1.
Which of these best describes the Cisco Lifecycle Services approach?

 
2.
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)
3.
Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from one machine to a list of targets?
4.
A customer is considering purchasing either a Cisco Catalyst 2960 or Cisco Catalyst Express 500. Which feature can only be found on the Catalyst 2960?
5.
Cisco ASDM provides 16 different graphs that help identify security risks by displaying data about potentially malicious activity. What is one kind of data these graphs show?
6.
On what lower-level transport protocol does CiscoWorks LAN Management Solution rely on and why?
7.
What is one reason you might recommend a solution using only autonomous access points to a customer?
8.
A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4,500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?
9.
Which component of Cisco ASDM provides administrators with a complete system overview and device health statistics at a glance?
10.
Which service component within the prepare phase recommends the appropriate technology strategy to address a business requirement of the customer?