Cisco 642-565 Questions And Answers, 100% Pass Guarantee Cisco 642-565 Exam Download Online Store

You can pass Cisco 642-565 exam if you get a complete hold of  Cisco 642-565 dumps. What’s more, all the Cisco 642-565 Certification exams Q and A provided by Flydumps is the latest.

QUESTION 50
Which two technologies mitigate the threat of a SYN flood attack? (Choose two.)
A. Cisco IOS IPS
B. MARS flood automitigation
C. ASA TCP Intercept
D. ASA enhanced application inspection
E. NAC Appliance security posture validation
F. Cisco IOS FPM

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 51
Which statement is true about the Cisco Security MARS Global Controller?
A. The Global Controller receives detailed incidents information from the Local Controllers, and correlates the incidents between multiple Local Controllers.
B. The Global Controller centrally manages a group of Local Controllers.
C. Rules that are created on a Local Controller can be pushed to the Global Controller.
D. Most data archiving is done by the Global Controller.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 52
Which two technologies can prevent the Slammer worm from compromising a host? (Choose two.)
A. Cisco IOS IPS
B. ASA stateful firewall
C. ASA enhanced application inspection
D. NAC Appliance security posture validation
E. Cisco IOS FPM
F. Cisco Trust Agent

Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 53
Drop A.

B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center
QUESTION 54
Which two statements are true about symmetric key encryption? (Choose two.)
A. It uses secret-key cryptography.
B. Encryption and decryption use different keys.
C. It is typically used to encrypt the content of a message.
D. RSA is an example of symmetric key encryption
E. The key exchange can take place via a nonsecure channel.

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 55
Which of these protections is a benefit of HMAC?
A. protection against DoS attacks
B. protection against brute-force attacks
C. protection against man-in-the-middle attacks
D. protection from the avalanche effect

Correct Answer: C Section: (none) Explanation
Explanation/Reference: QUESTION 56
Which two are main security drivers? (Choose two.)
A. business needs
B. compliance with company policy
C. increased productivity
D. optimal network operation
E. security legislation

Correct Answer: BE Section: (none) Explanation
Explanation/Reference:
QUESTION 57
Drop

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center
QUESTION 58
Which two of these statements describe features of the NAC Appliance architecture? (Choose two.)
A. The standard NAC Appliance Manager can manage up to 40 NAC Appliance Servers failover pairs.
B. NAC Appliance Servers managed by the same NAC Appliance Manager can run in mixed mode (inline or out-of-band).
C. The NAC Appliance Agent is bundled with the NAC Appliance Server software.
D. NAC Appliance high availability uses VRRP.
E. NAC Appliance Agent has the auto-upgrade feature.

Correct Answer: BE Section: (none) Explanation
Explanation/Reference: QUESTION 59
What are the two main reasons for customers to implement Cisco Clean Access? (Choose two.)
A. enforcement of security policies by making compliance a condition of access
B. focus on validated incidents, not investigating isolated events
C. integrated network intelligence for superior event aggregation, reduction, and correlation
D. provision of secure remote access
E. significant cost savings by automating the process of repairing and updating user machines
F. implementation of NAC phase 1

Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 60
What is the purpose of SNMP community strings when adding reporting devices into a newly installed Cisco Security MARS appliance?
A. to discover and display the full topology
B. to import the device configuration
C. to pull the log information from devices
D. to reconfigure managed devices

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 61
Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)
A. typically used with SPAN on the switches
B. impacts connectivity in case of failure or overload
C. invisible to the attacker
D. increases latency
E. can use stream normalization techniques
F. less vulnerable to evasion techniques than inline mode

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 62
What is the security issue in classic packet filtering of active FTP sessions?
A. The control session cannot be adequately filtered.
B. Allowing control sessions to the client opens up all the high ports on the client.
C. The established keyword cannot be used for control or data sessions.
D. Allowing data sessions to the client opens up all the high ports on the client.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 63
Which three of these features are key elements of the Adaptive Threat Defense? (Choose three.)
A. multilayer intelligence
B. blend of IP and security technologies
C. ability of a network to identify, prevent, and adapt to security threats
D. active management and mitigation
E. dynamic adjustment of risk ratings
F. feature consistency

Correct Answer: ADE Section: (none) Explanation
Explanation/Reference:

This volume is part of the Exam Certification Guide Series from Cisco 642-565. Cisco 642-565 in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco 642-565 Certification candidates identify weaknesses,concentrate their study efforts,and enhance their confidence as Cisco 642-565 exam day nears.