Pass the Cisco Wireless LAN 644-068 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which three of the following statements are correct regarding security features available on Cisco Catalyst switches? (Choose three.)

Options:

A.

Port security prevents MAC address flooding.


B.

DHCP snooping prevents rogue DHCP servers from being placed on the network.


C.

IP Source Guard prevents ARP spoofing attacks.


D.

Private VLAN preventsclient to client communication.


E.

MACsecprovides end-to-end encryption.


Expert Solution
Questions # 12:

Which of the following is not a requirement for a core switch?

Options:

A.

High availability?


B.

Integrated services?


C.

Network access control?


D.

Application performance?


Expert Solution
Questions # 13:

Which two of the following statements correctly describe regional WAN branch profiles? (Choose two.)

Options:

A.

3G, 4G, and satellite connections are commonly used as backup links in high-end branches.


B.

The standard branch typically uses MPLS as a primary link and any kind of Internet link(DSL, cable, etc.) for backup.


C.

HD video traffic is found in high-end and ultra high-end branches.


D.

WAAS Express is the preferred WAN optimization implementation in mobile and standard branches.


Expert Solution
Questions # 14:

Which of the following statements regarding the WAAS vendor landscape is not true??

Options:

A.

Riverbed is the market leader.


B.

Bluecoat isnumber two in the WAAS market.


C.

Riverbed lacks routing functionality.


D.

The benefits of Cisco WAAS include scalability, the comprehensive product portfolio, and VDI vendor-validated optimization.


Expert Solution
Questions # 15:

Which three of the following are valid steps when building an architectural roadmap for a customer? (Choose three.)

Options:

A.

Understand the business objectives, current environment, and pain points of the customer.


B.

Assess the current infrastructure, financial data, and operational management capabilities.


C.

Identify configuration flaws on individual devices.


D.

Analyze collected data, identify potential savings, and develop TCO and ROI.


E.

Deliver business case documentation, detailed technical solution scenarios, and TCO report.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions