设为首页收藏本站language 语言切换
查看: 3813|回复: 27
收起左侧

[笔试战报] 350-018 题库答案分享

[复制链接]
发表于 2016-6-2 15:52:50 | 显示全部楼层 |阅读模式
鸿鹄论坛_CCIE 350-018 security new Questions with answer.pdf (1.57 MB, 下载次数: 510, 售价: 2 个鸿鹄币) 3 [" p! A$ e; K; S& W) @! A& W
0 \3 Y: b! }& i
前些日子论坛上没有答案的350-018题库,答案系本人意见,自行斟酌。

评分

参与人数 2好评度 +1 鸿鹄币 +10 收起 理由
mattechnical + 1 赞一个!
小乔 + 10 赞一个!

查看全部评分

发表于 2016-6-2 16:25:00 | 显示全部楼层
这里有题库 昨天仍然过人
沙发 2016-6-2 16:25:00 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:25:21 | 显示全部楼层
dwddsdsdsds
板凳 2016-6-2 16:25:21 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:35:48 | 显示全部楼层
All of these are predefined reports in the Cisco IPS Manager Express (Cisco IME) GUI except which one?) A  {8 w; l6 I9 {
A. Top Signature Report/ B& N9 R7 }2 ?% N8 w9 C0 a
B. Top Application Report! o/ g5 T: w8 u8 ^
C. Attacks Overtime Report/ _8 d8 Q) [; q9 H" q! Z9 W/ j  G5 F
D. Top victims Report
3 i* i& j) M, U# kE. Top Attacker Report
; {% b9 `  a/ s
; S$ J, c& u7 @2 J) u9 R. ]5 L第六十题是不是应该选B
地板 2016-6-2 16:35:48 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-2 16:39:13 | 显示全部楼层
第七十题
; _3 ]" r7 y( d! |6 y/ n5 y. ]有些疑问( e6 O8 g9 Z) P4 x) _1 B
; j, n6 T( {9 b* j
1. Add the anomaly detection policy to your virtual sensors.
6 ?: M' Y7 ~3 ]4 _* E! ^' JYou can use the default anomaly detection policy, ad0, or you can configure a new one.
7 V7 K' @; i; Z  T/ P2. Configure the anomaly detection zones and protocols.
0 ]' P3 a7 k0 H% U3. By default, the anomaly detection operational mode is set to Detect, although for the first 24 hours
6 w# O$ m* R: p. [- ]* s# f! g* Iit performs learning to create a populated KB. The initial KB is empty and during the default 24' ^! n# R8 I$ X
hours, anomaly detection collects data to use to populate the KB. If you want the learning period to' P0 Y& F! t+ Y
be longer than the default period of 24 hours, you must manually set the mode to Learning Accept.
0 u1 U) Q. I' [8 u0 \' E. |- X' L4. Let the sensor run in learning accept mode for at least 24 hours (the default).& e- E3 C1 |* Q; u$ R) ]
You should let the sensor run in learning accept mode for at least 24 hours so it can gather
' f- \* E5 E9 y$ H8 }) ]1 k! e7 Ginformation on the normal state of the network for the initial KB. However, you should change the
6 B& @( `, g# L* o2 Lamount of time for learning accept mode according to the complexity of your network.' p6 D8 P3 Y: D9 O
5. If you manually set anomaly detection to learning accept mode, switch back to detect mode.
3 J1 N% C# Z7 y; h5 N4 `6. Configure the anomaly detection parameters:
/ B8 p" u) `. T" x+ N! x• Configure the worm timeout and which source and destination IP addresses should be bypassed
7 t: a5 s" I% J: aby anomaly detection.
2 R/ [3 W1 P1 V9 }After this timeout, the scanner threshold returns to the configured value.
8 c# C+ C% q( s• Decide whether you want to enable automatic KB updates when anomaly detection is in detect- Z, r" U4 n# S" a; m
mode.
% d4 Z1 P; g" {7 @  g5 ~9 f• Configure the 18 anomaly detection worm signatures to have more event actions than just the
" X1 o8 \  _( l1 _# E6 g6 p- Fdefault Produce Alert. For example, configure them to have Deny Attacker event actions.9 T. D" \! |  w9 N1 T* x% t8 @+ D
Capture22222.PNG
5# 2016-6-2 16:39:13 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-3 08:56:50 | 显示全部楼层
Hi all,' x* {3 E8 k& _5 |+ a  h$ _' P, P
4 B7 P' k4 M$ A7 G4 a4 b; K
Q23, E is correct ?! t- M: |+ g* u" {+ _5 i; [
/ \# {4 b" i+ a! J5 g' f
QUESTION NO: 23
( `5 W/ J. i. X) u; E0 [( {What technology can you implement on your network to allow Independent applications to work with IPv6-capable applications?! L; h4 ?% _0 w% g' H3 ?0 F, y
A.        DS-Lite
9 C5 L5 S5 @# V+ a' UB.        NAT-PT
) \# r! Q1 r: V% z) ~6 BC.        ISATAP
9 }4 g, L. }- p# W" TD.        NAT 6to4
" G2 }7 F& G8 gE.        NAT649 `! D1 R2 G. _5 G4 T$ k
, D( H$ h* L/ _( {. h
Q26, seem only E is true, any suggestion.2 b3 P; _) _# F$ S4 k

6 U% S0 z1 ^! j$ ^( N& G4 m) H+ IQUESTION NO: 26
: x" t+ P; ~$ D8 O: MWhich two statements about 802.1x authentication with port security are true? (Choose two.)6 |6 C+ O1 W2 M; j

8 `" J9 W$ S9 g" ~A.        If any client causes a security violation, the port is immediately placed in spanning-tree disabled mode.. K' ]  D4 I* R; C; A
B.        An entry is created in the secure host table for any client that is authenticated and manually configured for port security, even if the table is full.) Q6 p# I8 P9 `- J
C.        802.1x manages network access for all authorized MAC addresses.! z. t- V% y5 s, k( @
D.        If a client is authenticated and the port security table is full, the oldest client is aged out.
) O1 Z, q# c2 K- tE.        If any host causes a security violation, the port is immediately error-disabled.
. W+ R8 a  t$ l) G6 L' g+ B
11# 2016-6-3 08:56:50 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-4 11:56:00 | 显示全部楼层
请问楼主是用这份试题过了么?
12# 2016-6-4 11:56:00 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-13 15:37:47 | 显示全部楼层
thanks for sharing!
13# 2016-6-13 15:37:47 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2016-6-13 17:35:50 | 显示全部楼层
一个题库扣3个币,给了作者还的给论坛。
15# 2016-6-13 17:35:50 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-22 13:55 , Processed in 0.128513 second(s), 27 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表