|
Question 1. Which two of these statements describe why Cisco offers the security solution with the lowest operational cost? (Choose two.) A. Cisco ensures third-party integration. B. Cisco is able to meet PCI requirements. C. Cisco solves the broadest suite of threats. D. Cisco maximizes training costs for the IT group. E. Cisco has established partnerships with all key players. Answer: C, E Question 2. How does preliminary technical discovery benefit the customer? A. A technology strategy is presented to the customer. B. Information regarding an existing customer network is analyzed, which allows an appropriate solution to be developed. C. The account team analyzes and validates the business requirements. D. Detailed technical requirements are defined and documented. Answer: B Question 3. Which security management offering helps customers to readily and accurately identify, manage, and mitigate network attacks and to maintain network security compliance? A. Cisco Security Agent B. Cisco Security Manager C. Cisco NAC D. Cisco Network Assistant E. Cisco Security MARS Answer: E Question 4. What is one way that Cisco Security can decrease customer implementation costs? A. by using the existing infrastructure B. through dedicated security appliances C. through better security management products D. by reducing the number of people to train Answer: A Question 5. How does the Cisco ASA with the CSC module protect the network? (Choose two.) A. It blocks incoming e-mail and web threats. B. It guarantees regulatory compliance. C. It prevents network intrusion with an IPS. D. It provides VoIP enhancements. E. It prevents loss of sensitive information with integrated antivirus protection. Answer: A, E Question 6. How does security technology assessment drive continuous improvements? A. by recommending remediation measures, such as optimizing device configurations, planning capacity, and resolving quality issues B. by assessing the current state of the customer operations C. by assessing the realization of ROI and other benefits of the security system D. by defining project milestones Answer: A Question 7. Why do end users need to be aware of the security policy? A. Some security decisions are usually in their hands. B. They need to be aware of every threat. C. They should avoid responsibility for their actions. D. They should understand the probability of every risk. Answer: A Question 8. Which two of these choices describe how the secure network access solution provides value to the customer? (Choose two.) A. permits a man-in-the-middle attack B. makes mobility more cost-effective C. provides an unencrypted solution D. reduces the amount of equipment E. allows for secure Internet browsing Answer: B, D Question 9. How does the Cisco SDN relate to compliance? A. It is point product-based. B. It uses anomaly detection to secure a device. C. It addresses a large majority of PCI requirements. D. It uses IP protocol 50 (ESP) to securely communicate to network devices. Answer: C Question 10. Which Cisco solution provides host protection against security violations by focusing on the behavior of the device? A. Cisco PIX Firewall B. NAC Appliance C. host Analyzer D. Cisco Security Agent E. Cisco Adaptive Security Appliance Answer: D
|
Question 1. Match the Microsoft SQL integration objects with the correct description by dragging and dropping the boxes. For instructions on how to complete drag and drop items. Answer: Question 2. What is the name of the service responsible for the storage management of Microsoft Exchange? A. MSES Manager B. Site Replication C. Information Store D. Key Management Answer: C Question 3. What is a limitation when using an Oracle database for an SAP R/3 integration in HP Data Protector Software? A. No backup specification templates are available. B. Use of the recovery catalog is not recommended. C. Zero Downtime Backup is not supported on the primary database. D. A maximum of three instances is supported for the SAP R/3 integration. Answer: A Question 4. What are functions of the omnisap.exe program in SAP R/3 integrations with HP Data Protector Software? (Select two.) A. starts the SAP R/3 backup utilities B. configures the SAP R/3 integration C. controls backup or restore streams D. exports appropriate environment variables E. creates the omnisap share on the SAP/R3 server Answer: A, D Question 5. What can you use to back up the SAP/R3 binaries for disaster recovery in an HP Data Protector Software integration with an Oracle database? A. RMAN B. SAP/R3 SAPDR tool C. SAP/R3 BRBACKUP utility D. HP Data Protector Software UMA Answer: C Question 6. Why should you have a copy of the database control files? A. They contain the database file structure. B. They contain the database access information. C. They enable automatic recovery of the database. D. They enable you to access the archived database log files. Answer: A Question 7. Identify the steps involved in the standard flow of transaction processing for a common database and arrange them in the correct sequence by dragging and dropping the boxes. For instructions on how to complete drag and drop items. Answer: Question 8. How can you improve the reliability of backed up data? A. Use a minimum concurrency of 2 for the backup. B. Enable the log all option for the datalist configuration. C. Use Third Mirror Break Off technology for the backup. D. Enable cyclic redundancy check on the backup device. Answer: D Question 9. What must you install to use controller replication in HP Data Protector Software (for example, in the EVA)? A. omnisnapvol utility on the agent system B. SMI-S integration on the HP Data Protector Software server C. a Fibre Channel HBA and API on the HP Data Protector Software server D. appropriate storage management software on the HP Data Protector Software server Answer: B Question 10. How can you back up the init.ora and password files of an Oracle database in an HP Data Protector Software integration? A. Run a database full backup. B. Back up the current control file. C. Perform an RMAN online backup. D. Perform an HP Data Protector Software filesystem backup. Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.