Passed Cisco 350-018 Exam with Pass4sure and Lead2pass PDF & VCE (161-170)

How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?

A.    It is included in the CIADDR field.
B.    It is included as DHCP Option 50 in the OPTIONS field.
C.    It is included in the YIADDR field.
D.    It is the source IP address of the UDP/53 wrapper packet.
E.    The client cannot request its last IP address; it is assigned automatically by the server.

Answer: B

Which two statements about an authoritative server in a DNS system are true? (Choose two.)

A.    It indicates that it is authoritative for a name by setting the AA bit in responses.
B.    It has a direct connection to one of the root name servers.
C.    It has a ratio of exactly one authoritative name server per domain.
D.    It cannot cache or respond to queries from domains outside its authority.
E.    It has a ratio of at least one authoritative name server per domain.

Answer: AE

Refer to the exhibit. Which three statements are true? (Choose three.)

A.    Because of a “root delay” of 0ms, this router is probably receiving its time directly from a Stratum 0 or 1
GPS reference clock.
B.    This router has correctly synchronized its clock to its NTP master.
C.    The NTP server is running authentication and should be trusted as a valid time source.
D.    Specific local time zones have not been configured on this router.
E.    This router will not act as an NTP server for requests from other devices.

Answer: BCE

Which three security features were introduced with the SNMPv3 protocol? (Choose three.)

A.    Message integrity, which ensures that a packet has not been tampered with in-transit
B.    DoS prevention, which ensures that the device cannot be impacted by SNMP buffer overflow
C.    Authentication, which ensures that the message is from a valid source
D.    Authorization, which allows access to certain data sections for certain authorized users
E.    Digital certificates, which ensure nonrepudiation of authentications
F.    Encryption of the packet to prevent it from being seen by an unauthorized source

Answer: ACF

Which common Microsoft protocol allows Microsoft machine administration and operates over TCP port 3389?

A.    remote desktop protocol
B.    desktop mirroring
C.    desktop shadowing
D.    Tarantella remote desktop

Answer: A

To prevent a potential attack on a Cisco IOS router with the echo service enabled, what action should you take?

A.    Disable the service with the no ip echo command.
B.    Disable the service with the no echo command.
C.    Disable tcp-small-servers.
D.    Disable this service with a global access-list.

Answer: C

Which query type is required for an nslookup on an IPv6 addressed host?

A.    type=AAAA
B.    type=ANY
C.    type=PTR
D.    type=NAME-IPV6

Answer: A

Which three features describe DTLS protocol? (Choose three.)

A.    DTLS handshake does not support reordering or manage loss packets.
B.    DTLS provides enhanced security, as compared to TLS.
C.    DTLS provides block cipher encryption and decryption services.
D.    DTLS is designed to prevent man-in-the-middle attacks, message tampering, and message forgery.
E.    DTLS is used by application layer protocols that use UDP as a transport mechanism.
F.    DTLS does not support replay detection.

Answer: CDE

Which statement regarding TFTP is not true?

A.    Communication is initiated over UDP port 69.
B.    Files are transferred using a secondary data channel.
C.    Data is transferred using fixed-size blocks.
D.    TFTP authentication information is sent in clear text.
E.    TFTP is often utilized by operating system boot loader procedures.
F.    The TFTP protocol is implemented by a wide variety of operating systems and network devices.

Answer: D

User A at Company A is trying to transfer files to Company B, using FTP. User A can connect to the FTP server at Company B correctly, but User A cannot get a directory listing or upload files.
The session hangs.
What are two possible causes for this problem? (Choose two.)

A.    Active FTP is being used, and the firewall at Company A is not allowing the returning data connection
to be initiated from the FTP server at Company B.
B.    Passive FTP is being used, and the firewall at Company A is not allowing the returning data connection
to be initiated from the FTP server at Company B.
C.    At Company A, active FTP is being used with a non-application aware firewall applying NAT to the
source address of User A only.
D.    The FTP server administrator at Company B has disallowed User A from accessing files on that server.
E.    Passive FTP is being used, and the firewall at Company B is not allowing connections through to port 20
on the FTP server.

Answer: AC

If you want to pass Cisco 350-018 successfully, donot missing to read latest lead2pass Cisco 350-018 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.


Why Choose Lead2pass?

If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back