Easily Pass By Training Lead2pass Latest Dumps
https://www.freebraindump.com/passed-cisco-350-018-exam-with-pass4sure-and-lead2pass-pdf-vce-161-170.html
Export date: Fri Mar 29 6:45:25 2024 / +0000 GMT

Passed Cisco 350-018 Exam with Pass4sure and Lead2pass PDF & VCE (161-170)


QUESTION 161
How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?

A.    It is included in the CIADDR field.
B.    It is included as DHCP Option 50 in the OPTIONS field.
C.    It is included in the YIADDR field.
D.    It is the source IP address of the UDP/53 wrapper packet.
E.    The client cannot request its last IP address; it is assigned automatically by the server.

Answer: B



QUESTION 162
Which two statements about an authoritative server in a DNS system are true? (Choose two.)

A.    It indicates that it is authoritative for a name by setting the AA bit in responses.
B.    It has a direct connection to one of the root name servers.
C.    It has a ratio of exactly one authoritative name server per domain.
D.    It cannot cache or respond to queries from domains outside its authority.
E.    It has a ratio of at least one authoritative name server per domain.

Answer: AE

QUESTION 163
Refer to the exhibit. Which three statements are true? (Choose three.)

image
A.    Because of a "root delay" of 0ms, this router is probably receiving its time directly from a Stratum 0 or 1
GPS reference clock.
B.    This router has correctly synchronized its clock to its NTP master.
C.    The NTP server is running authentication and should be trusted as a valid time source.
D.    Specific local time zones have not been configured on this router.
E.    This router will not act as an NTP server for requests from other devices.

Answer: BCE

QUESTION 164
Which three security features were introduced with the SNMPv3 protocol? (Choose three.)

A.    Message integrity, which ensures that a packet has not been tampered with in-transit
B.    DoS prevention, which ensures that the device cannot be impacted by SNMP buffer overflow
C.    Authentication, which ensures that the message is from a valid source
D.    Authorization, which allows access to certain data sections for certain authorized users
E.    Digital certificates, which ensure nonrepudiation of authentications
F.    Encryption of the packet to prevent it from being seen by an unauthorized source

Answer: ACF

QUESTION 165
Which common Microsoft protocol allows Microsoft machine administration and operates over TCP port 3389?

A.    remote desktop protocol
B.    desktop mirroring
C.    desktop shadowing
D.    Tarantella remote desktop

Answer: A

QUESTION 166
To prevent a potential attack on a Cisco IOS router with the echo service enabled, what action should you take?

A.    Disable the service with the no ip echo command.
B.    Disable the service with the no echo command.
C.    Disable tcp-small-servers.
D.    Disable this service with a global access-list.

Answer: C

QUESTION 167
Which query type is required for an nslookup on an IPv6 addressed host?

A.    type=AAAA
B.    type=ANY
C.    type=PTR
D.    type=NAME-IPV6

Answer: A

QUESTION 168
Which three features describe DTLS protocol? (Choose three.)

A.    DTLS handshake does not support reordering or manage loss packets.
B.    DTLS provides enhanced security, as compared to TLS.
C.    DTLS provides block cipher encryption and decryption services.
D.    DTLS is designed to prevent man-in-the-middle attacks, message tampering, and message forgery.
E.    DTLS is used by application layer protocols that use UDP as a transport mechanism.
F.    DTLS does not support replay detection.

Answer: CDE

QUESTION 169
Which statement regarding TFTP is not true?

A.    Communication is initiated over UDP port 69.
B.    Files are transferred using a secondary data channel.
C.    Data is transferred using fixed-size blocks.
D.    TFTP authentication information is sent in clear text.
E.    TFTP is often utilized by operating system boot loader procedures.
F.    The TFTP protocol is implemented by a wide variety of operating systems and network devices.

Answer: D

QUESTION 170
User A at Company A is trying to transfer files to Company B, using FTP. User A can connect to the FTP server at Company B correctly, but User A cannot get a directory listing or upload files.
The session hangs.
What are two possible causes for this problem? (Choose two.)

A.    Active FTP is being used, and the firewall at Company A is not allowing the returning data connection
to be initiated from the FTP server at Company B.
B.    Passive FTP is being used, and the firewall at Company A is not allowing the returning data connection
to be initiated from the FTP server at Company B.
C.    At Company A, active FTP is being used with a non-application aware firewall applying NAT to the
source address of User A only.
D.    The FTP server administrator at Company B has disallowed User A from accessing files on that server.
E.    Passive FTP is being used, and the firewall at Company B is not allowing connections through to port 20
on the FTP server.

Answer: AC

If you want to pass Cisco 350-018 successfully, donot missing to read latest lead2pass Cisco 350-018 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/350-018.html
Post date: 2014-04-19 02:27:23
Post date GMT: 2014-04-19 02:27:23

Post modified date: 2014-05-27 08:20:22
Post modified date GMT: 2014-05-27 08:20:22

Export date: Fri Mar 29 6:45:25 2024 / +0000 GMT
This page was exported from Easily Pass By Training Lead2pass Latest Dumps [ https://www.freebraindump.com ]
Export of Post and Page has been powered by [ Universal Post Manager ] plugin from www.ProfProjects.com