设为首页收藏本站language 语言切换
查看: 3800|回复: 27
收起左侧

[笔试战报] 350-018 题库答案分享

[复制链接]
发表于 2016-6-2 15:52:50 | 显示全部楼层 |阅读模式
鸿鹄论坛_CCIE 350-018 security new Questions with answer.pdf (1.57 MB, 下载次数: 510, 售价: 2 个鸿鹄币) - L  I) S. r: F, R2 H- l

; f: e5 ~: P7 C( y$ ^0 X前些日子论坛上没有答案的350-018题库,答案系本人意见,自行斟酌。

评分

参与人数 2好评度 +1 鸿鹄币 +10 收起 理由
mattechnical + 1 赞一个!
小乔 + 10 赞一个!

查看全部评分

发表于 2016-6-2 16:25:00 | 显示全部楼层
这里有题库 昨天仍然过人
沙发 2016-6-2 16:25:00 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:25:21 | 显示全部楼层
dwddsdsdsds
板凳 2016-6-2 16:25:21 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:35:48 | 显示全部楼层
All of these are predefined reports in the Cisco IPS Manager Express (Cisco IME) GUI except which one?& ^# y4 l& `7 w6 @7 Y+ X
A. Top Signature Report( K2 i! f: n) R/ V5 |
B. Top Application Report
# Y) @" ]7 |4 FC. Attacks Overtime Report
) S0 A$ u6 k4 U4 `: {D. Top victims Report5 q  u4 Z: A/ v2 P5 F# W3 i
E. Top Attacker Report
- S+ p9 p6 u$ V) |1 |  J/ q* P) m" f# y" q( T( r6 n" B9 t$ U
第六十题是不是应该选B
地板 2016-6-2 16:35:48 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:39:13 | 显示全部楼层
第七十题
8 }6 y1 i/ l& A5 m' ~有些疑问
8 ?+ e+ X. j. {" N1 M  _! P. l  L9 J9 D) P% u" I; V; V
1. Add the anomaly detection policy to your virtual sensors.
' e$ X2 }9 c2 E' i, P$ V% }You can use the default anomaly detection policy, ad0, or you can configure a new one.
" k7 S" _! @& n% S2. Configure the anomaly detection zones and protocols.$ }6 |: m2 a" ?+ I0 v5 \. ^% T
3. By default, the anomaly detection operational mode is set to Detect, although for the first 24 hours
! l1 @1 R: ]+ |! x  Z; X- i, P/ b, Z9 Eit performs learning to create a populated KB. The initial KB is empty and during the default 24) Z* O8 L, B/ i
hours, anomaly detection collects data to use to populate the KB. If you want the learning period to* Q" `* p1 U/ V# a; |
be longer than the default period of 24 hours, you must manually set the mode to Learning Accept.
/ a4 k5 M4 @; L8 D# s4. Let the sensor run in learning accept mode for at least 24 hours (the default).
) @  x3 ]( e  `3 r0 `0 R7 N1 WYou should let the sensor run in learning accept mode for at least 24 hours so it can gather/ r7 b  R# Z9 s# k: s& K
information on the normal state of the network for the initial KB. However, you should change the6 b1 ?: Q9 N0 _& t) h
amount of time for learning accept mode according to the complexity of your network.
9 I, c# U& X# P4 R3 _5. If you manually set anomaly detection to learning accept mode, switch back to detect mode./ v5 j1 }1 S& h
6. Configure the anomaly detection parameters:5 Z) A* ~' K; D) x# S/ N8 s
• Configure the worm timeout and which source and destination IP addresses should be bypassed
! M* E0 d4 T" K: [/ j$ kby anomaly detection.
2 L+ t! s5 L' |/ qAfter this timeout, the scanner threshold returns to the configured value., O5 M/ t) ]& a5 {  n
• Decide whether you want to enable automatic KB updates when anomaly detection is in detect
4 P( J- A% B1 k& \" d/ a. w+ Amode.
( c- F7 [* J. J/ K: }. B( k! {( O• Configure the 18 anomaly detection worm signatures to have more event actions than just the
4 S# c" k$ I. |% l9 q6 r( sdefault Produce Alert. For example, configure them to have Deny Attacker event actions.
7 P! v1 p) ^1 E/ U& |
Capture22222.PNG
5# 2016-6-2 16:39:13 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-3 08:56:50 | 显示全部楼层
Hi all,1 V, U+ R$ {" p6 G

' A) m8 B6 R1 j# R. G- ^8 \Q23, E is correct ?3 y! j% y' i! n! e# p4 c
( @% @/ N$ a  m. _& \
QUESTION NO: 236 ?. h4 s$ Y. G, c* j
What technology can you implement on your network to allow Independent applications to work with IPv6-capable applications?& N. u7 g0 M$ o" @2 B' L- ~
A.        DS-Lite5 @/ ~7 a( H  e+ ~
B.        NAT-PT
8 L" A5 M/ Q1 B, U# `; bC.        ISATAP
" C4 L: k; M6 {( _) j+ v7 sD.        NAT 6to4
& p4 [/ @7 }$ z' j  n' RE.        NAT64! o) N: S* h# Q1 i" J1 x
) x6 r$ l; `$ B7 I* O8 P2 K4 b
Q26, seem only E is true, any suggestion.
- z! y$ @& i! k; n+ i$ s7 r$ I3 p: I2 y. V  \4 Y' |$ T
QUESTION NO: 26
3 [- d5 j/ T' R( `8 OWhich two statements about 802.1x authentication with port security are true? (Choose two.)4 D6 K$ ^# o$ R2 A8 i4 N' p: S
# ~5 I/ ]+ n# C" r) n
A.        If any client causes a security violation, the port is immediately placed in spanning-tree disabled mode.7 Y7 P" u) O' i  Y
B.        An entry is created in the secure host table for any client that is authenticated and manually configured for port security, even if the table is full.4 Y( \  L8 N# ?
C.        802.1x manages network access for all authorized MAC addresses.9 J3 h) b% E* h; {
D.        If a client is authenticated and the port security table is full, the oldest client is aged out.
, C8 ]& Z- x  L. l5 wE.        If any host causes a security violation, the port is immediately error-disabled.
: ?, t, H( E, u
11# 2016-6-3 08:56:50 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-4 11:56:00 | 显示全部楼层
请问楼主是用这份试题过了么?
12# 2016-6-4 11:56:00 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-13 15:37:47 | 显示全部楼层
thanks for sharing!
13# 2016-6-13 15:37:47 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-13 17:35:50 | 显示全部楼层
一个题库扣3个币,给了作者还的给论坛。
15# 2016-6-13 17:35:50 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-24 19:39 , Processed in 0.114438 second(s), 26 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表