testsnow 350-018 Exam - CCIE Pre-Qualification Test for Security

Page 6

www.TestsNow.com Q: 7 Which two of these commands are required to implement a Cisco Catalyst 6500 Series Firewall Services Module (FWSM) in a Catalyst 6500 running Cisco IOS? (Choose two.)

A. firewall multiple-vlan-interfaces B. firewall module vlan-group y C. module secure-traffic D. firewall vlan-group <vlan-x> E. firewall module secure-traffic

Answer: B, D www.TestsNow.com Q: 8 Routing loops can occur in distance vector routing protocols if the network has inconsistent routing entries. Which three of these methods can be used to avoid them? (Choose three.)

A. split horizon B. route poisoning C. route suppression D. route splitting E. hold-down timers

Answer: A, B, E www.TestsNow.com Q: 9 A bogon list (a list of reserved or unassigned IP addresses) that is applied to an access control list (ACL) can be best described as which of these? Leading the way in IT testing and certification tools, www.TestsNow.com

-6-


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.