Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The Cisco SecureX Architecture is built on which two foundational principles? (Choose two.)

A.

context-aware policy

B.

virtual office management

C.

network management

D.

service provider policy

E.

context-aware security enforcement

Which three major trends fuel the demand for routing and switching? (Choose three.)

A.

Mobility

B.

Video

C.

Bandwidth optimization

D.

Cloud

E.

IT standardization

Which two statements correctly describe architecture and design? (Choose two.)

A.

The architecture shows building blocks and abstract capabilities of a system and the relationships between the individual components.

B.

The design is the basis for creating the architecture.

C.

The architecture includes a description of the best possible solution.

D.

The design shows concrete products, expected performance, and scalability options of a solution.

Which two examples best describe the challenges that customers face in networks of today? (Choose two.)

A.

How can we effectively support extensive collaboration requirements, including video?

B.

How do we control energy consumption of devices that are owned by employees?

C.

Which type of firewall should we deploy?

D.

Do we need to invest in the BYOD solution?

E.

How can we disable users from using their own devices?

Which two of the following statements correctly describe how Cisco Prime NCS simplifies troubleshooting? (Choose two.)?

A.

It automatically configures a Cisco AnyConnect SSL tunnel, which allows Cisco TAC engineers to connect to malfunctioning devices.

B.

It enables network operators to open instant messaging conversations with Cisco TAC engineers.

C.

Cisco Smart Interactions allow network operators to open service requests to Cisco TAC in a controlled manner. Relevant information such as current configuration, last configuration changes, and events can be attached by a single mouse click.

D.

It can collect crucial information such as associated devices and their current IP address and status based on the user's name.

Which two of the following statements correctly describe Cisco Prime features that help improve operational efficiency? (Choose two.)

A.

The Cisco Prime user interface is optimized for touchscreens.

B.

All components of the Cisco Prime for Enterprise product portfolio provide a common look and feel, which simplifies usability.

C.

Integrated workflows and best practices enable quick and error-free deployment.

D.

TrustSec, MediaNet, and EnergyWise services are only configured outside Work Centers in Cisco Prime LMS.

Which two security features are part of the Cisco Catalyst Integrated Security Toolkit, which is available on almost all Cisco Catalyst switches? (Choose two.)

A.

IP source guard

B.

static ARP inspection

C.

MACsec

D.

DNS snooping

E.

SGACL

F.

port security

Which two statements correctly describe how Cisco Prime NCS simplifies troubleshooting? (Choose two.)

A.

It automatically configures a Cisco AnyConnect SSL tunnel, which allows Cisco TAC engineers to connect to malfunctioning devices.

B.

It enables network operators to open instant messaging conversations with Cisco TAC engineers.

C.

Cisco Smart Interactions allow network operators to open service requests to Cisco TAC in a controlled manner. Relevant information such as current configuration, last configuration changes, and events can be attached by a single mouse click.

D.

It can collect crucial information such as associated devices and their current IP address and status based on the user's name.

Which three solutions are part of the Cisco SecureX Architecture? (Choose three.)

A.

secure routers

B.

secure switches

C.

secure network

D.

secure email and web

E.

secure servers

F.

secure mobility

Which statement about Cisco Prime is true?

A.

It provides simple and efficient management across architectures, networks, and services.

B.

It provides simple and efficient management of security services.

C.

It provides management services for all TrustSec products.

D.

It is an expert-level monitoring and troubleshooting tool based on Cisco SIO.