Download Cisco.642-584.1e.47q.vcex

Download Exam

File Info

Exam Security Solutions for Systems Engineers SSSE
Number 642-584
File Name Cisco.642-584.1e.47q.vcex
Size 27 Kb
Posted July 24, 2018
Downloads 26

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
Which statement about wireless intrusion prevention and rogue access point detection is true?

  • A: A local mode access point provides power to wireless clients.
  • B: A monitor mode access point performs background scanning in order to detect rogue access points.
  • C: A monitor mode access point is dedicated to scanning (listen-only).
  • D: A monitor mode access point can distribute a white list of all known access points.
  • E: Any access point that broadcasts the same RF group name or is part of the same mobility group is considered to be a rogue access point.

Question 2
Which three are valid Cisco email security deployment options? (Choose three.)

  • A: Hosted email security
  • B: Hybrid hosted email security
  • C: Managed appliances email security
  • D: Client-based email security
  • E: Email security on BYOD devices

Question 3
Which two statements about the Cisco IronPort Email Security architecture are true? (Choose two.)

  • A: A key component of the Cisco IronPort Email Security architecture is the compromised domain list.
  • B: A key component of the Cisco IronPort Email Security architecture is the HTTP Inspection Engine.
  • C: Inbound security includes spam defense and virus defense.
  • D: Inbound security includes secure messaging via SSH, S-MIME, and POP over TLS.
  • E: Outbound control includes data loss prevention and secure messaging.

Question 4
Which statement about EoMPLS and VPLS is true?

  • A: EoMPLS is based on the Pseudowire Reference Model.
  • B: EoMPLS does not provide point-to-point connections.
  • C: VPLS emulates a point-to-multipoint IPsec VPN over MPLS.
  • D: VPLS supports only partially meshed and hub-and-spoke topologies.

Question 5
Which two are advantages of virtual device contexts? (Choose two.)

  • A: Device consolidation
  • B: Centralization of hardware resources
  • C: Hardware and software fault isolation
  • D: Protection of network traffic based on MACsec
  • E: Layer 2 encryption

Question 6
Which two virtual networking services are provided by a Cisco Nexus 1000V? (Choose two.)

  • A: Cisco Virtual Security Gateway
  • B: Cisco ASA 1000V
  • C: Cisco Virtual ScanSafe
  • D: Cisco Virtual IPS

Question 7
Which essential element is needed to perform events analysis and correlation?

  • A: elimination of all the true positive events
  • B: implementation of the same IPS and firewall policies throughout the network
  • C: time synchronization between all the devices
  • D: implementation of a centralized provisioning system, such as Cisco Security Manager
  • E: implementation of different security controls and platforms when using the defense-in-depth approach

Question 8
Which two Cisco products can be used to provide a captive portal to authenticate wireless users?  
(Choose two.)

  • A: Cisco Secure ACS
  • B: WLAN Controller
  • C: Cisco NAC Guest Server
  • D: Cisco NAC Profiler
  • E: Cisco ASA 

Question 9
Which three security components can be found in today's typical single-tier firewall system?  
(Choose three.)

  • A: Stateful Packet Filtering with Application Inspection and Control
  • B: IPS
  • C: Network Admission Control
  • D: Application proxy
  • E: Cache engine
  • F: Server load balancing

Question 10
What should be configured to maintain symmetric flow of traffic when using the Gateway Load  
Balancing Protocol to enable high-availability Cisco IOS firewalls?

  • A: Policy-based Routing
  • B: Static Routing
  • C: Dynamic Routing
  • D: CEF
  • E: Network Address Translation (NAT)
  • F: Reflexive ACL


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files