Latest 648-375 Real Exam Download 11-20



Which two of the following need to be considered when designing QoS in a Cisco Borderless Network? (Choose two.)


A.      RFC 4594 describes how to classify and mark traffic at the campus and branch LAN using 12 different classifications.

B.      According to RFC 4594, voice and video traffic should be sent through two separate priority queues.

C.      In order to maintain DSCP values end-to-end, inbound traffic from the SP cloud needs to be reclassified if it was sent through a tunnel.

D.      In order to receive priority treatment for mission-critical traffic across the SP cloud, the higher number of locally used classes of service have to be mapped to the fewer number service classes that are usually offered by service providers.


Correct Answer: AD




Which two statements are correct concerning Cisco Validated Design? (Choose two.)


A.      SmartNet provides access to a demonstration lab for each validated design.

B.      Cisco Validated Design consists of systems that are designed, tested, and documented to facilitate and improve customer deployments.

C.      Cisco Validated Design incorporates a limited range of technologies and products into a portfolio of solutions that have been developed to address the business needs of customers.

D.      The design zone for security cannot offer validated designs for several categories.


Correct Answer: BD




Which two of the following statements correctly describe architecture and design? (Choose two.)


A.      The architecture shows building blocks and abstract capabilities of a system and the relational ship between the individual components.

B.      The design shows concrete products, expected performance, and scalability options of a solution.

C.      The design is the basis for creating the architecture.

D.      The architecture includes a description of the best possible solution.


Correct Answer: AB




The Cisco SecureX Architecture is built on which three foundational principles? (Choose three.)


A.      Virtual office management

B.      Context-aware policy

C.      Network and global intelligence

D.      Network management

E.       Context-aware security enforcement

F.       Content access control


Correct Answer: BCE




Which two of the following statements about the Cisco switching product portfolio are correct? (Choose two.)


A.      The Catalyst 2000 series support PoE and PoE+, but they do not support 60 W per port like the Cisco Catalyst 3000 and Cisco Catalyst 4000 series.

B.      The Cisco Catalyst 3750 v2 Cisco Catalyst 3750-X are stackable.

C.      The Cisco Catalyst 3560 v2 Cisco Catalyst 3560-X are stackable.

D.      The Cisco Catalyst 2000 series support 802.1X are MACsec encryption.


Correct Answer: AB




Which two security features are parts of the Cisco Catalyst Integrated Security Toolkit, which is available on almost all Cisco Catalyst switches? (Choose two.)


A.      DNS snooping

B.      Port security

C.      Static ARP inspection

D.      IP source guard

E.       SGACL

F.       MACsec


Correct Answer: BD




Which statement about MACsec is true?


A.      MACsec does not work between any MACsec-capable supplicant and authenticator.

B.      MACsec provides Layer 2 hop-by-hop encryption, based on the 802.1AE standard.

C.      802.1X protection includes the CMD field, which is used to carry the security group tag value.

D.      Cisco AnyConnect Release 3.0 supports both roles: supplicant and authenticator.


Correct Answer: B




Which two statements about CVD and SBA are true? (Choose two.)


A.      CVD is technology-oriented, while SBA is market and solution-oriented.

B.      CVD includes everything from rough designs to tested versions of software code.

C.      SBA guides are available for enterprise deployments only.

D.      Gold partners have access to a demo lab for each validated design.


Correct Answer: AB




About 50 percent of the installed bases of Cisco routers are reaching end of service or end of life. As a result, about 4 million units are expected to be replaced. What are the four strongest arguments to pre-empt competitive attacks? (Choose four.)


A.      Price per unit

B.      Ability to meet local service provider requirements

C.      Transparency of solutions

D.      Quality of Cisco software and support

E.       Service integration

F.       Long investment cycles


Correct Answer: BCDE




Which two examples best describes the challenges that customers face in networks of today? (Choose two.)


A.      How can we disable users from using their own devices?

B.      Do we need to invest in the BYOD solution?

C.      How do we control energy consumption of devices that are owned by employees?

D.      How can we effectively support extensive collaboration requirements, including video?

E.       Which type of firewall should we deploy?


Correct Answer: BD


Download Lates 648-375 Real Free Tests , help you to pass exam 100%.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.