|
It works i cleared on 19/4/2008 with blue heaven
|
Question 1. Which two of these statements describe why Cisco offers the security solution with the lowest operational cost? (Choose two.) A. Cisco ensures third-party integration. B. Cisco is able to meet PCI requirements. C. Cisco solves the broadest suite of threats. D. Cisco maximizes training costs for the IT group. E. Cisco has established partnerships with all key players. Answer: C, E Question 2. How does preliminary technical discovery benefit the customer? A. A technology strategy is presented to the customer. B. Information regarding an existing customer network is analyzed, which allows an appropriate solution to be developed. C. The account team analyzes and validates the business requirements. D. Detailed technical requirements are defined and documented. Answer: B Question 3. Which security management offering helps customers to readily and accurately identify, manage, and mitigate network attacks and to maintain network security compliance? A. Cisco Security Agent B. Cisco Security Manager C. Cisco NAC D. Cisco Network Assistant E. Cisco Security MARS Answer: E Question 4. What is one way that Cisco Security can decrease customer implementation costs? A. by using the existing infrastructure B. through dedicated security appliances C. through better security management products D. by reducing the number of people to train Answer: A Question 5. How does the Cisco ASA with the CSC module protect the network? (Choose two.) A. It blocks incoming e-mail and web threats. B. It guarantees regulatory compliance. C. It prevents network intrusion with an IPS. D. It provides VoIP enhancements. E. It prevents loss of sensitive information with integrated antivirus protection. Answer: A, E Question 6. How does security technology assessment drive continuous improvements? A. by recommending remediation measures, such as optimizing device configurations, planning capacity, and resolving quality issues B. by assessing the current state of the customer operations C. by assessing the realization of ROI and other benefits of the security system D. by defining project milestones Answer: A Question 7. Why do end users need to be aware of the security policy? A. Some security decisions are usually in their hands. B. They need to be aware of every threat. C. They should avoid responsibility for their actions. D. They should understand the probability of every risk. Answer: A Question 8. Which two of these choices describe how the secure network access solution provides value to the customer? (Choose two.) A. permits a man-in-the-middle attack B. makes mobility more cost-effective C. provides an unencrypted solution D. reduces the amount of equipment E. allows for secure Internet browsing Answer: B, D Question 9. How does the Cisco SDN relate to compliance? A. It is point product-based. B. It uses anomaly detection to secure a device. C. It addresses a large majority of PCI requirements. D. It uses IP protocol 50 (ESP) to securely communicate to network devices. Answer: C Question 10. Which Cisco solution provides host protection against security violations by focusing on the behavior of the device? A. Cisco PIX Firewall B. NAC Appliance C. host Analyzer D. Cisco Security Agent E. Cisco Adaptive Security Appliance Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.