When initiating a new SSL/TLS session, the client receives the server SSL certificate and validates it. What does the client use the certificate for after validating it? Select the best response.
A. The client and server use the key in the certificate to encrypt all data in the following SSL session.
B. The server creates a separate session key and sends it to the client. The client has to decrypt the session key using the server public key from the certificate.
C. The client creates a separate session key and encrypts it with the server public key from the certificate before sending it to the server.
D. Nothing, the client and server switch to symmetric encryption using IKE to exchange keys.
E. The client generates a random string, encrypts it with the server public key from the certificate, and sends it to the server. Both the client and server derive the session key from the random data sent by the client.
Correct Answer: E
Which three of these statements describe how DNSSEC prevents DNS cache poisoning attacks from
succeeding? (Choose three.)
Select 3 response(s).
A. DNSSEC encrypts all records with domain-specific keys.
B. DNSSEC eliminates caching and forces all answers to be authoritative.
C. DNSSEC introduces KEY records that hold domain-specific public keys.
D. DNSSEC deprecates CNAME records and replaces them with DS records.
E. DNSSEC utilizes DS records to establish a trusted hierarchy of zones.
F. DNSSEC signs all records with domain-specific keys.
Correct Answer: CEF
Which two of the following statements describe why TACACS+ is more desirable from a security
standpoint than RADIUS? (Choose two.)
Select 2 response(s).
A. It uses UDP as its transport.
B. It uses TCP as its transport.
C. It encrypts the password field with a unique key between server and requester.
D. Encrypting the whole data payload is optional.
E. Authentication and authorization are combined into a single query for robustness.
Correct Answer: BD
When using Cisco SDM to manage a Cisco IOS device, what configuration statements are necessary to be
able to use Cisco SDM?
Select the best response.
A. ip http server
B. ip http secure-server
C. ip http server sdm location X.X.X.X
D. ip http secure-server sdm location X.X.X.X
E. ip http server ip http secure-server
Correct Answer: A
In regards to private address space, which three of the following statements are true? (Choose three.) Select 3 response(s).
A. Private address space is defined in RFC 1918.
B. These IP addresses are considered private:
C. Private address space is not supposed to be routed over the Internet.
D. 127.0.0.1 is also considered part of private address space, according to the RFC.
E. Using only private address space and NAT to the Internet is not considered as secure as having a stateful firewall.
Correct Answer: ACE
A firewall administrator received this syslog message from his adaptive security appliance. What can the firewall administrator infer from the message? Select the best response.
A. The server at 18.104.22.168 is under a smurf attack.
B. The server at 10.1.1.20 is under a SYN attack.
C. The client at 22.214.171.124 has been infected with a virus.
D. The server at 10.1.1.20 is under a smurf attack. Certkey.com – Make You Succeed To Pass IT Exams Certkey 350-018
Correct Answer: B
Which two of the following statements are attributed to stateless filtering? (Choose two.) Select 2 response (s).
A. The first TCP packet in a flow must be a SYN packet.
B. It must process every packet against the inbound ACL filter.
C. It can look at sequence numbers to validate packets in flow.
D. It must implement an idle timeout.
E. It can be used in asymmetrical traffic flows.
Correct Answer: BE
Which three of the following are attributes of the RADIUS protocol? (Choose three.) Select 3 response(s).
A. encrypts the password
B. hashes the password
C. uses UDP as the transport
D. uses TCP as the transport
E. combines authentication and authorization in a single request
F. commonly used to implement command authorization
Correct Answer: BCE
Which two of the following commands are required to implement a Cisco Catalyst 6500 Series FWSM?
Select 2 response(s).
A. firewall multiple-vlan-interfaces
B. firewall module x vlan-group y
C. module x secure-traffic
D. firewall vlan-group
E. firewall module x secure-traffic
Correct Answer: BD
If an administrator is unable to connect to a Cisco ASA or PIX security appliance via Cisco ASDM, which four of the following items should be checked? (Choose four.) Select 4 response(s).
Certkey.com – Make You Succeed To Pass IT Exams Certkey 350-018
A. The HTTPS server is enabled.
B. The HTTP server is enabled.
C. The user IP address is permitted in the interface ACL.
D. The user IP address is permitted in the HTTP statement.
E. The ASDM file resides in flash memory.
F. The asdm image command exists in the configuration.
Correct Answer: BDEF