|
thanks buddy
|
Question 1.
Which security protocol is both an inherently flawed, one-way, device-centric form of authentication and a 40-bit encryption key?
A. Secure Socket Layer
B. Hypertext Transfer Protocol over Secure Socket Layer
C. Secure Shell Protocol
D. Wired Equivalent Privacy
Answer: D
Question 2.
When building an IT case for ITCertKeys.com, you must address security in addition to which three other customer needs? (Choose three.)
A. cost-effective network
B. easy installation
C. flexibility
D. increased productivity
E. interoperability
F. scalability
Answer: B, C, E
Question 3.
What is the best description of the Cisco Unified Wireless Network?
A. It enables public sector agencies to deploy a secure, scalable, broadband network that
integrates wired and wireless IP infrastructures, delivering network intelligence and
applications for mobile users across a city.
B. It is a powerful solution for enterprises that want to combine the best elements of wireless and
wired networking to deliver scalable, manageable, and secure wireless LANs with a low total
cost of ownership.
C. It uses a single network infrastructure for the transmission of data, voice, and video traffic,
delivering the business benefits of a converged, wireless network to enterprise-level
organizations.
D. It is the only unified wired and wireless solution for service providers in the industry. It is cost-
effective and addresses the WLAN security, deployment, management, and control issues
facing service providers today.
Answer: B
Question 4.
What are the three best responses to a director of a healthcare facility whose primary concern is mitigating risks, such as medical record errors, malpractice suits, and poor bedside care? (Choose three.)
A. A Cisco WLAN enables real-time tracking of important equipment, supplies, and key
personnel.
B. A Cisco WLAN minimizes the risk of errors by automating tracking of medications, supplies,
and personnel.
C. A Cisco WLAN can extend to each patient room, allowing tracking of patient information at the
bedside at all times.
D. A Cisco WLAN enables patient medication to be tracked at the bedside, which minimizes the
risk of errors in dosage or identification.
E. A Cisco WLAN can be used to monitor vital signs in each patient room. This would reduce the
cost and time of manual tracking.
F. A Cisco WLAN can ensure secure intrusion protection throughout the hospital campus.
Answer: B, C, D
Question 5.
Which Cisco technology can be used to create a detailed wireless LAN design, including access point placement, configuration, and performance estimates?
A. Cisco Network Admission Control Appliance
B. Cisco wireless location appliance
C. Cisco wireless LAN controller
D. Cisco Wireless Control System
Answer: D
Question 6.
What are three capabilities of a wireless LAN? (Choose three.)
A. provides wireline equivalent security
B. makes cabling obsolete
C. interacts with wired LAN systems that are already in place
D. communicates with repeater access points
E. requires little to no centralized management
F. boosts productivity by up to 10 percent
Answer: A, C, D
Question 7.
Cisco offers a variety of options for installing or improving network security on the WLAN.
Which two recommendations should be made to a customer who wants a Cisco WLAN security solution? (Choose two.)
A. enable Wi-Fi Protected Access functionality for encryption
B. enable Triple Data Encryption Standard functionality for encryption
C. deploy 802.1x for 802.11 standards for authentication
D. deploy a Service Set Identifier for authentication
E. deploy a Wireless Equivalent Privacy for authentication
Answer: A, C
Question 8.
Which two vertical segments actively use the adoption of 802.11 technology as a competitive differentiator? (Choose two.)
A. Education uses the adoption of 802.11 technology to attract more students. Wireless
networking creates a competitive advantage over schools and colleges that cannot provide
access anytime, anywhere.
B. Government uses the adoption of 802.11 technology to attract more residents to individual
localities. Wireless networking creates a competitive advantage over municipalities that cannot
provide access anytime, anywhere.
C. Healthcare uses the adoption of 802.11 technology to attract more patients. Wireless
networking creates a competitive advantage over hospitals that cannot provide ready access to
patient data.
D. Hospitality uses the adoption of 802.11 technology to attract more guests. A wireless network
attracts tradeshow exhibitors and conference coordinators, and it increases customer loyalty
for hospitality and hotel establishments.
E. Retail uses the adoption of 802.11 technology to attract more customers. Wireless networking
creates a competitive advantage over stores that cannot provide accuracy of inventory and
pricing.
Answer: A, D
Question 9.
Which method was devised to mitigate the 802.11 security issues and requires the next-generation Advanced Encryption Standard?
A. Temporal Key Integrity Protocol
B. Wired Equivalent Privacy
C. Extensible Authentication Protocol
D. Wi-Fi Protected Access 2
Answer: D
Question 10.
Which three facts can be used to correctly describe the proven customer track record of Cisco Systems? (Choose three.)
A. Cisco has more than 70,000 Cisco wireless LAN customers worldwide.
B. Cisco has deployed more than 2.1 million Cisco access points worldwide.
C. Cisco has deployed the second-largest wireless network, with 5,000 dual-band access points.
D. Cisco has been ranked as one of the top global providers of wireless LAN solutions by
InformationWeek 500.
E. Cisco has received two IEEE Corporate Innovation Recognition awards.
F. Cisco has developed products that are used by 95 percent of Fortune 500 companies.
Answer: A, B, F
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.