What are two customer benefits of Cisco Catalyst SMB switches? (Choose two.)
Correct Answer: AB
Cisco Catalyst SMB switches offer a logical upgrade and replacement for the Cisco Catalyst 2960-Plus switches at the same price point, making them an attractive option for existing users of the older model looking to maintain their budget while upgrading their infrastructure. Additionally, these switches have a cool, quiet, fan-less design, which is ideal for environments such as labs, open spaces, and workplaces where noise can be a concern.
Which feature of the Cisco Catalyst 1000 series switch supports critical IoT endpoints and medical devices?
Correct Answer: A
Perpetual PoE (Power over Ethernet) is a feature that supports critical IoT endpoints and medical devices by ensuring that power is continuously supplied even when the switch is rebooting or undergoing maintenance. This minimizes downtime and ensures that vital devices remain operational without interruption.
Which Cisco Catalyst 9800 controller supports the SD-Access deployment mode only?
Correct Answer: A
The correct answer is Embedded Wireless on a Switch. The Cisco Catalyst Embedded Wireless Controller is specifically designed to operate exclusively within an SD-Access infrastructure, making it the appropriate choice for supporting the SD-Access deployment mode only.
Which tool deploys and manages Cisco Business Products from end-to-end?
Correct Answer: A
Cisco Business Dashboard (CBD) is specifically designed to deploy and manage Cisco Business Products from end-to-end. It provides an intuitive interface and comprehensive tools for monitoring, managing, and optimizing business networks, which makes it the appropriate choice among the given options.
What are the two most frequent attack vectors used in cyber attacks against small businesses? (Choose two.)
Correct Answer: BD
The two most frequent attack vectors used in cyber attacks against small businesses are social engineering and phishing. Social engineering involves manipulating individuals into divulging confidential information or performing actions that compromise security. Phishing is a type of social engineering attack that typically uses email, advertisements, or sites that look similar to those that users already trust, to trick individuals into providing sensitive information. Both vectors are commonly exploited due to the human element involved, making them particularly effective against small businesses.