B. Cisco Meraki
B. Cisco Meraki
B. The customer can refresh or go to the next tier of hardware and port or upgrade
software at no additional charge.
C. The customer can refresh hardware in the same tier and port software at no charge but
must purchase new licenses for the next tier of hardware.
D. The customer can refresh hardware in the same tier and port software at no
charge, or go to the next tier hardware and just pay the difference for their software.
2 What approach does Cisco take to provide pervasive and comprehensive security for our
customers?
A. Cisco Intersight
B. Cisco Meraki
C. Cisco UCS
D. Cisco Hyperflex
5 Which Cisco mobile end point application provides instant messaging, voice and
video calls, voice messaging, desktop sharing, conferencing, and presence?
A. Cisco Jabber
B. Cisco TelePresence MX
C. Cisco Webex Teams
D. Cisco Expressway
1 Which of the following is not a factor that drives the target of the business at a
5
customer organization?
A. values
B. client engagement
C. vision
D. mission
A. UCS Director
B. DNA Center
C. UCS Central
D. CloudCenter
1 Which hybrid and public cloud solution services help customers design, plan,
7
accelerate, and de-risk multi-cloud migration?
A. Cloud Connect
B. Cloud Consume
C. Cloud Protect
D. Cloud Advisory
1 Which of the following could be defined as a long-term plan that enables the business
8
to work toward achieving its vision by considering business operations, value
proposition, customers, and finance?
A. Mission
B. Objectives
C. Strategy
D. Goals
1 Which of the Cisco's channel routes to market uses automated campaigns driven by
9
customer data to optimize seller efficiency and productivity?
A. Field Sales
B. Digital Touch
C. Virtual Sales
D. Partners
2 Which phrase describes the benefits of the Cisco UCS product range?
2
A. strategizing with the sales team on how to empower their sales personnel in
attaining business goals
B. measuring the efforts of every team in delivering on their promises
C. delving into the main issues faced by customers and getting feedback from
previous work done
D. determining the business priorities, business capabilities, and
business solutions that enable the customer-defined outcomes
2 Which Cisco network administration product enables the creation and enforcement of
5
security and access policies for a company's connected endpoint devices?
2 In addressing the full attack continuum, what type of capabilities are required before
6
an attack?
2 Which services make up the Cisco Unified Wireless Network's Mobility Services
7
Framework?
2 Which of the following describes the benefits of Cisco Intelligent Automation for
8
Cloud software?
3 Which phrase of Cisco's Sales Cycle involves the presentation of the business case
0
to relevant stakeholders?
A. cloud based
B. unified management
C. threat focused
D. fully integrated
A. a strategy that sets out sales targets and tactics for the business
B. a plan that positions a company's brand of product to gain a competitive
advantage
C. a process of estimating future sales
D. a measureable result of an activity or process within the business
A. Tetration
B. Network Data Platform
C. Identity Services Engine
D. Network Control Platform
3 Which program requires partners to offer at least two cloud or managed services
7
based on Cisco technology?
A. during an attack
B. during and after an attack
C. before an attack
D. after an attack
4 Which type of business requirements define the required parameter for a solution?
1
A. transitional requirements
B. technical requirements
C. general business requirements
D. functional requirements
A. fiber-optic networking
B. multiprotocol routers
C. remote access devices
D. wireless networking
4 What key aspect of digitization allows the deployment of new services without lengthy
4
and costly investments in server or networking infrastructure?
4 Which collaboration product can count meeting participants and provide analytics for
7
usage and resource planning?
A. API-based management
B. Java-API console management
C. carrier grade security for data centers
D. single pane of glass management for full stack branch infrastructure
4 How long is the average "time to detection" of a security threat for Cisco's
9
customers?
A. 3 days
B. 100 days
C. 28 days
D. 17 hours (updated to 3.5 hours)
5 Which term describes the capability to correlate security information and apply
0
intelligence in order to understand context?
A. breadth
B. depth
C. sophistication
D. integration
5 Which networks benefit from the consistent enforcement policies enabled by Cisco's
3
approach to security?
A. bots
B. whiteboarding
C. messaging
D. integrations
A. Cisco BE6k
B. Cisco Jabber
C. Cisco BE7k
D. Cisco UC1k
6 What tool helps the Cisco Business Architect to gain and leverage their knowledge of
0
the customer's business?