Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

648-385 Questions and Answers

Question # 6

Cisco MediaNet provides multimedia optimization services in a Cisco Borderless Network. Which two statements correctly describe Cisco MediaNet? (Choose two.)?

A.

Cisco MediaNet Performance Monitor collects performance metrics of video traffic as flexible netflow records which can be processed by any netflow collector, such as Cisco Prime Assurance Manager.

B.

Cisco MediaNet supports only SNMP traps but not syslog messages.

C.

When using PVDM3 on Cisco ISR G2, video streams of the same type can be locally mixed within the router. Video transcoding services require a dedicated video MCU.

D.

Cisco MediaNet Mediatrace allows real-time troubleshooting by providing details about every hop of the end-to-end path of your mediastream.

Full Access
Question # 7

Which three are the benefits of the Cisco SecureX architecture? (Choose three.)

A.

delivers granular visibility and control down to the user and device level

B.

provides partial security coverage over the network devices

C.

provides faster, more accurate protection from threats

D.

improves network security in cooperation with trusted vendor, third-party ecosystem

E.

increases operational efficiency with simplified policies, integrated security options, and automatic security enforcement

Full Access
Question # 8

Which two of the following statements about the Cisco switching product portfolio are correct? (Choose two.)

A.

The Cisco Catalyst 3560 v2 and Cisco Catalyst 3560-X are stackable.

B.

The Cisco Catalyst 3750 v2 and Cisco Catalyst 3750-X are stackable.

C.

The Cisco Catalyst 2000 series support 802.1X and MACsec encryption.

D.

The Cisco Catalyst 2000 series support PoE and PoE+, but they do not support 60 W per port like the Cisco Catalyst 3000 and Cisco Catalyst 4000 series.

Full Access
Question # 9

Which two of the following features are not supported by Cisco WAAS Express? (Choose two.)?

A.

TFO

B.

DRE with persistent cache?

C.

Application optimizers?

D.

Auto-discovery of end nodes?

Full Access
Question # 10

Which two questions should you ask when assessing an organization's security needs? (Choose two.)

A.

Are you exploring new cloud business models?

B.

Are you enforcing the same security policies consistently across your organization?

C.

Are you using the latest hardware and software versions for your security devices?

D.

Are you using single-vendor security equipment?

E.

What are the operating hours of your security response team?

Full Access
Question # 11

Which three are successful examples of strategic IT investments improving operational agility? (Choose three.)

A.

Mobile email services

B.

BYOD Cisco EnergyWise

C.

Multivendor network solution

D.

Collaboration solutions

Full Access
Question # 12

Which two of the following statements correctly describe architecture and design? (Choose two.)

A.

The architecture shows building blocks and abstract capabilities of a system and the relationships between the individual components.

B.

The design shows concrete products, expected performance, and scalability options of a solution.

C.

The design is the basis for creating the architecture.

D.

The architecture includes a description of the best possible solution.

Full Access