Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 646-561 Exam - Cheat-Test.com

Free 646-561 Sample Questions:

1. A hacker initiates an attack that floods the network, overwhelming the company server, router, firewall, or network. Legitimate trafficcannot be processed, and the company cannot function. This causes which security pain point?
A. DDoS attack
B. application security
C. theft of information
D. Day Zero attack
Answer: A

2. Which Cisco Security Solution helps organizations to effectively avoid disruptions that are caused by worms or viruses, while also helping to control the costs of deploying and maintaining a secure network?
A. CiscoWorks VPN/Security Management Solution
B. Cisco Security Monitoring, Analysis and Response System
C. Theft of Information Solution
D. Outbreak Prevention Solution
Answer: D

3. NAC is an example of which principal characteristic of the Cisco SDN?
A. adaptation
B. collaboration
C. differentiation
D. integration
Answer: B

4. Once you have concluded the discovery process, you will set up a meeting with the final decision maker and present the value proposition. Which two items would you include in your value proposition? (Choose two.)
A. qualitative information about how Cisco can help to increase revenue and reduce costs
B. a high-level review of the Cisco Security portfolio and how it differs from competitive offerings
C. a detailed review of the proposed technological enhancements that are provided in the security solution design
D. an analysis of the security-market business trends and related Cisco solution offerings
E. a review of customer security pain points and business needs that you learned about during the discovery process
Answer: A, E

5. No one buys security for security itself: customers must be able to realize the benefits. Which three benefits can Cisco Security Solutions provide to customers? (Choose three.)
A. network convergence
B. increased profitability
C. zero percent of the network downtime
D. extended network access
E. compliance with government regulations
F. bandwidth optimization
Answer: B, D, E

6. Which business enabler provides a defense against damages and losses (such as financial, legal, commercial, image, branding, property, and people), which directly affect the ability of a company to do business?
A. government regulations
B. protection
C. ubiquitous access
D. contribution to profitability
Answer: B

7. You are meeting with a customer who is concerned about ongoing network threats and vulnerabilities within the corporate network. How should you position the Cisco SDN with this customer?
A. The Cisco Self-Defending Network is the Cisco solution that protects the network of an organization. The SDN strategy offers security products that will defend your network before attacks occur. SDN products use industry-leading technologies, which will enable your company to stay up to date on network security.
B. Cisco NAC is a complete, end-to-end security solution that enables endpoints to be admitted to the network based on their adherence to security policy as enforced by network devices, such as routers and switches. NAC is
a solution that will protect business processes and the network of your organization by identifying, preventing, and adapting to security threats.
C. Cisco SDN solutions are adaptive, allowing for innovative behavioral methods to be deployed in order to automatically recognize new types of threats as they arise. Mutual awareness can exist among and between security services and network intelligence, thus increasing security effectiveness and enabling a much more proactive response to new types of threats.
D. Most network threats and vulnerabilities arise from inefficient access control. Cisco VLAN solutions are a part of the Self-Defending Network strategy, and can segment users into different workgroups or virtual LANs based on whom they are, not where they are. In turn, VLAN solutions prohibit hackers from gaining network access, and will dramatically lessen the pains you are experiencing with network threats and vulnerabilities.
Answer: C

8. You are meeting with a customer who is concerned about remote employees connecting to the network with infected systems and spreading infection across the corporate network. How should you position the Cisco SDN with this customer?
A. The Cisco Self-Defending Network includes NAC, which evaluates devices that may not have the latest antivirus software or operating system patch, and either denies access to those devices or quarantines them.
B. The Cisco Self-Defending Network includes integration, which enables a more proactive response to threats with greater operational efficiency through the consolidation of multiple security services on the devices.
C. The Cisco Self-Defending Network is adaptive, distributing security technologies throughout every segment
of the network to enable every network element as a point of defense.
D. The Cisco Self-Defending Network provides technologies that have intelligent insight into what is running on computers, so there is no possible way for remote employees to connect to the network with infected systems.
Answer: A

9. In which two ways does application security protect against threats being introduced from within web-enabled applications? (Choose two.)
A. Application security examines message-level information to ascertain the "intent" of the applications.
B. Application security provides controls that limit the transmission of confidential data or policies.
C. Application security intelligently analyzes network payload.
D. Application security stops attacks as far as possible from their intended destination and the core of the network.
E. Application security provides sophisticated auditing, control, and correlation capabilities to control and protect any networked element.
Answer: A, C

10. How does Anti-X defense stop attacks as far as possible from their intended destination and the core of the network?
A. Anti-X defense examines message-level information to ascertain the "intent" of the applications.
B. Anti-X defense intelligently analyzes network payload.
C. Anti-X defense distributes mitigation points throughout key security-enforcement points in the network.
D. Anti-X defense provides sophisticated auditing, control, and correlation capabilities to control and protect any networked element.
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved