Question : 12
Which statement correctly describes the importance and role of business processes?
A. Business processes are built on company operations.
B. Operations and, consequently, business processes define the company strategy.
C. Changes in company strategy cause changes in business processes and, consequently, in operations.
D. Tasks in business processes require interaction of various users using the same type of device.
Question : 11
Which statement is true regarding IPv6?
A. IPv6 support on network devices eliminates the need for additional security devices and applications in the network.
B. IPv6 is applicable in service provider networks but is an overhead item in smaller networks.
C. All devices currently support IPv6 and IPv4.
D. The Cisco Transformative Networking initiative provides an analysis of the network regarding the capabilities of devices to support IPv6.
Answer : D
Do you want to pass your 646-365 exam and want to get free 646-365 braindumps questions answers? Click on this pdf file and download the practice test questions that you are going to see in your real exam. This is free 646-365 dumps download.
Click To Download!
Question : 10
What are the two benefits of the “one policy” approach in the Cisco Unified Access solution? (Choose two)
A. Context-based control
B. Resiliency and scalability
C. Comprehensive visibility
D. User-specific services
E. Uncompromised experience
Question : 9
Which two statements accurately describe the impact of BYOD to the network? (Choose two)
A. BYOD adds the requirement to support multiple operating systems.
B. TCO is reduced because employees use their privately owned devices.
C. BYOD increases productivity, but IT must find ways to integrate the utilized devices seamlessly with wired as well as wireless network
D. Corporate users expect the same look and feel when using their own devices.
Question : 8
Which two are switch security features that enable a secure borderless network? (Choose two)
A. Device profiling and profile-based selection of security policies
B. Cisco ASA Firewall
C. Security Group Tagging
Question : 7
Which three are challenges that are related to video deployments that are addressed by
Borderless network services in Cisco routers and by Cisco MediaNet? (Choose three.)
A. Lack of support for far-end camera control (FECC) at some video terminals
B. Difficulty configuring new video devices at all sites
C. Difficulty monitoring video performance and user experience
D. Limited availability of high-speed video connections between sites
E. Bandwidth issues that are caused by centralized video mixing
Question : 6
Which two other architectures is the Cisco Borderless Network Architecture linked to? (Choose two)
A. Cisco MediaNet Architecture
B. Cisco Security Architecture
C. Cisco TrustSec Architecture
D. Cisco Collaboration Architecture
Question : 5
What are three foundational principles of Cisco SecureX Architecture? (Choose three)
A. Virtual office management
B. Virtual security
C. Context-aware security enforcement
D. Content access control
E. Context-aware policy
F. Network management
G. Network and Global intelligence
Question : 4
What is the role of Cisco AnyConnect in a borderless network?
A. Cisco AnyConnect is a host intrusion prevention application with an integrated personal firewall.
B. Cisco AnyConnect filters malicious content from HTTP traffic.
C. Access control to switch ports is provided by Cisco AnyConnect.
D. Cisco AnyConnect enables secure connectivity of authorized devices.