Free 351-001 Exam Braindumps (page: 23)

Page 22 of 60

Which attack type may be indicated by unsolicited ACKs directed toward an unused portion of network's IP address space?

  1. A smurf attack against a host located elsewhere, spoofing the unused IP space
  2. A SYN flood attack against that IP address space
  3. IP backscatter from an attack located elsewhere, spoofing your unused IP space
  4. An ICMP flood attack against that IP address space

Answer(s): C



Which description is correct about SNMPv3?

  1. It expands the SNMP Response protocol message so that the message must be used by managers in response to traps sent by agents.
  2. It adds the Get Next protocol message.
  3. It provides authentication.
  4. It adds the Inform protocol message.

Answer(s): C



You are the network consultant from P4S. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future.
Which is the most appropriate design topology?

  1. Full mesh
  2. Peer-to-peer
  3. Partial mesh
  4. Hub and spoke

Answer(s): C



A service provider is offering four classes of service, with each class mapped to a separate queue. Some customers complain about receiving out-of-order packets, which cause application degradation. Which QoS policy activity most likely causes these out-of-order packets?

  1. Remarking
  2. Traffic shaping
  3. Policing
  4. WRED

Answer(s): A






Post your Comments and Discuss Cisco® 351-001 exam with other Community members:

351-001 Discussions & Posts