Free Flydumps Cisco 642-565 Exam VCE And PDF With All New Exam Questions

Passed Cisco 642-565 yesterday on first attempt only using the Exampass premium vce and one corrected answers. Thanks a lot for your valuable update reagding premium dump.It will definitely help me for preparing for the exam before to write.

Exam A QUESTION 1
Drop

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center

QUESTION 2
SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information. They are planning to use RSA to ensure data privacy, integrity, and origin authentication. Which two of these statements describe features of the RSA keys? (Choose two.)
A. The public key only encrypts.
B. The public key only decrypts.
C. The public key both encrypts and decrypts.
D. The private key only encrypts.
E. The private key only decrypts.
F. The private key both encrypts and decrypts.

Correct Answer: CF Section: (none) Explanation
Explanation/Reference:

QUESTION 3
What are two functions of Cisco Security Agent? (Choose two.)
A. authentication
B. control of executable content
C. resource protection
D. spam filtering
E. user tracking
Correct Answer: BC Section: (none) Explanation

Explanation/Reference:
QUESTION 4
Which three policy types can be assigned to a network user role in the Cisco NAC Appliance architecture? (Choose three.)
A. allowed IP address ranges
B. session duration
C. minimum password length
D. VPN and roaming policies
E. inactivity period
F. network port scanning plug-ins

Correct Answer: BDF Section: (none) Explanation
Explanation/Reference:
QUESTION 5
Which of these items is a valid method to verify a network security design?
A. network audit
B. sign-off by the operations team
C. computer simulation
D. analysis of earlier attacks
E. pilot or prototype network

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 6
Drop

A.

B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center

QUESTION 7
Which two components should be included in a detailed design document for a security solution? (Choose two.)
A. data source
B. existing network infrastructure
C. organizational chart
D. proof of concept
E. traffic growth forecast
F. weak-link description

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 8
What are three functions of CSA in helping to secure customer environments? (Choose three.)
A. application control
B. control of executable content
C. identification of vulnerabilities
D. probing of systems for compliance
E. real-time analysis of network traffic
F. system hardening

Correct Answer: ABF Section: (none) Explanation
Explanation/Reference:
QUESTION 9
Which two of these features are key elements of the collaborative security approach? (Choose two.)
A. integration of security features in network equipment
B. Network Admission Control
C. coordinated defense of potential entry points
D. automated event and action filters
E. network behavioral analysis
F. device chaining
Correct Answer: BC Section: (none) Explanation

Explanation/Reference:
QUESTION 10
Which two of these statements describe features of the NAC Appliance architecture. (Choose two.)
A. NAC Appliance Server evaluates the endpoint security information.
B. NAC Appliance Manager determines the appropriate access policy.
C. NAC Appliance Client acts as an authentication proxy for internal user authentication.
D. NAC Appliance Manager acts as an authentication proxy for external authentication servers.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 11
Which three technologies address ISO 17799 requirements for unauthorized access prevention? (Choose three.)
A. Cisco Secure Access Control Server
B. SSL VPN
C. 802.1X
D. Network Admission Control
E. Cisco Security MARS
F. intrusion prevention system

Correct Answer: ACD Section: (none) Explanation
Explanation/Reference:
QUESTION 12
Which certificates are needed for a device to join a certificate-authenticated network?
A. the certificates of the certificate authority and the device
B. the certificates of the device and its peer
C. the certificates of the certificate authority and the peer
D. the certificates of the certificate authority, the device, and the peer

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 13
What allows Cisco Security Agent to block malicious behavior before damage can occur?
A. correlation of network traffic with signatures
B. interception of operating system calls
C. scan of downloaded files for malicious code D. user query and response

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 14
What are three advantages of Cisco Security MARS? (Choose three.)
A. performs automatic mitigation on Layer 2 devices
B. ensures that the user device is not vulnerable
C. fixes vulnerable and infected devices automatically
D. provides rapid profile-based provisioning capabilities
E. is network topology aware
F. contains scalable, distributed event analysis architecture

Correct Answer: AEF Section: (none) Explanation
Explanation/Reference:
QUESTION 15
Which encryption protocol is suitable for an enterprise with standard security requirements?
A. MD5
B. 768-bit RSA encryption
C. AES-128
D. DES
E. SHA-256

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 16
In which two ways do Cisco ASA 5500 Series Adaptive Security Appliances achieve containment and control? (Choose two.)
A. by enabling businesses to create secure connections
B. by preventing unauthorized network access
C. by probing end systems for compliance
D. by tracking the state of all network communications
E. by performing traffic anomaly detection

Correct Answer: BD Section: (none) Explanation
Explanation/Reference: QUESTION 17
Which three of these security products complement each other to achieve a secure e-banking solution? (Choose three.)
A. Cisco IOS DMVPN
B. Cisco Intrusion Prevention System
C. CCA Agent
D. Cisco Adaptive Security Appliance
E. Cisco Security Agent
F. Cisco Trust Agent

Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
QUESTION 18
Which IPS feature models worm behavior and correlates the specific time between events, network behavior, and multiple exploit behavior to more accurately identify and stop worms?
A. Risk Rating
B. Meta Event Generator
C. Security Device Event Exchange support
D. traffic normalization

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 19
Which three elements does the NAC Appliance Agent check on the client machine? (Choose three.)
A. IP address
B. registry keys
C. presence of Cisco Trust Agent
D. presence of Cisco Security Agent
E. Microsoft hotfixes

Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
QUESTION 20
Which of these items is a feature of a system-level approach to security management?
A. single-element management
B. responsibility sharing
C. multiple cross-vendor management platforms
D. high availability
E. complex operations

Correct Answer: D Section: (none) Explanation
Explanation/Reference:

This volume is part of the Exam Certification Guide Series from Cisco 642-565.Cisco 642-565 in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco 642-565 Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as Cisco 642-565 exam day nears.