Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two statements accurately describe the impact of BYOD to the network? (Choose two.)

A.

TCO is reduced because employees use their privately owned devices.

B.

BYOD increases productivity, but IT must find ways to integrate the utilized devices seamlessly with wired as well as wireless networks.

C.

BYOD adds the requirement to support multiple operating systems.

D.

Corporate users expect the same look and feel when using their own devices.

Which of the following Cisco ISR G2 features provides support for cloud-based web security?

A.

ScanSafe Client

B.

ScanSafe Connector

C.

ScanSafe Controller

D.

CleanAir Controller

E.

CleanAir Connector

F.

CleanAir Client

What does not need to be considered when looking into the customer workflow?

A.

How does the customer access the online software solutions?

B.

How many different switch products are in use at the customer network?

C.

How can the service partner instantly connect with outsourced engineers?

D.

How can customer and service collaborate and start video communication?

Which two of the following can be helpful tools for documenting or calculating the cost reduction of a Cisco Borderless Network? (Choose two.)?

A.

Cisco SBA ROI Calculator

B.

Report of Total Economic Impact of Cisco Borderless Networks

C.

Cisco Borderless Networks ROI Benefits Calculator

D.

Cisco Virtual Sales Expert Guide?

Which three of the following statements correctly describe switching? (Choose three.)

A.

A Layer 2 switch operates up to the data link layer of the OSI network model.?

B.

A Layer 3 switch operates up to the transport layer of the OSI network model.?

C.

A dual-layer switch operates at the transport and data link layers of the OSI network model.?

D.

A dual-layer switch operates at the data link and network layers of the OSI network model.?

E.

A multilayer switch operates up to Layer 4 of the OSI network model.?

Application visibility and performance monitoring are important components of an optimized WAN. Which three of the following can be sources for Cisco Prime Network Analysis Module? (Choose three.)

A.

Syslog

B.

WAAS Flow Agent?

C.

IOS Performance Agent?

D.

Flexible Netflow?

E.

CDR

Which three of the following statements are correct regarding security features available on Cisco Catalyst switches? (Choose three.)

A.

Port security prevents MAC address flooding.

B.

DHCP snooping prevents rogue DHCP servers from being placed on the network.?

C.

IP Source Guard prevents ARP spoofing attacks.

D.

Private VLAN prevents client to client communication.?

E.

MACsec provides end-to-end encryption.?

Which two of the following statements are true regarding placement of WAAS? (Choose two.)?

A.

All WAE appliance models support inline deployment. Fail-to-wire capabilities ensure that traffic continues to flow through the system in case of a hardware or software failure. ?

B.

Off-path interception of traffic can be achieved by policy-based routing or WCCP v2 interception.?

C.

Cisco WAAS Express supports off-path interception only via WCCP v2 interception.?

D.

WAE appliances do not support 802.1Q.?

Which two of the following need to be considered when designing QoS in a Cisco Borderless Network? (Choose two.)?

A.

In order to receive priority treatment for mission-critical traffic across the SP cloud, the higher number of locally used classes of service have to be mapped to the fewer number service classes that are usually offered by service providers.?

B.

In order to maintain DSCP values end-to-end, inbound traffic from the SP cloud needs to be reclassified if it was sent through a tunnel.

C.

RFC 4594 describes how to classify and mark traffic at the campus and branch LAN using 12 different classifications.

D.

According to RFC 4594, voice and video traffic should be sent through two separate priority queues.?

Which of the following is the strongest competitor of Cisco in the WAN optimization market space?

A.

Blue Coat Systems

B.

F5 Networks

C.

Riverbed Technology

D.

Silver Peak Systems