What would you use to enforce security-policy compliance on all devices that seek to access the network?
AVLAN
BNAC
CEAP
DWLAN
Which three business requirements development activities are performed in the prepare phase before creating a technology strategy? (Choose three)
Aidentifying and assessing customer business requirements
Bdocumenting and categorizing customer business requirements in terms of performance, availability, capacity and security
Cproducing a documented technology strategy
Dcreating a bill of materials
Epresenting documented business requirements to a customer and having the customer validate them
Fcompleting a site survey
The price of Cisco Small Business Pro Service is based on the complexity of the device that is being covered. How many different price points for these devices are available?
A3
B4
C5
D6
Why can security on healthcare networks be an important issue for customers?
Aoffers a rapid return on investment.
Btelecommuting
Cmultiple network connections
Dlegal mandates
A new client of yours is experiencing a growth spurt. The client s IT staff is making network changes manually and, as a consequence, is extremely overworked,
You suggest the client implement a network management system, citing which important business benefit?
Apotential for outsourcing the IT staff
Bprovision of an out-of-band management architecture
Cthreat mitigation
Dreduction in network downtime
In which of these phases is a customer s current network infrastructure assessed?
Aplan
Bdesign
Cimplement
Dprepare
Which are three challenges and trends that are driving the need for technology in the retail market? (Choose three)
Aintense competition that is driven by the increased number of discounters
Bdeclining customer loyalty
Ccompensating for staff shortages
Dchanges in demographics
Ehigh operating costs
Fdesire to offer Internet access in stores
Which two ways does an integrated security solution reduce TCO? (Choose two)
Aby enabling business to leverage investments in the network
Bby spending less time addressing attacks
Cby enforcing policy compliance
Dthrough admission control
Which of the following is less vulnerable to threats and attacks because it is not associated with one specific operating system?
ACisco Voice and Video over VPN
BCisco Secure Access Control Server
CCisco NAC Appliance
DCisco Threats Response
In what way does Cisco SMARTnet help customers protect their network investments?
Aallows them to acquire replacement hardware as needed instead of carrying it in inventory
Bincludes upgrade insurance
Cincludes Cisco Learning Credits for staff training
Dprovides them with trade-in incentives for their end-of-life products
What is an ideal Cisco solution to protect a campus network and services from potential security breaches?
ACisco Security Device Manager
BCisco Security Agent
CCisco VPN Client
DCisco Intrusion Detection System
Hacks and intrusions affect the economic performance of business immediately, in the short-term, and in the long-term. Which two of these are short-term economic impacts of a security branch? (Choose two)
Aloss of retail sales
Berosion of investor confidence
Cdisruption of business operation
Dloss of suppliers or customers
After a client has developed a security policy, what is recommended that they do next?
Amonitor and respond
Banalyze and improve
Csecure the network
Dtest the system
What are two security features of the Cisco Secure Router 500 Series? (Choose two)
ACisco Intrusion Prevention System
BCisco IOS Software Firewall
CCisco IOS Easy VPN
DCisco Unified Wireless Networking
ECisco ASA Hardware Firewall
What best describes the features of the Cisco 850 Series routers?
Aintegrates data, security, and wireless
Bintegrates data, security, wireless and application optimization
Cintegrates voice, data, security, wireless and application optimization
Dintegrates data and wireless
Which two of these Cisco Catalyst switches are distribution-area switches? (Choose two.)
ACatalyst 2800/E Series
BCatalyst 3750 Series
CCatalyst 3900/E Series
DCatalyst 4500/E Series
ECatalyst 6500/E Series
What voice endpoint is recommended for use with the Cisco Unified Communications 500 Series for small businesses?
AIP7961
BIP8961
CSPA504
DSPA9000
Which two statement best describes the Cisco Unified Wireless Network? (Choose two)
AThe Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANs
BThe Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANs
CThe Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNs
DThe Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security,
Which two series of Cisco Catalyst switches, when placed in the distribution layer, effectively pass high amounts of network traffic between the core and access layers while aggregating access? (Choose two)
ACisco Catalyst 2800
BCisco Catalyst 3550
CCisco Catalyst 3750
DCisco Catalyst 4500
ECisco Catalyst 6500
What are three important security issues in any small, medium, or enterprise business organization? (Choose three)
Arapid response time
Bhead count
Cconnectivity
Dsecurity threats
Ereduced complexity
Fdisaster recovery
Which three of the following are elements of the Cisco Unified Wireless Network?
(Choose three)
AUnified advanced service
Bclient devices
CCatalyst switches
Dnetwork management
Emesh access points
FVPN concentrator
Which of these is the best definition of the Cisco Lifecycle Service approach?
AIt defines the minimum set of services required to successfully deploy and operate a set of Cisco technologies
BIt determines how best to price Cisco products
CIt provides partners with a useful way to leverage Cisco resources
DIt consists of these phase: plan, deploy, support, and troubleshoot
Which series of Cisco routers is suitable for small businesses and for connecting small offices to enterprise networks?
ACisco 800 Series routers
BCisco 830 Series routers
CCisco 1700 Series Modular Access Routers
DCisco 3700 Series Modular Access Routers
Which service component within the prepare phase recommends the appropriate technology strategy to address a business requirement of the customer?
Aidentifying what a customer requires from a proposed solution
Banalyzes the customer s business requirements and recommends the appropriate Cisco technologies to meet business requirements
Cdetermining what end-user training a customer requires
Daddressing a customer s physical requirements
The Training and Events section of Cisco.com contains information about additional Cisco educational resources that enable you to further your professional opportunities. Which program is found in Training and Events?