trunk characteristics on the link between SWI and SW2.
Answer: C
NO.2 Which one of the following is not a valid RADIUS packet type.?
A. access-reject
B. access-response
C. access-challenge
D. access-reply
E. access-accept
Answer: B
NO.3 In ISO 27001 ISMS, which three of these certification process phases are required to collect
information for ISO 27001? (Choose three.)
A. discover
B. certification audit
C. post-audit
D. observation
E. pre-audit
F. major compliance
Answer: BCE
NO.4 Which two of these commands are required to implement a Cisco Catalyst 6500 Series Firewall
Services Module (FWSM) in a Catalyst 6500 running Cisco IOS? (Choose two.)
A. firewall multiple-vlan-interfaces
B. firewall module vlan-group
C. module secure-traffic
D. firewall vlan-group <vlan-x>
E. firewall module secure-traffic
Answer: BD
NO.5 In the example shown, Host A has attempted a DCOM attack using Metasploit from Host A to Host
Which three statements best describe how event logs and IPS alerts can be used in conjunction with each
other to determine if the attack was successful? (Choose three.)
A. Cisco Security MARS will collect the syslog and the IPS alerts based on time.
B. The IPS event will suggest that an attack may have occurred because a signature was triggered.
C. IPS and Cisco ASA adaptive security appliance will use the Unified Threat Management protocol to
determine that both devices saw the attack
D. Cisco ASA adaptive security appliance will see the attack in both directions and will be able to
determine if an attack was successful.
E. The syslog event will indicate that an attack is likely because a TCP SYN and an ACK followed the
attempted attack.
Answer: ABE
NO.6 Cisco ASA 5500 Series Adaptive Security Appliance application layer protocol inspection is
implemented using which of these?
A. Protocol Header Definition File (PHDF)
B. Cisco Modular Policy Framework
C. Reverse Path Forwarding (RPF)
D. NetFlow version 9
E. Traffic Classification Definition File (TCDF)
Answer: B
NO.7 Which two of these are valid TACACS+ Accounting packets? (Choose two.)
A. REQUEST
B. REPLY
C. RESPONSE
D. CONTINUE
E. START
Answer: AC
NO.8 Refer to the exhibit.
Which of these statements is correct for the Fidelity Rating and Base RR values?
A. Both the Fidelity Rating and Base RR values are computed from the Severity Factor value.
B. The Fidelity Rating value is computed from the Base RR value.
C. The Severity Factor value is computed from the Fidelity Rating and Base RR values.
D. The Fidelity Rating value is computed from the Base RR and Severity Factor values.
E. The Base RR value is computed from the Fidelity Rating and Severity Factor values.
Answer: E
NO.9 How do TCP SYN attacks take advantage of TCP to prevent new connections from being established
to a host under attack?
A. sending multiple FIN segments, forcing TCP connection release
B. filling up a host listen queue by failing to ACK partially opened TCP connections
C. taking advantage of the host transmit backoff algorithm by sending jam signals to the host
D. incrementing the ISN of each segment by a random number, causing constant TCP retransmissions
E. sending TCP RST segments in response to connection SYN+ACK segments, forcing SYN
retransmissions
Answer: B
NO.10 To provide a separation of duties within Cisco Security Manager, which mode would the Cisco Security
Manager administrator use?
A. Activity mode
B. Change Control mode
C. Workflow mode
D. Task-Based mode
E. Task Isolation mode
Answer: C
Cisco 351-018 (CCIE Security Qualification) 자격증덤프
Posted 2012/11/28 6:56:54 | Category: 미분류 | Tag: