Monday, 6 November 2017

Cisco 350-018 Question Answer

What technology can you implement on your network to allow Independent applications to work with IPv6-capable applications?

A. DS-Lite
D. NAT 6to4
E. NAT64

Answer: E

Which three of these statements about a zone-based policy firewall are correct? (Choose three.)

A. An interface can be assigned to only one security zone.
B. By default, all traffic to and from an interface that belongs to a security zone is dropped unless explicitly allowed in the zone-pair policy.
C. Firewall policies, such as the pass, inspect, and drop actions, can only be applied between two zones.
D. In order to pass traffic between two interfaces that belong to the same security zone, you must configure a pass action using class-default.
E. Traffic cannot flow between a zone member interface and any interface that is not a zone member.

Answer: ACE

Monday, 11 September 2017

Cisco 350-018 Question Answer

Which four of these attacks or wireless tools can the standard IDS signatures on a wireless LAN controller detect? (Choose four.)

A. long HTTP request
B. SYN flood
C. Deauthorization flood
D. NetStumbler
E. Wellenreiter
F. Association flood
G. AirSnort
H. Fragment Overlap attack

Answer: CDEG

What Cisco IOS feature prevents an attacker from filling up the MTU cache for locally generated traffic when using path MTU discovery?

A. Use NetFlow information to export data to a workstation.
B. Force all traffic to send 1280-byte Packets by hard coding the MSS.
C. Enable flow-label marking to track packet destination.
D. Enable flow-label switching to track IPv6 packets in the MPLS cloud.
E. Always use packets of 1500-byte size or larger.

Answer: C

Tuesday, 18 April 2017

Cisco 350-018 Question Answer

Which of the following statements are true regarding hashing? (choose two)

A. Changing 1 bit of the input SHA-1 changes 1 bit of the output.
B. SHA-1 is stronger than MD5 because it can be used with a key to prevent modification.
C. MD5 produces a 160-bit result.
D. MD5 takes more CPU cycles to compute than SHA-1.
E. SHA-256 is an extension to SHA-1 with a longer output.

Answer: BE

Which statement about the effect of this command is true?
Refer to the exhibit.

A. It lists the current protocol-to-port mappings of NBAR.
B. It lists traffic that is packet switched and bypassed by NBAR.
C. It lists the number of packets processed for unknown and unclassified flows.
D. It lists the attributes configured for unknown and unclassified flows.
E. It displays the link age for unknown and unclassified flows.

Answer: D

Friday, 26 August 2016

Pass4sure 350-018 Question Answer

Which protocol does 802.1X use between the supplicant and the authenticator to authenticate users who wish to access the network?

D. EAP over LAN

Answer: D

Monday, 11 July 2016

How Cisco’s Launchpad is looking to give start-ups, developers a leg-up

Cisco’s LaunchPad programme aims to bring startups and developers on a common platform to build digital solutions

There are three billion internet users and 22 billion connected devices today. In the next five years, 3 billion more users will be added and the number of connected devices is expected to reach 50 billion. No single company will be able to create solutions for all. That is why big corporations are experimenting with a consortium approach in which different firms come together to identify problems, pool their resources to create solutions and market them.

Recently, the US-based technology firm Cisco took a step in this direction by launching its LaunchPad programme in India, which aims to bring startups, developers and Cisco’s experts on a common platform to build solutions that can help governments and enterprises digitise them.

The programme has been designed in such a way that startups, developers, Cisco’s experts and authorised channel partners will come together to identify a problem, create a solution and use Cisco’s go-to-market (GTM) platform to reach new market and build digital businesses.

Basically, India has a very large developer base. According to Cisco’s internal study, the country will have world’s largest number of developers by 2018. Since Cisco is already working with 10-12 big partners like Wipro, TCS, Cognizant, Tech Mahindra, MindTree, iGate, who have vertical expertise, with LaunchPad programme; it wants to engage the developer community with domain experts to create solutions aimed at solving digitisation problems.
“Digitisation will transform the way the next 3 billion people will work, live, play, and learn. We have an unprecedented opportunity to digitise the next three billion people in one-third the time it took to connect the first three billion. Through Cisco LaunchPad we want to unleash the next generation of disruptive ideas and help turn the entrepreneurs of today into the business leaders of tomorrow,” said Amit Phadnis, president, engineering and India site leader, Cisco.

To ensure smooth flow and faster progress, Cisco is providing space at its Bengaluru campus with access to a suite of Cisco’s technologies and free grants to startups chosen to work at its campus. In addition, a dedicated team from Cisco will be available to mentor startups and developers. The company informs that entry to this programme will involve a rigorous selection process based on the viability of applicant’s business plans, the strength of their teams and their alignment with Cisco’s digitisation vision.

Also, in order to bridge the gap between the high pace working style of a startup and bureaucratic way of functioning of large corporation, Cisco says that it will keep the team very nimble. “There will be a serious technical person like a principal engineer or distinguished engineer and director of engineering who will be directly attached with the programme. They will be our conduit to rest of Cisco, they can make the decision quickly, they can pull other resources from Cisco if needed,” said  Phadnis, adding that the purpose of the programme is to help the startups, not to become the bottleneck.

Is Cisco’s LaunchPad different from startup programmes of other tech giants such as SAP, Microsoft, National Instruments, Avaya? Perhaps not, but Phadnis argued that an opportunity to work on solving business relevant problems by catering to use cases that are already identified and validated by Cisco go-to-market teams is something unique. He said, “I will not categorise it as a startups programme neither it is just an accelerator. It is a much large construct. The basic difference is that we are getting the entire go-to-market muscle of Cisco behind this programme. Lot of background activity is happening within Cisco to identify what are those opportunities from digitisation perspective that we need to solve.”

Cisco already runs Cisco Digitisation Acceleration and Cisco Investment programmes in India. It has committed $280m to boost the Indian startup ecosystem. In fact, during the launch of this programme, the company announced that it had collaborated with Tech Mahindra to develop digital solutions for electric utilities. They will work with select startups and developers to create solutions that can digitise different elements of power sector like digital meter.

Tuesday, 7 June 2016

Pass4sure 350-018 Question Answer

Refer to the exhibit.

Which message could contain an authenticated initial_contact notify during IKE main mode negotiation?

A. message 3
B. message 5
C. message 1
D. none, initial_contact is sent only during quick mode
E. none, notify messages are sent only as independent message types

Answer: B                                                               Passleader 350-018 Practice Exam

Friday, 6 May 2016

Pass4sure 350-018 Question Answer

Which three statements are correct when comparing Mobile IPv6 and Mobile IPv4 support? (Choosethree.)

A. Mobile IPv6 does not require a foreign agent, but Mobile IPv4 does.
B. Mobile IPv6 supports route optimization as a fundamental part of the protocol; IPv4 requires extensions.
C. Mobile IPv6 and Mobile IPv4 use a directed broadcast approach for home agent address discovery.
D. Mobile IPv6 makes use of its own routing header; Mobile IPv4 uses only IP encapsulation.
E. Mobile IPv6 and Mobile IPv4 use ARP for neighbor discovery.
F. Mobile IPv4 has adopted the use of IPv6 ND.

Answer: A, B, D