




已阅读5页,还剩5页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Cisco Express Foundation for Systems EngineersNumber: 642-373QUESTION 1Which CiscoWorks component would most help you locate end-station connections at theaccess switch level quickly?A.CiscoViewB.Campus ManagerC.Resource Manager EssentialsD.Device Fault ManagerAnswer: BSection: (none)Explanation/Reference:QUESTION 2At which stage of the Cisco Lifecycle Services approach should customer educationpresentations occur?A.OperationB.ImplementationC.PlanningD.DesignE.OptimizationAnswer: CSection: (none)Explanation/Reference:QUESTION 3Which item is a feature of Cisco Compatible Extensions, Version 3?A.Wireless IDSB.NACC.Full WPAV2 complianceD.Full 802.11e complianceAnswer: CSection: (none)Explanation/Reference:QUESTION 4Which VMS Security Monitor tool allows you to monitor data for patterns of attacksfrom one machine to a list of targets?A.Advanced Correlation EngineB.Management Center for CSAC.CiscoWorks DashboardD.Advanced Notification EngineAnswer: ASection: (none)Explanation/Reference:QUESTION 5Cisco ASDM provides 16 different graphs that help identify security risks by displayingdata about potentially malicious activity. What is one kind of data these graphs show?A.Portmap requestsB.Stateful packet statisticsC.Real-time analysis of dropped packetsD.ACL statement matchesAnswer: ASection: (none)Explanation/Reference:QUESTION 6Which Cisco Security tool can best determine if a Cisco ISR router is properly secured?A.Cisco Security Agent MCB.Cisco Security MARSC.CAND.Cisco Security InstellishieldE.Cisco SDM Security AuditAnswer: ESection: (none)Explanation/Reference:QUESTION 7What are three benefits of the Cisco Adaptive Threat Defense Strategy? (Choose three.)A.Application securityB.Virtual firewallC.Anti-x defenseD.Containment and control of a security threatsE.Automatic reconfigurations of the security devices based on current security threatsF.Using QoS techniques such as Traffic Policing to rate limit suspected traffic to preventDoS attacksAnswer: ACDSection: (none)Explanation/Reference:QUESTION 8What is the benefit of using the Cisco Easy VPN Server feature along with the CiscoSoftware VPN client for implementing remote-access VPNs?A.The Cisco Easy VPN Server feature allows the Cisco Software VPN Client to receiveits security policies from the Central site VPN Device. This minimizes the configurationrequirements at the remote location for large remote access VPN deploymentsB.The Cisco Easy VPN Server feature and the Cisco Software VPN Client usehardware-based encryption to reduce the CPU overhead of the Central Site VPN routerC.The Cisco Easy VPN Server feature and the Cisco Software VPN Client use the sameGUI configuration tool to simplify remote-access VPN configurationsD.The Cisco Easy VPN Server feature and the Cisco Software VPN Client enablescalable remote-access VPNs deployment by using a thick client/thin server model wherethe central site VPN router can handle thousands of incoming VPN ConnectionsAnswer: ASection: (none)Explanation/Reference:QUESTION 9On what lower-level transport protocol does CiscoWorks LAN Management solution relyon and why?A.IP because CiscoWorks LAN Management requires the reliability of IP PacketsB.UDP, because CiscoWorks LAN Management is an application that does not requirethe reliability of TCPC.TCP, because CiscoWorks LAN Management does not require detection andretransmission of lost packetsD.TCP, Because CiscoWorks LAN Management requires that packets require thereliability in the networkE.UDP, because CiscoWorks LAN Management requires the reliability of UDPsdetection of lost packets and retransmissionAnswer: BSection: (none)Explanation/Reference:QUESTION 10What is the purpose of the Dynamic Configuration Tool?A.To determine the correct IOS image to support your modules or bladesB.To provide an easy way to check for known bugs in IOS releasesC.To verify that hardware such as modules are compatible with your chassisD.To allow for the mass deployment of devices with minimal configurationsE.To test router configurations virtually prior to implementing them in your product networkAnswer: CSection: (none)Explanation/Reference:QUESTION 11What is one reason you might recommend a solution using only autonomous accesspoints to TestK?A.The customer requires immediate wireline integration with a Catalyst 6500 SwitchB.The customer wants to option to migrate to LWAPPC.The customer requires Layer 3 roamingD.The customer needs an outdoor-ready access pointAnswer: BSection: (none)Explanation/Reference:QUESTION 12Which of these best describes the Cisco Lifecycle Services approach?A.A methodology for introducing new technologiesB.A methodology for proactively updating equipment before it reaches the end of its lifeC.A methodology for creating a business planD.A methodology for determining total cost of ownershipAnswer: ASection: (none)Explanation/Reference:QUESTION 13Which two of these statements best describe the benefits of WPAv1? (Choose two.)A.Improved Mutual AuthenticationB.Improved Encryption through AESC.SSID broadcast preventionD.Improved protection against sniffing initialization vectorsE.RF jamming preventionAnswer: ADSection: (none)Explanation/Reference:QUESTION 14Which two of these data encryption AIM modes are found on the 3800 family of CiscoISR Routers? (Choose two.)A.BPII-PlusB.EPII-PlusC.EPIID.BPIIE.HPII-PlusF.HPIIAnswer: BESection: (none)Explanation/Reference:QUESTION 15A Cisco Catalyst Switch can belong to how many VTP domains?A.2B.1 to 4,096C.1D.1 to 1,005E.no limitAnswer: CSection: (none)Explanation/Reference:QUESTION 16Your work as a network engineer at TestK. Your boss, Mrs. Tess King, isinterested in WLAN management components. Match the components with theappropriate descriptions.Answer: Section: (none)Explanation/Reference:WLSE is LWAPPWDS enable from AP or IOS Routeis layer 2 Fast Secure roamingWDS Enable from WLSM is Layer 3 Fast Secure RoamingWDS enable from AP or IOS Router is Wireless LAN context Communications ProtocolQUESTION 17Which tools on C could you use to plan for correct IOS images to supportTestKs security design and requirements? (Choose two.)A.Cisco IOS Matrix NavigatorB.Cisco Feature NavigatorC.Cisco IOS Security PlannerD.Cisco Dynamic Configuration ToolE.Cisco IOS Package PlannerAnswer: BESection: (none)Explanation/Reference:QUESTION 18What is one benefit of the Cisco anti-X defense strategy?A.Virtual Firewall protectionB.Security Events correlation for proactive responseC.Malware, virus and worm mitigationD.Applications securityAnswer: CSection: (none)Explanation/Reference:QUESTION 19Exhibit:You work as a network administrator at TestK. Please study the exhibit carefully.What are two Cisco IOS commands that would verify connectivity between routers R1and R2? (Choose two.)A.Show controllers serialB.Show ip routeC.Show cdp neighborD.Show frame-relay lmiE.Show running-configAnswer: BCSection: (none)Explanation/Reference:QUESTION 20Which tools on C could you use to plan for correct IOS images to supportTestKs security design and requirements? (Choose two.)A.Cisco Feature NavigatorB.Cisco IOS Package PlannerC.Cisco IOS Matrix NavigatorD.Cisco IOS Security PlannerE.Cisco Dynamic Configuration ToolAnswer: ABSection: (none)Explanation/Reference:QUESTION 21Which three of these items can a wireless assisted site survey optimize? (Choose three.)A.IDS settingsB.Radio transmit power settingC.Security SelectionD.Channel selectionE.IPS auto-response settingsF.Beacon intervalAnswer: BDFSection: (none)Explanation/Reference:QUESTION 22What are three benefits of the Cisco Adaptive Threat Defense Strategy? (Choose three.)A.Automatic reconfigurations of the security devices based on current security threatsB.Anti-x defenseC.Containment and control of a security threatsD.Virtual firewallE.Application securityF.Using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksAnswer: BCESection: (none)Explanation/Reference:QUESTION 23Which two of these are correct regarding access control list? (Choose two.)A.An ACL acts on all packets, those flowing through the router and those originated bythe route itselfB.There may be multiple ACLS per protocol, per direction and per interfaceC.An ACL wildcard mask is identical to an IP subnet maskD.An ACL can be applied to multiple interfacesE.There is an implicit deny at the end of an ACL and will result in a dropped
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 离婚协议书撰写指南与子女抚养权分配方案
- 初中建筑规划方案设计规范
- 安全管理制度考试题及答案
- 造价咨询市场支持方案
- 深圳居民健康咨询方案
- 建筑工地防水方案设计要求
- 附条件赠与房屋合同模板(3篇)
- 福州市劳务合同模板(3篇)
- 2025钢材销售合同
- 离婚协议中子女抚养费用调整补充协议模板
- (正式版)QC∕T 625-2024 汽车用涂镀层和化学处理层
- 危险货物道路运输规则第7部分:运输条件及作业要求(JTT617.7-2018)
- GB/T 2820.9-2024往复式内燃机驱动的交流发电机组第9部分:机械振动的测量和评价
- 内蒙古自治区房屋修缮工程预算定额-附件2:第一册结构工程
- 五年级信息科技上全册教案 浙教版2023年
- 2024四川蜀道高速公路集团有限公司工程及安全人员社会招聘笔试参考题库附带答案详解
- 律师事务所投标管理办法
- 钢材压延加工成型工艺研究
- 体能训练课件
- 汽车新零售行业报告
- 传染病的病例溯源与传播链分析
评论
0/150
提交评论