Pass the Cisco Cisco Specialist 646-365 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two of these router series include packet voice/data module slots? (Choose two.)

Options:

A.

Cisco 2900 Series Routers


B.

Cisco 1900 Series Routers


C.

Cisco 800 Series Routers


D.

Cisco 3900 Series Routers


E.

Cisco ASR 1000 Series Routers


Questions # 2:

Which two other architectures is the Cisco Borderless Network Architecture linked to? (Choose two.)

Options:

A.

Cisco MediaNet Architecture


B.

Cisco Security Architecture


C.

Cisco TrustSec Architecture


D.

Cisco Collaboration Architecture


Questions # 3:

Which three statements accurately describe the evolution of the workplace and its impact on security? (Choose three.)

Options:

A.

Mobility causes location borders to shift.


B.

Cloud services cause end-user locations to shift.


C.

Cloud services cause application borders to shift.


D.

IT consumerization causes location borders to shift.


E.

IT consumerization causes device borders to shift.


Questions # 4:

What are the two business benefits of a BYOD solution? (Choose two.)

Options:

A.

reduced OpEx


B.

less IT effort to support and secure different devices


C.

less IT effort to support and secure different operating systems


D.

reduced network complexity


E.

increased productivity using own devices


Questions # 5:

Which two statements apply to a collaboration architecture that is integrated with Cisco SecureX? (Choose two.)

Options:

A.

Security services are available at the network level.


B.

Security services are available for collaboration appliances only.


C.

Security services are available for collaboration services.


D.

Security services are not available for client services.


E.

Cisco AnyConnect does not support secure connectivity to enable access to collaborative applications from mobile devices.


Questions # 6:

Which statement best describes total cost of ownership (TCO)?

Options:

A.

TCO is the same as the sum of all capital expenditures.


B.

TCO consists of direct costs (CapEx) and indirect costs such as labor and training.


C.

TCO also includes competitive advantage and business growth.


D.

TCO is relevant to the finance manager only.


Questions # 7:

What is the primary security requirement related to social media and collaboration?

Options:

A.

protection of network edges


B.

securing cloud transition


C.

enabling BYOD transformation


D.

authorizing content use


Questions # 8:

Which two of the following are driving factors for implementing an open and secure customer network? (Choose two.)

Options:

A.

The need to access Internet and cloud-based services from within the customer network


B.

The need to decrease database backup duration


C.

The need to increase corporate LAN bandwidth


D.

The need to access corporate applications from remote locations


E.

The need to reduce corporate network carbon footprint


Questions # 9:

Which two statements are true about Cisco Smart Business Architecture? (Choose two.)

Options:

A.

Cisco Smart Business Architecture shifts the view from short term and tactical to long term and strategic.


B.

Cisco Smart Business Architecture protects IT investments by making sure that all spending is linked to a long-term return on investment.


C.

Cisco Smart Business Architecture helps build a comprehensive, unified architecture that matches current and future demands.


D.

Cisco Smart Business Architecture guides are interactive, allowing step-by-step creation of designs that fit individual requirements. Embedded Cisco Smart Business Architecture maps are available for download at each step.


E.

Cisco Smart Business Architecture framework supports enterprise network design without remote locations.


Questions # 10:

Which one of these actions is the best way to resolve security challenges in borderless networks?

Options:

A.

Upgrade all existing security products in the network.


B.

Identify the vulnerabilities of only newly deployed services.


C.

Identify the vulnerabilities of only newly deployed network devices.


D.

Migrate to an architectural approach to security.


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions