Professional Documents
Culture Documents
What tool helps the Cisco Business Architect to gain and leverage their knowledge of the
customer’s business?
2. Which Cisco network administration product enables the creation and enforcement of security
and access polices for a company’s connected endpoint devices
4. Which Cisco technology uses software-defined segmentation to simply the provisioning of network
access, accelerate security operations, and consistently enforce poly on the network?
Cisco TrustSec
Cisco Stealthwatch Engine
Cisco Platform Exchange Grd
Cisco Talos
Answer:A
5. Which hybrid and public cloud solution services help customers design, plan, accelerate, and de-
risk multi-cloud migration
Cloud Protect
Cloud Advisory
Cloud Consume
Cloud Connect
Answer:B
determining the business priorities, business capabilities and business solutions that enable the
customer-defined outcomes
strategizing with the sales team on how to empower their sales personnel in attaining business
goals
measuring the efforts of every team in delivering on their promises
delving into the main issues faced by customers and getting feedback from previous work done
Answer:B
whiteboarding
bots
messaging
integrations
Answer:A
10. Which of Cisco's channel routes to market uses automated campaigns driven by customer data to
optimize seller efficiency and productivity?
Digital Touch
Virtual Sales
Partners
Field Sales
Answer:C
11.Which of the following describes the NFV ENCS Virtualized branch?
12.Which of the following are the top three protecting capabilities of Cisco Data Center?
A. The customer can refresh or go to the next tier of hardware and port or upgrade
software at no adinal charge.
B. The customer can refresh hardware in the same tier and port software at no charge
but must purchase new licenses for the next tier of hardware.
C. The customer must purchase entirely new software licenses.
D. The customer can refresh hardware in the same tier and port software at no charge,
or go to the next tier of hardware and just pay the difference for their software.
CEVAP:A
Answer: A
New Question
15.What approach does Cisco take to provide pervasive and comprehensive
security for our customers?
Answer: B
16.Which is a unique capability of Meraki MX?
A. Identity Service Engine, Network Control Platform, and Network Data Platform
B. Identity Service Engine, Network Automation Platform, Encrypted Traffic Analytics
C. Identity Encryption Engine, Network Automation Platform, Network Data Platform
D. Network Control Platform, Network Automation Platform, Network Encryption Platform
Answer: A
18.Which term describes the capability to correlate security information and apply
intelligence in order to understand context?
A. Breadth
B. Integration
C. Sophistication
D. Depth
Answer: B
19.During which phases of protection would Cisco's Next Generation Firewalls be
deployed?
A. After an attack
B. During an attack
C. During and after an attack
D. Before an attack
Answer: D
New Question
20.Which is the management component in Cisco's intent based networking
solution?
A. CloudCenter
B. DNA Center
C. UCS Central
D. UCS Director
Answer: B
21.How is a business outcome defined?
A. A strategy that sets out sales targets and tactics for the business
B. A plan that positions a company's brand or product to gain a competitive advantage
C. A measurable result of an activity or process within the business
D. A process of estimating future sales
Answer: C
A. Fiber-optic networking
B. Multiprotocol routers
C. Wireless networking
D. Remote access devices
Answer: B
A. Hardware-centric design
B. Distributed infrastructure management
C. Integrated third-party applications
D. Unified network fabric
Answer: D
24.Which Cisco cloud-managed solution allows customers to unify management in
a secure, browser-based dashboard?
A. Cisco Hyperflex
B. Cisco UCS
C. Cisco Meraki
D. Cisco Intersight
Answer: C
New Question
25.Which of the following could be defined as a long-term plan that enables the
business to work toward achieving its vision by considering business operations,
value proposition, customers, and finance?
A. Mission
B. Strategy
C. Goals
D. Objectives
Answer: B
Answer: A
Answer: D
Answer: D
Answer: B
Answer: A
Answer: A
Answer: C
A. Values
B. Mission
C. Vision
D. Client engagement
Answer: D
Answer: D
A. Cisco's approach focuses on enabling its sales team with the necessary tools
and products to increases its market share
B. Cisco's approach focuses on differentiating itself as a market leader in security
solutions from a profits centric perspective.
C. Cisco's approach focuses on increasing revenue and reducing costs from a
customer-centric perspective.
D. Cisco's approach focuses on developing a business-focused view of the
customer enterprise looking at needs and business outcomes from a
customer-centric perspective.
Answer: D
Answer: B
Answer: B
42.What is one way that Cisco ONE provides business value to customers?
Answer: A
A. Cisco Jabber
B. Cisco Expressway
C. Cisco Webex Teams
D. Cisco TelePresence MX
Answer: C
44.Which of the following are the top three protecting capabilities of Cisco Data Center?
A. Cisco DNA
B. Cisco Hosted Collaboration Solution
C. Cisco Unified Computing System
D. Cisco Meraki
Answer: A
46.Which of the following describes the benefits of Cisco intelligent automation for
cloud software?
Answer: B
48. Which of the following are included on the Offering Pattern Reference Model?
Answer: C
49.Which of the following are included in Cisco's current networking product lines?
Answer: A
50.Which services make up the Cisco Unified Wireless Network's Mobility Services Framework?
B. Guest Access
G. Guest Acces
I. Security
51.In covering the full attack continuum, which are the proposed solutions after an attack?
Answer: A
52.What key aspect of digitization allows the deployment of new services without lengthy and costly
investments in server or networking infrastructure"?
A. cloud computing
B. streaming services
C. data science
D. Enterprise network architecture
Answer: A
C. customer experience/innovation/fulfillment
Answer: C
54.Which phrase describes the benefits of the Cisco UCS product range?
A. increased productivity, reduced total cost of ownership, and scalability to the data center
B. cloud-based security solution allowing customers to be protected on any device at any location
C. cloud-based service allowing customers to set up and configure an entire virtual data center in
minutes
Answer: A
55.Which of the following are included on the Offering Pattern Reference Model?
Answer: A
B. a mobile endpoint solution designed to connect learns at any time, in any place
D. a service solution that offer business messaging, calling, and persistent meeting spaces E.
providing guest networks for customers, system integrators, and vendors
F. supporting agile software development and deployment processes through a single point
of management
G. establishing transport-independent WAN for lower cost and higher diversity
H. continuous monitoring of the entire network environment in order to detect abnormal wireless
activity
Answer: G
57-Which type of business requirements define the required parameter for a solution?
B. functional requirements
C. transitional requirements
D. technical requirements
Answer: D
58-Which of the following is a key feature of Cisco Data Center?
A. software-defined segmentation
Answer: D
In covering the full attack continuum, which are the proposed solutions after
an attack?
62.which Cisco endpoint is ideal for occasional use specially settings such as
cafeteras?
a.Cisco Ip phone 7800 series
b.Cisco unified IP Phone 6900 series
c.Cisco DX80
d.Cisco Unified SIP Phone 3900 series
Answer: B
63. Which three areas represent the focus of Cisco’s vision on technology?
a.digitization, workplace transformation, and investment protection
b.virtualization, collaboration and investment protection
c. virtualization, investment protection and innovation
d. digitization, workplace transformation, and innovation
Answer: D
ANSWER:D
Answer: A
68.How long is the average ‘’time to detection’’ of a security threat for Cisco’s customers?
A. 17 HOURS
B.4 HOURS
C.3 DAYS
D.48 HOURS
ANSWER:B