Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

648-385 Exam Dumps - Cisco Express Foundation for Field Engineers

Question # 4

Which two questions should you ask when assessing an organization's security needs? (Choose two.)

A.

Are you exploring new cloud business models?

B.

Are you enforcing the same security policies consistently across your organization?

C.

Are you using the latest hardware and software versions for your security devices?

D.

Are you using single-vendor security equipment?

E.

What are the operating hours of your security response team?

Full Access
Question # 5

Which three of the following are valid steps when building an architectural roadmap for a customer? (Choose three.)

A.

Understand the business objectives, current environment, and pain points of the customer.

B.

Assess the current infrastructure, financial data, and operational management capabilities.

C.

Identify configuration flaws on individual devices.

D.

Analyze collected data, identify potential savings, and develop TCO and ROI.

E.

Deliver business case documentation, detailed technical solution scenarios, and TCO report.

Full Access
Question # 6

Which four of the following are included in the SBA toolset? (Choose four.)?

A.

Partner enablement assets

B.

Software release notes

C.

Design guides

D.

Foundation deployment guides

E.

Command reference guides

F.

Unified Communications Acceleration Guide

Full Access
Question # 7

Which three are valid Cisco VPN design options for teleworkers? (Choose three.)

A.

Cisco AnyConnect VPN

B.

Cisco Secure ACS

C.

Cisco SSL VPN

D.

Cisco GET Easy VPN Remote

E.

Cisco Mobile VPN

Full Access
Question # 8

Which three of the following statements are correct regarding security features available on Cisco Catalyst switches? (Choose three.)

A.

Port security prevents MAC address flooding.

B.

DHCP snooping prevents rogue DHCP servers from being placed on the network.

C.

IP Source Guard prevents ARP spoofing attacks.

D.

Private VLAN prevents client to client communication.

E.

MACsec provides end-to-end encryption.

Full Access
Question # 9

Which two configurations are performed on Cisco IOS routers when using Cisco AutoSecure? (Choose two.)

A.

ICMP is globally disabled.

B.

Directed broadcasts are globally disabled.

C.

Source routing is globally disabled.

D.

Proxy ARP is disabled on all interfaces.

Full Access
Question # 10

Which statement about MACsec is true?

A.

MACsec provides Layer 2 hop-by-hop encryption, based on the 802.1AE standard.

B.

Cisco AnyConnect Release 3.0 supports both roles: supplicant and authenticator.

C.

802.1X protection includes the CMD field, which is used to carry the security group tag value.

D.

MACsec does not work between any MACsec-capable supplicant and authenticator.

Full Access
Question # 11

Which three major trends fuel the demand for routing and switching? (Choose three.)

A.

Mobility

B.

Video

C.

Bandwidth optimization

D.

Cloud

E.

IT standardization

Full Access
Question # 12

Which statement about the capabilities of the Cisco AnyConnect 3.0 Secure Mobility Client for Windows is true?

A.

User must select the nearest network access point to connect to.

B.

It supports session persistence after hibernation or standby.

C.

It is supported on Windows 7 and above.

D.

It is exclusively configured by central policies; no local configuration is possible.

E.

Only local policy configuration is supported.

Full Access