Latest Cisco 642-565 Exam Questions Updated By Flydumps New Added Questions

Hi,I just took CCNA 642-565 test and passed with a great score.All examcollection and securitytut dump are no longer valid anymore.I recommend studying Exampass Premium VCE.I can confirm that all Cisco 642-565 new questions appear on my test. Keep up the good work and good luck!

Exam A
QUESTION 1
Which Cisco Security product is used to perform a Security Posture Assessment of client workstations?
A. Adaptive Security Appliance
B. Cisco Security Agent
C. Cisco Security Posture Assessment Tool
D. Cisco NAS Appliance
E. Cisco ACS
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 2
Which three policy types can be assigned to a network user role in the Cisco NAC Appliance architecture? (Choose three.)
A. Allowed IP Address ranges
B. Network Port Scanning Plug-ins
C. VPN and roaming policies
D. Inactivity period
E. Session Duration
F. Minimum Password length
Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 3
Which two components should be included in a network design document? (Choose two.)
A. Complete network blueprint
B. Operating Expense
C. Risk Analysis
D. Configuration for each device
E. Detailed part list
Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 4
DRAG DROP You work as a network engineer at Certkiller .com. Your boss, Miss. Certkiller, is interested in Cisco Security modules. Match the descriptions with the proper module. Use only options that apply.

A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:

QUESTION 5
Which statement is true about the Cisco Security MARS Global Controller?
A. Rules that are created on a Local Controller can be pushed to the Global Controller
B. Most data archiving is done by the Global Controller
C. The Global Controller receives detailed incidents information from the Local Controllers and correlates the incidents between multiple Local Controllers
D. The Global Controller Centrally Manages of a group of Local Controllers
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 6
Which certificates are needed for a device to join a certificate-authenticated network?
A. The Certificates of the device and its peer
B. The Certificates of the certificate authority, the device and the peer
C. The Certificates of the certificate authority and the peer
D. The Certificates of the certificate authority and the device
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 7
Which three Cisco Security products help to prevent application misuse and abuse? (Choose three.)
A. Cisco ASA 5500 Series Adaptive Security Appliances
B. Cisco IOS FW and IPS
C. Cisco Traffic Anomaly Detector
D. Cisco Security Agent
E. Cisco Trust Agent
F. NAC Appliance (Cisco Clean Access)
Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
QUESTION 8
DRAG DROP
You work as a network engineer at Certkiller .com. Your boss, Miss. Certkiller, is interested attack
methodologies. Match the descriptions with the proper methodology.
Use only options that apply.
A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference: QUESTION 9

Which two of these features are integrated security components of the Cisco Adaptive Security Appliance? (Chose two.)
A. VRF-aware firewall
B. Cisco ASA AIP SSM
C. VTI
D. Control Plane Policing
E. Anti-X
F. DMVPN
Correct Answer: BE Section: (none) Explanation
Explanation/Reference:
QUESTION 10
Which of these items is a valid method to verify a network security design?
A. Computer simulation
B. Network audit
C. Sing-off by the operations team
D. Pilot or prototype network
E. Analysis of earlier attacks
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 11
Which three of these security products complement each other to achieve a secure remote-access solution? (Choose three.)
A. Cisco GET VPN
B. Cisco Security MARS
C. URL Filtering Server
D. Cisco Secure Access Control Server
E. NAC Appliance
F. Adaptive Security Appliance
Correct Answer: DEF Section: (none) Explanation
Explanation/Reference:
QUESTION 12
What are two functions of Cisco Security Agent? (Choose two.)
A. Span Filtering
B. Authentication
C. Resource Protection
D. User tracking
E. Control of Executable Content
Correct Answer: CE Section: (none) Explanation
Explanation/Reference:
QUESTION 13
Which two should be included in an analysis of a security posture assessment? (Choose two.)
A. Identification of bottlenecks inside the network
B. Recommendations based on security best practice
C. Identification of critical deficiencies
D. Service offer
E. Detailed action plan
Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 14
Which three of these security products complement each other to achieve a secure-e-banking solution? (Choose three.)
A. Cisco Trust Agent
B. CCA Agent
C. Cisco Security Agent
D. Cisco IOS DMVPN
E. Cisco Intrusion Prevention System
F. Cisco Adaptive Security Appliance

Correct Answer: CEF Section: (none) Explanation
Explanation/Reference:
QUESTION 15
Certkiller .com, wants to implement the PCI Data Security Standard to protect sensitive cardholder information. They are planning to use RSA to ensure data privacy, integrity and origin authentication. Which two of these statements describe features of the RSA keys? (Choose two.)
A. The private key only decrypts
B. The private key both encrypts and decrypts
C. The public key only decrypts
D. The public key both encrypts and decrypts
E. The private key only encrypts
F. The public key only encrypts

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 16
Which three technologies address SO 17799 requirements for unauthorized access prevention? (Choose three.)
A. Cisco Secure Access Control Server
B. 802.1X
C. SSL VPN
D. Network Admission Control
E. Intrusion Prevention System
F. Cisco Security MARS

Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
QUESTION 17
Which two of these features are supported by Cisco Security MARS running software version 4.2.x? (Choose two.)
A. Attack capture and playback
B. Use login authentication using external AAA Server
C. Inline or promiscuous mode operation
D. NetFlow for Network profiling and anomaly detection
E. Role-based access and dashboards
F. Hierarchical Design using global and local controllers

Correct Answer: DF Section: (none) Explanation
Explanation/Reference:
QUESTION 18
Which of these characteristics is a feature of AES?
A. It is not supported by hardware accelerators but runs very fast in software
B. It provides strong encryption and authentication
C. It has a variable key length
D. It should be used with key lengths greater than 1024 bits

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 19
Which protocol should be used to provide secure communications when performing shunning on a network device?
A. SSH
B. Telnet
C. SNMPV2
D. SSL
E. SNMPv3

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 20
DRAG DROP You work as a network engineer at Certkiller .com. Your boss, Miss. Certkiller, is interested in Antivirus software and the Cisco Security Agent. Match the descriptions with the proper module. Use only options that apply.

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference: QUESTION 21

CCNA 642-565 contains a powerful new testing engine that allows you to focus on individual topic areas or take complete, timed exams from CCNA 642-565.The assessment engine also tracks your performance and presents feedback on a module-by-module basis, providing question-by-question CCNA 642-565 to the text and laying out a complete study plan for review.CCNA 642-565 also includes a wealth of hands-on practice exercises and a copy of the CCNA 642-565 network simulation software that allows you to practice your CCNA 642-565 hands-on skills in a virtual lab environment.The CCNA 642-565 supporting website keeps you fully informed of any exam changes