Which VTP mode allows the Cisco Catalyst switch administrator to make changes to the VLAN configuration …?

Which VTP mode allows the Cisco Catalyst switch administrator to make changes to the VLAN
configuration that only affect the local switch and are not propagated to other switches in the VTP
domain?

Which VTP mode allows the Cisco Catalyst switch administrator to make changes to the VLAN
configuration that only affect the local switch and are not propagated to other switches in the VTP
domain?

A.
transparent

B.
server

C.
client

D.
local

E.
pass-through

Explanation:



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Timmy Griffin

Timmy Griffin

Just passed the 350-018 exam few days ago, 965/1000 marks!

Many new questions in real test, it seems that Cisco just updated the 350-018 exam.

New questions were on ACL Policy, Cisco IronPort, VRF, Cisco IOS FlexVPN, Cisco PCI Solution Framework, DHCP Server, IANA/GDOI, IPv6 extension headers and so on.

Some new questions that I remembered from my real test:

NEW QUESTION 1
What are three scanning engine that the Cisco IronPort dynamic vectoring and streaming engine can use to protect against malware? (Choose three)

A. McAfee
B. F-Secure
C. TrendMicro
D. Symantec
E. Webroot
F. Sophos

NEW QUESTION 2
Which three statements about VRF aware Cisco Firewall are true? (Choose three)

A. It enables service providers to implement firewall on PE devices
B. It can run as more than one instance
C. It’s can support VPN network with overlapping address range without NAT
D. It can generate syslog message that are visible only to individual VPN
E. Its support both global and per-VRF commands and DOS parameter
F. It enables service

NEW QUESTION 3
Which two statements about router advertisement message are true? (Choose two)

A. Message are sent to the multicast address FF02::1
B. Local link prefixes are shared automatically
C. Flag settings are shared in the message and retransmitted on the link
D. Router solicitation message are sent in response to Router Advertisement message
E. It support a configurable number of retransmission attempt for neighbor solicitation message
F. Each prefix included in the advertisement carrier’s lifetime information for that prefix

NEW QUESTION 4
What are three benefits of Cisco IOS FlexVPN? (Choose three)

A. Its provide hierarchical QoS on a per-tunnel basis
B. It is compatible with most private intranet deployments
C. Its support TACACS+
D. It is compatible with IKEv2-based third-party VPN solutions
E. It provides centralized policy control
F. It support DMVPN deployment

NEW QUESTION 5
What is an example of a WEP cracking attack?

A. Reflected XSS attack
B. Dictionary travelers attack
C. SQL injection attack

NEW QUESTION 6
From what type of server can you to transfer files to ASA’s internal memory?

A. SSH
B. Netlogon
C. SFTP
D. SMB

NEW QUESTION 7
What are three of the components of the Cisco PCI solution framework? (choose three)

A. Infrastructure
B. Risk Assessment
C. Virtualization
D. Endpoint
E. Disaster management
F. Services

NEW QUESTION 8
Which ASA device is designated as the cluster master?

A. the ASA with the highest MAC address
B. the ASA with the lowest MAC address
C. the ASA configured with the highest priority value
D. the ASA configures with lowest priority value

NEW QUESTION 9
What are the features of Cisco IOS that can help mitigate Blaster worm attack on RPC ports? (Choose two)

A. DCAR
B. dynamic ARP inspection
C. FPM
D. IP Source Guard
E. NABAR
F. URPF

NEW QUESTION 10
What port has IANA assigned to the GDOI protocol?

A. UDP 1812
B. UDP 500
C. UDP 848
D. UDP 4500

NEW QUESTION 11
Which two statements about DHCP snooping are true? (Choose two)

A. The lease time in the banding database is a pre-set value
B. The binding database stores information about both IP and MAC addresses
C. Message sent from outside the service-provider network is untrusted
D. The binding database stores information about trusted interface
E. DHCP servers connect to untrusted interface on the switch

NEW QUESTION 12
What is the maximum pattern length support by FPM search within a packet?

A. 128 bytes
B. 256 bytes
C. 512 bytes
D. 1500 bytes

NEW QUESTION 13
What are three IPv6 extension headers? (Choose three)

A. Authentication
B. Destination options
C. Source options
D. Hop-by-hop options
E. TTL
F. Segment

NEW QUESTION 14
Which statement about the Cisco AnyConnect web Security module is true?

A. It is VPN client software that works over the SSL protocol
B. It is deployment on endpoints to route HTTP traffic to ScanSafe
C. It is an endpoint component that is used with smart tunnels in a clientless SSL VPN
D. It operates as an NAC Agent when it is configured with AnyConnect VPN client

I used the newest passleader 350-018 dumps (pdf and vce dumps from: https://tr.im/B7KPh), all new questions now are available in it, 100% same as the real test and 100% valid now!

Go ahead the 350-018 exam ASAP before Cisco updating the exam again! Good Luck!

Geoff Hopke

Geoff Hopke

New 350-018 Exam Questions and Answers Updated Recently (31/May/2016):

NEW QUESTION 685
What protocol is responsible for issuing certificates?

A. SCEP
B. AH
C. GET
D. ESP
E. DTLS

Answer: A

NEW QUESTION 686
Refer to the exhibit. Which statement about the effect of this command is true?
Image URL: examgod.com/plimages/5512ca113422_10297/new-350-018-dumps-6861_thumb.jpg

A. It lists the current protocol-to-port mappings of NBAR.
B. It lists traffic that is packet switched and bypassed by NBAR.
C. It lists the number of packets processed for unknown and unclassified flows.
D. It lists the attributes configured for unknown and unclassified flows.
E. It displays the link age for unknown and unclassified flows.

Answer: D

NEW QUESTION 687
Which four of these attacks or wireless tools can the standard IDS signatures on a wireless LAN controller detect? (Choose four.)

A. long HTTP request
B. SYN flood
C. Deauthorization flood
D. NetStumbler
E. Wellenreiter
F. Association flood
G. AirSnort
H. Fragment Overlap attack

Answer: CDEG

NEW QUESTION 688
What Cisco IOS feature prevents an attacker from filling up the MTU cache for locally generated traffic when using path MTU discovery?

A. Use NetFlow information to export data to a workstation.
B. Force all traffic to send 1280-byte Packets by hard coding the MSS.
C. Enable flow-label marking to track packet destination.
D. Enable flow-label switching to track IPv6 packets in the MPLS cloud.
E. Always use packets of 1500-byte size or larger.

Answer: C

NEW QUESTION 689
What technology can you implement on your network to allow Independent applications to work with IPv6-capable applications?

A. DS-Lite
B. NAT-PT
C. ISATAP
D. NAT 6to4
E. NAT64

Answer: E

NEW QUESTION 690
Which three of these statements about a zone-based policy firewall are correct? (Choose three.)

A. An interface can be assigned to only one security zone.
B. By default, all traffic to and from an interface that belongs to a security zone is dropped unless explicitly allowed in the zone-pair policy.
C. Firewall policies, such as the past, inspect, and drop actions, can only be applied between two zones.
D. In order to pass traffic between two interfaces that belong to the same security zone, you must configure a pass action using class-default.
E. Traffic cannot flow between a zone member interface and any interface that is not a zone member.

Answer: ACE

NEW QUESTION 691
Refer to the exhibit. What is the maximum number of hops from the device that generated the given output to its BGP neighbor at 4.4.4.4?
Image URL: examgod.com/plimages/5512ca113422_10297/new-350-018-dumps-6911_thumb.jpg

A. 3
B. 252
C. 5
D. 255
E. 2
F. 254

Answer: A

NEW QUESTION 692
Which two statements about 802.1x authentication with port security are true? (Choose two.)

A. If any client causes a security violation, the port is immediately placed in spanning-tree disabled mode.
B. An entry is created in the secure host table for any client that is authenticated and manually configured for port security, even if the table is full.
C. 802.1x manages network access for all authorized MAC addresses.
D. If a client is authenticated and the port security table is full, the oldest client is aged out.
E. If any host causes a security violation, the port is immediately error-disabled.

Answer: BE

NEW QUESTION 693
Refer to the exhibit.Which as-path access-list regular expression should be applied on R2 as a neighbor filter list to only allow updates with an origin of AS 65503?
Image URL: examgod.com/plimages/5512ca113422_10297/new-350-018-dumps-6931_thumb.jpg

A. _65503.?$
B. ^65503 .*
C. 65503
D. _65503_
E. _65503$
F. ^65503$

Answer: B

NEW QUESTION 694
If an ASA device is configured as a remote access IPsec server with RADIUS authentication and password management enabled, which type of authentication will it use?

A. MS-CHAFV2
B. MS-CHAPv1
C. RSA
D. NTLM
E. PAP

Answer: E

NEW QUESTION 695
……

NEW QUESTION 707
Drag and drop the step in the Cisco ASA packet processing flow on the left into the correct order of operations on the right.
Image URL: examgod.com/plimages/5512ca113422_10297/new-350-018-dumps-7071_thumb.jpg

Answer:
Image URL: examgod.com/plimages/5512ca113422_10297/new-350-018-dumps-7072_thumb.jpg

NEW QUESTION 708
……

P.S. These New 350-018 Exam Questions Were Just Updated From The Real 350-018 Exam, You Can Get The Newest 350-018 Dumps In PDF And VCE From — http://bitly.com/350-018-dumps-vce-pdf (788q)

Good Luck !!!

Justin Blaha

Justin Blaha

New 350-018 Exam Questions and Answers Updated Recently (23/Sep/2016):

NEW QUESTION 817
The computer at 10.10.10.4 on your network has been infected by a bontnet that directs traffic to a malware site at 168.65.201.120 Assuming that filtering will be performed on a Cisco ASA. What command can you use to block all current and future connections from the infected host?

A. ip access-list extended BLOCK_BOT_OUT deny ip any host 10.10.10.4
B. shun 168.65.201.120 10.10.10.4 6000 80
C. ip access-list extended BLOCK_BOT_OUT deny ip host 10.10.10.4 host 168.65.201.120
D. shun 10.10.10.4 68.65.201.120 6000 80

Answer: B

NEW QUESTION 818
Refer to the exhibit. Which effect of this configuration is true?
Image: examgod.com/plimages/0213cca9c00f_8D01/new-350-018-exam-dumps-8181_thumb.jpg

A. The MSS of TCP SYN packets is set to 1452 bytes and the IP MTU of the interface is set to 1942 bytes
B. The maximum size of TCP SYN+ACK packets passing the transient host is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes
C. The PMTUD values sets itself to 1452 bytes when the interface MTU is set to 1492 bytes
D. SYN packets carries 1452 bytes in the payload when the Ethernet MTU of the interface is to 1492 bytes
E. The maximum size of TCP SYN+ACK packets passing the router is set to 452 bytes and the IP MTU of the interface is set to 1492 bytes

Answer: A

NEW QUESTION 819
Refer to the exhibit. Which effect of this configuration is true?
Image: examgod.com/plimages/0213cca9c00f_8D01/new-350-018-exam-dumps-8191_thumb.jpg

A. It configures the node to generate a link-locak group report when it joins the solicited-node multicast group
B. It enables local group membership for MLDv1 and MLDv2
C. It enables hosts to send MLD report messages for groups in 224.0.0.0/24
D. It enables MLD query messages for all link-local groups
E. It enables the host to send MLD report messages for nonlink local groups

Answer: C

NEW QUESTION 820
You have configured an ASA firewall in multiple context mode. If the context are sharing an Interface. What are two of the actions you could take to classify packets to the appropriate Context? (Choose two)

A. Enable DHCP
B. Disable MAC auto-generation and adding unique IP addresses to each interface
C. Enable MAC auto-generation globally
D. Assign a unique MAC address to each interface
E. Apply QoS to each interface

Answer: CD

NEW QUESTION 821
Refer to the exhibit. What is the effect of the given configuration?
Image: examgod.com/plimages/0213cca9c00f_8D01/new-350-018-exam-dumps-8211_thumb.jpg

A. It requires the enable password to be authorized by the LOCAL database
B. It allows users to log in with any user name in the LOCAL database
C. It enables management authorization for a user-authenticated RADIUS server
D. Users will be authenticated against the RADIUS servers defined in the adm_net list
E. It allows SSH connections to console login into the ASA

Answer: D

NEW QUESTION 822
What feature enables extended secure access form non-secure physical locations?

A. NEAT
B. 802.1X port-based authentication
C. port security
D. storm-control
E. CBAC

Answer: A

NEW QUESTION 823
What are the two technologies that support AFT?(Choose two)

A. NAT-6to 4
B. NAT-PT
C. DNAT
D. NAT64
E. NAT-PMP
F. SNAT

Answer: BD

NEW QUESTION 824
On an ASA firewall in multiple context mode running version 8.X, what is the default number of VPN site-to-site tunnels per context?

A. 2 sessions
B. 4 sessions
C. 1 session
D. 0 sessions

Answer: A

NEW QUESTION 825
Which three statements about Unicast RPF in strict mode and loose mode are true? (Choose three)

A. Inadvertent packet loss can occur when loose mode is used with asymmetrical routing
B. Interface in strict mode drop traffic witch retun routes that point to the Null 0 interface
C. Strict mode requires a default route to be associated with the uplink network interface
D. Loose mode requires the source address to be present in the routing table
E. Both loose and strict modes are configured globally on the router
F. Strict mode is recommended on interfaces that will receive packets only from the same subnet to which the interface is assigned

Answer: BDF

NEW QUESTION 826
……

Download the newest 350-018 exam dumps from: https://drive.google.com/open?id=0B-ob6L_QjGLpfjE1cHRyNEtmX3JfdU9CUFlRZnVxNjZUbWxsSnBpNXM0QjZYZjBXZVgyOTQ (894q dumps, v4.1)

Good Luck !!!