设为首页收藏本站language 语言切换
查看: 3835|回复: 27
收起左侧

[笔试战报] 350-018 题库答案分享

[复制链接]
发表于 2016-6-2 15:52:50 | 显示全部楼层 |阅读模式
鸿鹄论坛_CCIE 350-018 security new Questions with answer.pdf (1.57 MB, 下载次数: 510, 售价: 2 个鸿鹄币) # f; X4 R& d" b% f$ C
/ ~5 z% \5 E; `: z/ f* D& G4 b
前些日子论坛上没有答案的350-018题库,答案系本人意见,自行斟酌。

评分

参与人数 2好评度 +1 鸿鹄币 +10 收起 理由
mattechnical + 1 赞一个!
小乔 + 10 赞一个!

查看全部评分

发表于 2016-6-2 16:25:00 | 显示全部楼层
这里有题库 昨天仍然过人
沙发 2016-6-2 16:25:00 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:25:21 | 显示全部楼层
dwddsdsdsds
板凳 2016-6-2 16:25:21 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:35:48 | 显示全部楼层
All of these are predefined reports in the Cisco IPS Manager Express (Cisco IME) GUI except which one?( }- a: i. s3 V3 c* i& D. L; q
A. Top Signature Report/ a: L$ ]  w# D2 b% y
B. Top Application Report% H# o# E: P( R/ T$ m% X2 B* X6 W4 @8 Q
C. Attacks Overtime Report
% g4 b6 g' U+ I: ^% {D. Top victims Report, U  S4 Q/ T: Q' }* T6 c3 ^" w2 u6 Q
E. Top Attacker Report
: t3 m2 h0 B* F5 V0 I. K$ z
  C, ~& I5 A8 g* o( z5 M% g第六十题是不是应该选B
地板 2016-6-2 16:35:48 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:39:13 | 显示全部楼层
第七十题  K2 o7 I1 H5 s2 D6 |
有些疑问
5 Y: P/ C3 F/ ~( B! h9 U4 p+ \2 S$ p% j2 D& ?
1. Add the anomaly detection policy to your virtual sensors.# k; a$ m) t  b$ X  y
You can use the default anomaly detection policy, ad0, or you can configure a new one.1 p0 b! H$ T9 ~8 ?( V5 O* u7 r$ z
2. Configure the anomaly detection zones and protocols.
5 e1 k, }8 Q9 `* j1 M: F3. By default, the anomaly detection operational mode is set to Detect, although for the first 24 hours
! p6 S/ O5 U) m7 z: mit performs learning to create a populated KB. The initial KB is empty and during the default 248 A8 z9 Y( c2 A$ L
hours, anomaly detection collects data to use to populate the KB. If you want the learning period to
( l$ M8 q4 r9 |* Q: Hbe longer than the default period of 24 hours, you must manually set the mode to Learning Accept.0 C( V5 U( ^, [+ s2 J2 b
4. Let the sensor run in learning accept mode for at least 24 hours (the default).5 z& }! F0 ~. R+ L
You should let the sensor run in learning accept mode for at least 24 hours so it can gather+ Y( `# {/ k( @" I# v
information on the normal state of the network for the initial KB. However, you should change the3 z  ^4 b; R) s) t+ c
amount of time for learning accept mode according to the complexity of your network.
: b* }0 u! v; ~9 N* Z9 N# z5 J5. If you manually set anomaly detection to learning accept mode, switch back to detect mode.
5 v9 c4 G& \# N1 C, x6. Configure the anomaly detection parameters:" a- w* {, p' N! e$ J5 v; K" Y/ Q9 o* s
• Configure the worm timeout and which source and destination IP addresses should be bypassed
  u, d" b' ~5 Bby anomaly detection.
6 g- y0 h0 Q) z2 _/ wAfter this timeout, the scanner threshold returns to the configured value.6 K& |/ ]4 A( C1 q. s
• Decide whether you want to enable automatic KB updates when anomaly detection is in detect5 m/ @+ E, |* ~4 a
mode.
$ ]) U: y: ]  p( d• Configure the 18 anomaly detection worm signatures to have more event actions than just the
, N6 l) V5 r1 M7 N4 d/ `6 x0 {0 Kdefault Produce Alert. For example, configure them to have Deny Attacker event actions.
8 L1 _* b/ B" J2 x
Capture22222.PNG
5# 2016-6-2 16:39:13 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-3 08:56:50 | 显示全部楼层
Hi all,5 x" E$ c% m  P& f
4 L+ _8 L/ T; {2 w/ N% d3 k
Q23, E is correct ?
- t" N1 H) L6 d  C3 ?0 L, D# r% @$ [, ]* f( u" H0 h
QUESTION NO: 239 e9 S2 y9 _# Y- W5 B' z
What technology can you implement on your network to allow Independent applications to work with IPv6-capable applications?9 V7 Y' E! ]; Y' y$ J" M. S  G
A.        DS-Lite0 O3 v8 s& a* D8 R( p) T- F1 |4 g
B.        NAT-PT
2 ]& k# h/ t4 X2 ?. ]# Q5 l% gC.        ISATAP! V/ V! k1 x5 i# m
D.        NAT 6to4
. J5 I0 b$ }! {9 fE.        NAT64
  e0 i5 {$ K. S2 I, ~
  [3 A. e, _+ Q) m) w9 R; V9 G* cQ26, seem only E is true, any suggestion.
0 k6 i/ p) Q" u3 B" x5 }' E( ~: X  e$ }1 ~  p0 |; F! i( s
QUESTION NO: 266 Q& @6 |( ], Z
Which two statements about 802.1x authentication with port security are true? (Choose two.)
% g: z: J, o6 A8 s/ G% W: Q* K/ B! w0 h
A.        If any client causes a security violation, the port is immediately placed in spanning-tree disabled mode.1 E* J6 ~; t9 [( d
B.        An entry is created in the secure host table for any client that is authenticated and manually configured for port security, even if the table is full.+ r$ X% G4 V! [# Y$ N2 s
C.        802.1x manages network access for all authorized MAC addresses.
8 |0 I& k! i6 N9 j0 {* YD.        If a client is authenticated and the port security table is full, the oldest client is aged out.
4 H$ o8 O/ I6 G7 w$ FE.        If any host causes a security violation, the port is immediately error-disabled.
# k7 c4 r- X) r2 Y' v
11# 2016-6-3 08:56:50 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-4 11:56:00 | 显示全部楼层
请问楼主是用这份试题过了么?
12# 2016-6-4 11:56:00 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-13 15:37:47 | 显示全部楼层
thanks for sharing!
13# 2016-6-13 15:37:47 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-13 17:35:50 | 显示全部楼层
一个题库扣3个币,给了作者还的给论坛。
15# 2016-6-13 17:35:50 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-24 19:07 , Processed in 0.214794 second(s), 29 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表