IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Cisco Express Foundation Field Specialist 648-385 시험관련 자료

Cisco Express Foundation Field Specialist 648-385인증시험을 패스하고 자격증 취득으로 하여 여러분의 인생은 많은 인생역전이 이루어질 것입니다. 회사, 생활에서는 물론 많은 업그레이드가 있을 것입니다. Pass4Test에서는  Cisco Express Foundation Field Specialist 648-385 인증시험관련가이드로 효과적으로  Cisco Express Foundation Field Specialist 648-385 시험을 패스하도록 도와드리겠습니다.Pass4Test 의 학습가이드에는  Cisco Express Foundation Field Specialist 648-385 인증시험의 예상문제, 시험문제와 답 임으로 100% 시험을 패스할 수 있습니다.우리의  Cisco Express Foundation Field Specialist 648-385 시험자료로 충분한 시험준비 하시는것이 좋을것 같습니다. 그리고 우리는 일년무료 업데이트서비스를 제공합니다.우리 Pass4Test가 제공하는 최신, 최고의  Cisco Express Foundation Field Specialist 648-385 시험관련 자료를 선택함으로 여러분은 이미 시험패스 성공이라고 보실수 있습니다.

 

 

NO.1 A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which
two of these might have caused this problem? (Choose two.)
A. The ip https server command is missing from the running configuration.
B. The ip httpsecure servercommand is missing from the running configuration
C. The user is trying to launch Cisco Router and Security Device Manager from the inside
(secured) interface with a firewall enabled.
D. The user has a privilege level lower than 15.
E. The browser security level is set too high.
Answer: B,D

NO.2 An 802.11 b telephone is receiving an audio signal from an access point, but cannot send
audio.
What is a possible cause?
A. the RSSI value on the telephone is greater than 35.
B. The access point is set to receive only at 802.11g data rates.
C. The security settings in the telephone do not match the settings in the access point.
D. The transmit power in the telephone is significantly lower than the transmit power in the access
point.
Answer: D

NO.3 How many voice expansion slots are provided by the Cisco UC520?
A. One
B. two
C. three
D. four
Answer: A

NO.4 What does understanding the radiation patterns of different antennas types help you to
determine
when providing wireless coverage in an office building?
A. the exact number of access points that are needed
B. the type of antenna to cover a specific area
C. the size of an area that will be covered
D. the location of the access points
Answer: B

NO.5 What is the major difference between TACACS+ and RADIUS?
A. TACACS+ runs in TCP ,RADIUS operates in UDP
B. TACACS+ runs in UDP ,RADIUS operates in TCP
C. RADIUS encrypts the entire body of the access-request packet that is sent from the client to the
server,TACACS+ encrypts only the password in the access-request packet
D. TACACS+ and RADIUS operate on two different protocol layers
Answer: A

NO.6 Which two statement best describe the wireless core feature set using autonomous access
points
when implementing Wireless Domain Services? (Choose two)
A. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or a
Cisco Integrated Services Router
B. Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco
Integrated Services Router
C. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or
controllers
D. Layer 3 services can be configured in WLSM
E. Layer 3 services can be configured in WLSE
Answer: B,D

NO.7 What are two configurable options for Call Control on the Cisco UC520? (Choose two.)
A. Shared Key
B. PBX
C. Key System
D. Encryption
E. Call Waiting
Answer: B,C

NO.8 After configuring VTP , you no longer receive updates as expected. Which command can you
use
to verify the number of VTP advertisements being transmitted?
A. show vtp database
B. show vtp counters
C. show vtp statistics
D. show vtp status
Answer: B

NO.9 You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted
interface. You suspect that the rule may be blocking necessary traffic onto the network. What must
you do to delete that rule when using Cisco Router and Security Device Manager?
A. Select ACL Editor > Access Rules to delete the rule.
B. You must remove the association between the rule and the interface before deleting the rule
C. You must delete the associated access list on the interface,then reconfigure the access list as
required,and then reapply the access group to the proper interface.
D. Go to the Edit Firewall Policy tab to delete the rule.
Answer: B

NO.10 In which of these phases is a customer's current network infrastructure assessed?
A. Plan
B. Design
C. Implement
D. Prepare
Answer: A
Posted 2013/1/15 3:10:57  |  Category: 미분류  |  Tag: