Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 646-058 Exam -

Free 646-058 Sample Questions:

1. Which two tasks focus on discussing the network implementation strategy with key stakeholders and business owners? (Choose two.)
A. rollback and contingency plans
B. resource requirements and tools to perform network operations testing
C. site remediation, plans, and execution status
D. site survey results
Answer: C, D

2. Which service component within the plan phase prescribes a set of activities and tasks to assess existing network infrastructure and applications to verify their ability to support the proposed routing and switching solution for a customer?
A. Deployment Project Management
B. Operations Readiness Assessment
C. Security Vulnerability Assessment
D. Site Readiness Assessment
E. Network Readiness Assessment
Answer: E

3. Which three activities within the plan phase are performed when assessing network vulnerabilities and identifying steps needed to address security threats and attacks? (Choose three.)
A. Produce network security specifications and requirements.
B. Identify, analyze, and document existing network vulnerabilities.
C. Produce security vulnerability report.
D. Assess current network infrastructure and network security procedures.
E. Document the existing network environment.
F. Document the network vulnerabilities and determine the level of criticality for remediation.
Answer: B, C, E

4. What are two typical activities that are conducted as part of Security Assessment? (Choose two.)
A. Perform intrusion audits.
B. Assess network infrastructure software and configurations.
C. Create a performance baseline for Security Assessment.
D. Categorize security incidents.
Answer: A, C

5. Which task is conducted as part of Business Readiness Testing?
A. Identify, select, and assess network management tools, features, and functionality.
B. Obtain and review security procedures and policies.
C. Use predetermined use cases or design use cases based upon validated business and operational requirements.
D. Review network implementation strategy.
Answer: C

6. Which two items on the design discovery checklist are used to create a low-level design? (Choose two.)
A. technical requirements
B. capacity planning
C. design goals
D. WAN modeling
Answer: A, C

© 2014, All Rights Reserved