Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

648-385 Exam Dumps - Cisco Express Foundation for Field Engineers

Go to page:
Question # 4

Which two questions should you ask when assessing an organization's security needs? (Choose two.)

A.

Are you exploring new cloud business models?

B.

Are you enforcing the same security policies consistently across your organization?

C.

Are you using the latest hardware and software versions for your security devices?

D.

Are you using single-vendor security equipment?

E.

What are the operating hours of your security response team?

Full Access
Question # 5

Which three of the following are valid steps when building an architectural roadmap for a customer? (Choose three.)

A.

Understand the business objectives, current environment, and pain points of the customer.

B.

Assess the current infrastructure, financial data, and operational management capabilities.

C.

Identify configuration flaws on individual devices.

D.

Analyze collected data, identify potential savings, and develop TCO and ROI.

E.

Deliver business case documentation, detailed technical solution scenarios, and TCO report.

Full Access
Question # 6

Which four of the following are included in the SBA toolset? (Choose four.)?

A.

Partner enablement assets

B.

Software release notes

C.

Design guides

D.

Foundation deployment guides

E.

Command reference guides

F.

Unified Communications Acceleration Guide

Full Access
Question # 7

Which three are valid Cisco VPN design options for teleworkers? (Choose three.)

A.

Cisco AnyConnect VPN

B.

Cisco Secure ACS

C.

Cisco SSL VPN

D.

Cisco GET Easy VPN Remote

E.

Cisco Mobile VPN

Full Access
Question # 8

Which three of the following statements are correct regarding security features available on Cisco Catalyst switches? (Choose three.)

A.

Port security prevents MAC address flooding.

B.

DHCP snooping prevents rogue DHCP servers from being placed on the network.

C.

IP Source Guard prevents ARP spoofing attacks.

D.

Private VLAN prevents client to client communication.

E.

MACsec provides end-to-end encryption.

Full Access
Go to page: