REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Shaun
 
 

 

Braindumps of 648-385
Cisco Express Foundation for Field Engineers

 

Exam Questions, Answers, Braindumps (648-385)

Thanx to www.exams.ws for providing dumps.

 

Q NO1

Which two questions should you ask when assessing an organization's security needs? (Choose two.)

A. Are you exploring new cloud business models?

B. Are you enforcing the same security policies consistently across your organization?

C. Are you using the latest hardware and software versions for your security devices?

D. Are you using single-vendor security equipment?

E. What are the operating hours of your security response team?

ANS: A,B

Q NO2

Which four features are provided by the Cisco AnyConnect client for Windows? (Choose four.)

A. SSL VPN

B. IPsec VPN

C. host intrusion prevention system

D. presence

E. MACsec encryption

F. antivirus

G. personal firewall

H. Cisco ScanSafe integration

ANS: A,B,E,H

Q NO3

Which two statements about CVD and SBA are true? (Choose two.)

A. SBA guides are available for enterprise deployments only.

B. CVD includes everything from rough designs to tested versions of software code.

C. Gold partners have access to a demo lab for each validated design.

D. CVD is technology-oriented, while SBA is market- and solution-oriented.

ANS: B,D

Q NO4

The Cisco SecureX Architecture is built on which three foundational principles? (Choose three.)

A. context-aware policy

B. virtual office management

C. network management

D. content access control

E. context-aware security enforcement

F. network and global intelligence

ANS: A,E,F

Q NO5

Which three of the following are major trends that fuel the demand for routing and switching? (Choose three.)

A. Mobility

B. Video

C. Bandwidth optimization

D. Cloud

E. IT standardization

ANS: A,B,D

Q NO6

Which two of the following statements correctly describe architecture and design? (Choose two.)

A. The architecture shows building blocks and abstract capabilities of a system and the relationships between the individual components.

B. The design shows concrete products, expected performance, and scalability options of a solution.

C. The design is the basis for creating the architecture.

D. The architecture includes a description of the best possible solution.

ANS: A,B

Q NO7

Which two statements are true about CVD and SBA? (Choose two.)?

A. The SBA toolset includes Partner Enablement Assets and EcoPartner Guides.

B. SBA guides are available for enterprise deployments only.

C. CVDs are end-to-end designs which are well-tested and fully documented.

D. Gold partners have access to a demo lab for each validated design.

ANS: A,C

Q NO8

Which three of the following are successful examples of strategic IT investments improving operational agility? (Choose three.)

A. A company offers mobile email to its employees, who can then react faster to requests.

B. A company implements collaboration solutions, which simplified information exchange.

C. A company changes its security strategy from "lock down" to "secure access from anywhere", so that users are "always-on" and can easily work remotely.

D. A company implements EnergyWise solutions, which drastically reduce energy costs.?

E. A company provides support for a BYOD solution, which increases the investment and requires network upgrades, but provides limited improvements compared to a well-known remote access solution.

ANS: A,B,C

Q NO9

Which two examples best describe the challenges that customers face in networks of today? (Choose two.)

A. How can we effectively support extensive collaboration requirements, including video?

B. How do we control energy consumption of devices that are owned by employees?

C. Which type of firewall should we deploy?

D. Do we need to invest in the BYOD solution?

E. How can we disable users from using their own devices?

ANS: A,D

Q NO10

Which two statements about the capabilities of the Cisco AnyConnect 3.0 Secure Mobility Client for Windows are true? (Choose two.)

A. It supports always-on connectivity by automatically establishing a VPN connection as needed. If multiple VPN gateways exist, load sharing occurs in a round-robin fashion.

B. It supports session persistence after hibernation or standby.

C. Trusted Network Detection allows the connection to be established without any user intervention (authentication), if the client is located inside the office.

D. It is exclusively configured by central policies; no local configuration is possible.

E. The order of policy enforcement is as follows: dynamic access policy, user attributes, tunnel group, group policy attributes.

ANS: B,C

Q NO11

Which two of the following statements about the Cisco switching product portfolio are correct? (Choose two.)

A. The Cisco Catalyst 3560 v2 and Cisco Catalyst 3560-X are stackable.?

B. The Cisco Catalyst 3750 v2 and Cisco Catalyst 3750-X are stackable.?

C. The Cisco Catalyst 2000 series support 802.1X and MACsec encryption.?

D. The Cisco Catalyst 2000 series support PoE and PoE+, but they do not support 60 W per port like the Cisco Catalyst 3000 and Cisco Catalyst 4000 series.?

ANS: B,D

 

648-385


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend