Cisco,642-373,最新题库.doc_第1页
Cisco,642-373,最新题库.doc_第2页
Cisco,642-373,最新题库.doc_第3页
Cisco,642-373,最新题库.doc_第4页
Cisco,642-373,最新题库.doc_第5页
已阅读5页,还剩5页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Cisco Express Foundation for Systems EngineersNumber: 642-373QUESTION 1Which CiscoWorks component would most help you locate end-station connections at theaccess switch level quickly?A.CiscoViewB.Campus ManagerC.Resource Manager EssentialsD.Device Fault ManagerAnswer: BSection: (none)Explanation/Reference:QUESTION 2At which stage of the Cisco Lifecycle Services approach should customer educationpresentations occur?A.OperationB.ImplementationC.PlanningD.DesignE.OptimizationAnswer: CSection: (none)Explanation/Reference:QUESTION 3Which item is a feature of Cisco Compatible Extensions, Version 3?A.Wireless IDSB.NACC.Full WPAV2 complianceD.Full 802.11e complianceAnswer: CSection: (none)Explanation/Reference:QUESTION 4Which VMS Security Monitor tool allows you to monitor data for patterns of attacksfrom one machine to a list of targets?A.Advanced Correlation EngineB.Management Center for CSAC.CiscoWorks DashboardD.Advanced Notification EngineAnswer: ASection: (none)Explanation/Reference:QUESTION 5Cisco ASDM provides 16 different graphs that help identify security risks by displayingdata about potentially malicious activity. What is one kind of data these graphs show?A.Portmap requestsB.Stateful packet statisticsC.Real-time analysis of dropped packetsD.ACL statement matchesAnswer: ASection: (none)Explanation/Reference:QUESTION 6Which Cisco Security tool can best determine if a Cisco ISR router is properly secured?A.Cisco Security Agent MCB.Cisco Security MARSC.CAND.Cisco Security InstellishieldE.Cisco SDM Security AuditAnswer: ESection: (none)Explanation/Reference:QUESTION 7What are three benefits of the Cisco Adaptive Threat Defense Strategy? (Choose three.)A.Application securityB.Virtual firewallC.Anti-x defenseD.Containment and control of a security threatsE.Automatic reconfigurations of the security devices based on current security threatsF.Using QoS techniques such as Traffic Policing to rate limit suspected traffic to preventDoS attacksAnswer: ACDSection: (none)Explanation/Reference:QUESTION 8What is the benefit of using the Cisco Easy VPN Server feature along with the CiscoSoftware VPN client for implementing remote-access VPNs?A.The Cisco Easy VPN Server feature allows the Cisco Software VPN Client to receiveits security policies from the Central site VPN Device. This minimizes the configurationrequirements at the remote location for large remote access VPN deploymentsB.The Cisco Easy VPN Server feature and the Cisco Software VPN Client usehardware-based encryption to reduce the CPU overhead of the Central Site VPN routerC.The Cisco Easy VPN Server feature and the Cisco Software VPN Client use the sameGUI configuration tool to simplify remote-access VPN configurationsD.The Cisco Easy VPN Server feature and the Cisco Software VPN Client enablescalable remote-access VPNs deployment by using a thick client/thin server model wherethe central site VPN router can handle thousands of incoming VPN ConnectionsAnswer: ASection: (none)Explanation/Reference:QUESTION 9On what lower-level transport protocol does CiscoWorks LAN Management solution relyon and why?A.IP because CiscoWorks LAN Management requires the reliability of IP PacketsB.UDP, because CiscoWorks LAN Management is an application that does not requirethe reliability of TCPC.TCP, because CiscoWorks LAN Management does not require detection andretransmission of lost packetsD.TCP, Because CiscoWorks LAN Management requires that packets require thereliability in the networkE.UDP, because CiscoWorks LAN Management requires the reliability of UDPsdetection of lost packets and retransmissionAnswer: BSection: (none)Explanation/Reference:QUESTION 10What is the purpose of the Dynamic Configuration Tool?A.To determine the correct IOS image to support your modules or bladesB.To provide an easy way to check for known bugs in IOS releasesC.To verify that hardware such as modules are compatible with your chassisD.To allow for the mass deployment of devices with minimal configurationsE.To test router configurations virtually prior to implementing them in your product networkAnswer: CSection: (none)Explanation/Reference:QUESTION 11What is one reason you might recommend a solution using only autonomous accesspoints to TestK?A.The customer requires immediate wireline integration with a Catalyst 6500 SwitchB.The customer wants to option to migrate to LWAPPC.The customer requires Layer 3 roamingD.The customer needs an outdoor-ready access pointAnswer: BSection: (none)Explanation/Reference:QUESTION 12Which of these best describes the Cisco Lifecycle Services approach?A.A methodology for introducing new technologiesB.A methodology for proactively updating equipment before it reaches the end of its lifeC.A methodology for creating a business planD.A methodology for determining total cost of ownershipAnswer: ASection: (none)Explanation/Reference:QUESTION 13Which two of these statements best describe the benefits of WPAv1? (Choose two.)A.Improved Mutual AuthenticationB.Improved Encryption through AESC.SSID broadcast preventionD.Improved protection against sniffing initialization vectorsE.RF jamming preventionAnswer: ADSection: (none)Explanation/Reference:QUESTION 14Which two of these data encryption AIM modes are found on the 3800 family of CiscoISR Routers? (Choose two.)A.BPII-PlusB.EPII-PlusC.EPIID.BPIIE.HPII-PlusF.HPIIAnswer: BESection: (none)Explanation/Reference:QUESTION 15A Cisco Catalyst Switch can belong to how many VTP domains?A.2B.1 to 4,096C.1D.1 to 1,005E.no limitAnswer: CSection: (none)Explanation/Reference:QUESTION 16Your work as a network engineer at TestK. Your boss, Mrs. Tess King, isinterested in WLAN management components. Match the components with theappropriate descriptions.Answer: Section: (none)Explanation/Reference:WLSE is LWAPPWDS enable from AP or IOS Routeis layer 2 Fast Secure roamingWDS Enable from WLSM is Layer 3 Fast Secure RoamingWDS enable from AP or IOS Router is Wireless LAN context Communications ProtocolQUESTION 17Which tools on C could you use to plan for correct IOS images to supportTestKs security design and requirements? (Choose two.)A.Cisco IOS Matrix NavigatorB.Cisco Feature NavigatorC.Cisco IOS Security PlannerD.Cisco Dynamic Configuration ToolE.Cisco IOS Package PlannerAnswer: BESection: (none)Explanation/Reference:QUESTION 18What is one benefit of the Cisco anti-X defense strategy?A.Virtual Firewall protectionB.Security Events correlation for proactive responseC.Malware, virus and worm mitigationD.Applications securityAnswer: CSection: (none)Explanation/Reference:QUESTION 19Exhibit:You work as a network administrator at TestK. Please study the exhibit carefully.What are two Cisco IOS commands that would verify connectivity between routers R1and R2? (Choose two.)A.Show controllers serialB.Show ip routeC.Show cdp neighborD.Show frame-relay lmiE.Show running-configAnswer: BCSection: (none)Explanation/Reference:QUESTION 20Which tools on C could you use to plan for correct IOS images to supportTestKs security design and requirements? (Choose two.)A.Cisco Feature NavigatorB.Cisco IOS Package PlannerC.Cisco IOS Matrix NavigatorD.Cisco IOS Security PlannerE.Cisco Dynamic Configuration ToolAnswer: ABSection: (none)Explanation/Reference:QUESTION 21Which three of these items can a wireless assisted site survey optimize? (Choose three.)A.IDS settingsB.Radio transmit power settingC.Security SelectionD.Channel selectionE.IPS auto-response settingsF.Beacon intervalAnswer: BDFSection: (none)Explanation/Reference:QUESTION 22What are three benefits of the Cisco Adaptive Threat Defense Strategy? (Choose three.)A.Automatic reconfigurations of the security devices based on current security threatsB.Anti-x defenseC.Containment and control of a security threatsD.Virtual firewallE.Application securityF.Using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksAnswer: BCESection: (none)Explanation/Reference:QUESTION 23Which two of these are correct regarding access control list? (Choose two.)A.An ACL acts on all packets, those flowing through the router and those originated bythe route itselfB.There may be multiple ACLS per protocol, per direction and per interfaceC.An ACL wildcard mask is identical to an IP subnet maskD.An ACL can be applied to multiple interfacesE.There is an implicit deny at the end of an ACL and will result in a dropped

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论