|
send me latest dump.
|
Question 1.
Which Cisco Security product is used to perform a Security Posture Assessment of client workstations?
A. Adaptive Security Appliance
B. Cisco Security Agent
C. Cisco Security Posture Assessment Tool
D. Cisco NAS Appliance
E. Cisco ACS
Answer: D
Question 2.
Which three policy types can be assigned to a network user role in the Cisco NAC Appliance architecture? (Choose three.)
A. Allowed IP Address ranges
B. Network Port Scanning Plug-ins
C. VPN and roaming policies
D. Inactivity period
E. Session Duration
F. Minimum Password length
Answer: B, C, E
Question 3.
Which two components should be included in a network design document? (Choose two.)
A. Complete network blueprint
B. Operating Expense
C. Risk Analysis
D. Configuration for each device
E. Detailed part list
Answer: A, E
Question 4.
DRAG DROP
You work as a network engineer at ITCertKeys.com. Your boss, Miss. ITCertKeys, is interested in Cisco Security modules. Match the descriptions with the proper module. Use only options that apply.
Answer:
Question 5.
Which statement is true about the Cisco Security MARS Global Controller?
A. Rules that are created on a Local Controller can be pushed to the Global Controller
B. Most data archiving is done by the Global Controller
C. The Global Controller receives detailed incidents information from the Local Controllers and
correlates the incidents between multiple Local Controllers
D. The Global Controller Centrally Manages of a group of Local Controllers
Answer: D
Question 6.
Which certificates are needed for a device to join a certificate-authenticated network?
A. The Certificates of the device and its peer
B. The Certificates of the certificate authority, the device and the peer
C. The Certificates of the certificate authority and the peer
D. The Certificates of the certificate authority and the device
Answer: D
Question 7.
Which three Cisco Security products help to prevent application misuse and abuse? (Choose three.)
A. Cisco ASA 5500 Series Adaptive Security Appliances
B. Cisco IOS FW and IPS
C. Cisco Traffic Anomaly Detector
D. Cisco Security Agent
E. Cisco Trust Agent
F. NAC Appliance (Cisco Clean Access)
Answer: A, B, D
Question 8.
DRAG DROP
You work as a network engineer at ITCertKeys.com. Your boss, Miss. ITCertKeys, is interested attack methodologies. Match the descriptions with the proper methodology.
Use only options that apply.
Answer:
Question 9.
Which two of these features are integrated security components of the Cisco Adaptive Security Appliance? (Chose two.)
A. VRF-aware firewall
B. Cisco ASA AIP SSM
C. VTI
D. Control Plane Policing
E. Anti-X
F. DMVPN
Answer: B, E
Question 10.
Which of these items is a valid method to verify a network security design?
A. Computer simulation
B. Network audit
C. Sing-off by the operations team
D. Pilot or prototype network
E. Analysis of earlier attacks
Answer: D
|
Question 1.
DRAG DROP
You work as a network technician at ITCertKeys.com. Your boss, Mrs. ITCertKeys, in Cisco client security software applications. Match the applications with the descriptions.
Answer:
Question 2.
Which two statements about Layer 3 access designs are correct? (Choose two.)
A. Broadcast and fault domains are increased
B. Limits on clustering and NIC teaming are removed
C. Convergence time is fractionally slower than STP
D. IP Address space is difficult to manage
E. Fast uplink convergence is supported for failover and fallback
Answer: D, E
Question 3.
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation? (Choose two.)
A. Destination IP Address
B. Output Interface
C. Source MAC address
D. Next-hop IP Address
E. Source Port
F. Next-hop MAC Address
Answer: A, E
Question 4.
Which of these is true of IP addressing with regard to VPN termination?
A. Termination devices need routable addresses inside the VPN
B. Designs should not include overlapping address spaces between sites, since NAT is not
supported
C. IGP routing protocols will update their routing tables over an IPSec VPN
D. Addressing designs need to allow for summarization
Answer: D
Question 5.
When is a first-hop redundancy protocol needed in the distribution layer?
A. When preempt tuning of the default gateway is needed
B. When the design implements Layer 2 between the access switch and the distribution switch
C. When HSRP is not supported by the design
D. When a robust method of backing up the default gateway is needed
E. When multiple vendor devices need to be supported
F. When the design implements Layer 3 between the access switch and the distribution switch
Answer: F
Question 6.
Which of these practices should you follow when designing a Layer 3 routing protocol?
A. Never peer on transit links
B. Build squares for deterministic convergence
C. Build inverted U designs for deterministic convergence
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA
propagation
Answer: D
Question 7.
Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements? (Choose two.)
A. Call signaling must have guaranteed bandwidth service
B. Strict-priority queuing should be limited to 50% of the capacity of the link
C. At least 23 percent of the link bandwidth should be reserved for default best-effort class
D. Voice needs to be assigned to the hardware priority queue
E. Voice needs to be assigned to the software priority queue
Answer: A, D
Question 8.
Which statement about IDS/IPS design is correct?
A. An IPS should be deployed if the security policy does not support the denial of traffic
B. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic
flow
C. An IDS analyze a copy of the monitored traffic and not the actual forwarded packet
D. Traffic impact considerations are increased when deploying an IDS over an IPS sensor
Answer: C
Question 9.
In which two locations in an enterprise network can an IPS sensor be placed? (Choose two.)
A. Between two layer devices without trunking
B. Between two Layer 2 devices with trunking
C. Between a Layer 2 device and a Layer 3 device with trunking
D. Bridging two VLANs on one switch
E. Bridging VLANs on two switches
Answer: A, B
Question 10.
DRAG DROP
You work as a network technician at ITCertKeys.com. Your boss, Mrs. ITCertKeys, in Cisco NAC appliance components. Match the applications with the appropriate descriptions.
Answer:
|
Question 1.
How are the voice and data devices organized in the LAN for SBCS
A. By workgroup affiliation
B. By LAN switchport assignment
C. By WLAN association
D. By WAN address
Answer: B
Question 2.
Which two are benefits of installing Cisco Monitor Director at an SMB Site? Select two.
A. Simplifies Smart Business Communications System install
B. Automated monthly reporting on system performance
C. Allows the end customer to get free updates
D. Monthly recurring revenue model
Answer: A, B
Question 3.
What are two ways to test LAN connectivity on the Cisco CE520? Select two.
A. Ping the IP of the Cisco-Data Access VLAN from the US520 console
B. Ping the IP of the Cisco distribution VLAN from the UC520 console
C. Ping the IP address of the Cisco Voice VLAN from a device attached to the CE520
D. Ping IP of the Cisco-Data VLAN from a device attached to the CE520
E. Ping the default gateway from the Cisco CE520
F. Ping the default gateway from the UC520
Answer: C, D
Question 4.
In a SBCS install with 16 users, what is the max number of teleworkers the system can accommodate?
A. 5
B. 4
C. 2
D. 10
Answer: A
Question 5.
In the SBCS which two services are provided to each teleworker, home office or mobile worker locations?
A. Wireless Connectivity
B. Instant Messaging
C. Integrated Security
D. Voice Gateway
E. Data Networking
Answer: E
Question 6.
Which interface on the Cisco UC520 is assigned an IP either statically or through DHCP?
A. LAN
B. Switchport
C. WAN
D. PSTN Interface
E. By workgroup affiliation
Answer: C
Question 7.
Which dial plan scenario may require PSTN trunks for ountbound?
A. All employees,autoattendant or receptionist and voicemail and the remaining employess do not
have direct inward dial numbers
B. All employees,autoattendant or receptionist and voicemail have direct inwaqrd dial numbers
using analog trunks
C. All employees,autoattendant or receptionist and voicemail have direct inwaqrd dial numbers
using digital interfaces
Answer: B
Question 8.
Which of these statements correctly describes the security audit that is run on the Cisco UC520?
A. It configures firewall addresses on the network
B. It configures the infrastructure protection services
C. It automatically fixes any failed items
D. It provides a separate interface for the DMZ
Answer: B
Question 9.
Which 3 features does the Cisco UC520 support? Select three.
A. Analog devices
B. Storage Area Networks
C. Cisco Unity Express
D. distributed routing
E. Security firewall and VPN
F. Telepresence
Answer: A, C, E
Question 10.
Which Cat 520 feature optimizes QOS?
A. CiscoSmartPorts
B. Cisco configuration assistant
C. Cisco Unity Express
D. Cisco Key System
Answer: A
|
Question 1.
Which service component in the security implement phase includes activities such as executing test cases, capturing test result, and tuning test procedures?
A. Staging
B. Network Ready for Use
C. Define Technical Procedures
D. As-Built Documentation
E. Acceptance Testing
Answer: E
Question 2.
Which of the following is the best description of the develop project management plan activity within the project-planning service component?
A. Obtains customer surveys, captures lessons learned, and update leading practices
B. Integrates devices without disrupting the existing network or creating points of vulnerability
C. Documents planning of assumptions and decisions; facilitates communication among
stakeholders, and documents approved scope, cost and schedule baselines.
D. Create final network documentation that reflects "as-built" information for customer, including
specific design requirements and configurations
Answer: C
Question 3.
Which three business requirement development activities are performed in the prepare phase before creating a technology strategy? (Choose three)
A. Document and Categorize the Business Requirement of Customer in Terms of Performance,
Availability, Capacity, and Security
B. Create a Business Case
C. Produce a Documented Technology Strategy
D. Identify and Assess the Business Requirements of Customer
E. Conduct a Systems Strategy Meeting.
F. Create a Bill of Materials
Answer: A, D, E
Question 4.
CORRECT TEXT
Which implement phase service component provides for creating the final network documentation that reflects information for the customer, including specific desing requirements and configurations?
1. Device Deployment
2. Post-Implementation support handoff meeting
3. As-Built Documentation
4. Staff Training for IT Admin and Help Desk.
Answer: C
Question 5.
Which three of the following service component are included in the desing phase? (Choose Three)
A. Account Qualification and Planning
B. Staging Plan Development
C. Systems Acceptance Test Plan Development
D. Proposal Development
E. Staff Training
F. Detailed Desing Customer Sing-off
Answer: B, C, F
Question 6.
Which service component is in the security operate phase ?
A. Operations Design
B. Change Management
C. Operation Assessment
D. Security Technology Assessment
Answer: B
Question 7.
In which service component of the security operate phase are network issues analyzed to identify trends?
A. Security Administration
B. Incident Management
C. Operation Setup
D. System Monitoring
Answer: B
Question 8.
Which Cisco Lifecycle Services security phase defines operational excellence through ongoing improvement of system performance and functionality?
A. Optimize
B. Design
C. Operate
D. Implement
E. Prepare
Answer: A
Question 9.
Which service component is part of the security implement phase?
A. Select Fault Management Tools and Products
B. Change Management
C. Project Closeout
D. Operations Setup
Answer: C
Question 10.
What is the purpose of the technology strategy development service component in the prepare phase?
A. Create a network diagram that contains network topology and location of each management
console
B. Create a breakdown of project tasks and responsibilities
C. Create a model network that will allow the customer to how the proposed security technology
solution will work
D. Include a statement of work that defines the scope of work to be completed for the proposed
security solution
E. Help identify and document the customer´s current network architecture and security policies
and create a gap analysis.
Answer: C
|
Question 1. Based on the principles of clustering, what is required to obtain a voting Quorum in a 3-node cluster at any given time? A. Three devices must be able to vote. B. Two devices must be able to vote. C. Only one device is needed. D. No quorum is needed in a 3-node cluster. Answer: B Question 2. What is the BEST reason for utilizing a cluster in a datacenter environment? A. The Enterprise Backup procedures can be handled. B. Having clustered systems ensures faster execution. C. It is required now to run most critical applications. D. A cluster makes applications highly available. Answer: D Question 3. When installing Sun Cluster 3.0, how much disk space should be allocated for /globaldevices on the root disk? A. 50 mb B. 100 mb C. All available disk space D. It depends on the configuration Answer: B Question 4. When removing Sun Cluster 3.0 from a system, what is considered the BEST procedure? A. Uninstall Cluster packages and reboot. B. Remove the Cluster database and do a reconfiguration boot. C. Re-install the complete Operating System. D. Individually remove the packages and disconnect TC. Answer: C Question 5. What BEST describes the upgrade process from SC2.x to SC3.0? A. Remove SC2.0 and install 3.0. B. Run an upgrade script. C. Install new Cluster pkgs and reboot. D. Install Solaris 8 and SC3.O software. Answer: D Question 6. You must install the KJP on all nodes of a SC 3.0 cluster. Which of the following must you do? A. init 6, patchadd, reboot B. scshutdown, boot -x, patchadd, reboot C. patchadd, reboot D. patchadd, reboot -- -x Answer: B Question 7. In a 2-node cluster running Sun Cluster 3.0, what is required to start clustered operation during normal operations? A. Quorum device and the interconnect B. One node and no quorum device C. One node and a quorum device D. Both nodes and the cluster transport Answer: C Question 8. How would you BEST describe, "cluster transport"? A. The heartbeat network between nodes. B. The switch used to bring shared storage to the nodes. C. The terminal concentrator and its connection to the nodes. D. The cabling associated with the shared storage. Answer: B Question 9. What is the command to check the current status of a 3.0 cluster? A. scstat B. scprint C. hastat D. scset -l Answer: B Question 10. In order to install the Quorum device, what command is used to check for available devices? A. scstat -lv B. quorumlist -a C. hastat -l quorum D. scdidadm -L Answer: D
|
New Collection: thanks to itcertkeys
|
Please post the latest dumps thanks buddy
|
Latest dump needed plz help me thanks
|
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.