700-755 Dumps

700-755 Braindumps

700-755 Real Questions

700-755 Practice Test

700-755 Actual Questions


killexams.com


Cisco


700-755


Small Business Technical Overview (SBTO)


https://killexams.com/pass4sure/exam-detail/700-755

Which Cisco Catalyst 9100 AP feature adds capacity by automatically changing the access points from 2.4 and 5GHz to Dual 5GHz?


  1. FRA

  2. SMU

  3. CleanAir

  4. wIPS


Answer: A Question: 206

When enabled which two features will help extend the retention capacity of the Meraki MV smart cameras'? (Choose two)


  1. Direct stream-based retention

  2. Schedule-based retention

  3. Hybrid archives

  4. Cloud archives

  5. Motion-based retention


Answer: A,B,E Question: 207

In the event an entire site went down: which activity does Cisco's HyperFlex Stretched Cluster still enable a user to do?


  1. continue VM replication synchronously

  2. access the entire cluster

  3. access only the remaining node or nodes in the cluster

  4. recover lost data


Answer: B Question: 208

What separates Cisco Meraki from its competitors?


  1. kit obtained via promotional seminars can be added and integrated to POC kit to enhance the service offering

  2. the cloud architecture and product experience itself

  3. testing the gear live by attending marketing webmars

  4. dedicated team and the Cisco Meraki sales specialist attend every whiteboarding session to better illustrate complex topics


Answer: B Question: 209

Which two features are included in every licensed MX security appliance as part of its unified threat management

solution'? (Choose two)


  1. Stateless L3/L7 firewalls

  2. OA (change of authorization)

  3. SD-WAN

  4. Umbrella integration (DNS firewall)

  5. Auto VPN (site-to-site VPN)


Answer: A,C,E Question: 210

Which two capabilities are included in the System Manager's robust enterprise mobility management (EMM) feature set? (Choose two)


  1. Rapid provisioning (enrollment)

  2. Emergency broadcast (alerts)

  3. Remote troubleshooting

  4. RFID tag tracking

  5. OS version control


Answer: A,C Question: 211

What is one of the mam functionalities of the Meraki Go mobile app?


  1. used to manage and renew Meraki Go licenses

  2. for opening support tickets with the Meraki Go support team

  3. to assist with the fast onboarding of Meraki Go products

  4. to help reduce the power consumption of network devices


Answer: C Question: 212

Using Cisco Security, what is the remediation time for a previously unknown threat"?


  1. under 10 minutes

  2. under 15 minutes

  3. under 5 minutes

  4. under 8 minutes

  5. under 30 minutes


Answer: A


Explanation:


https://www.cisco.com/c/en/us/products/collateral/security/aag-why-cisco-security-for- sb.html#:~:text=With%20Cisco's%20threat%20intelligence%2C%20you,to%20remediation%20in%20the%20industry.

By how much can Cisco UCS reduce provisioning time?


  1. 6 hours to 1 minute

  2. 12 weeks to 10 minutes

  3. 1 month to 1 hour

  4. 6 months to 2 weeks

  5. 2 weeks to 6 hours


Answer: B Question: 214

What is a function of Cisco Intersight?


  1. Cisco Intersight provides Piatform-as-a-Service management

  2. Cisco Intersight includes a RESTful API to provide full programmability

  3. Cisco Intersight is a great start for core management and simplification

  4. Cisco Intersight automates many tasks including RBAC and reporting of cases to TAC


Answer: D Question: 215

Which two products are considered a part of the Cisco Meraki full stack? (Choose two.)


  1. MX security appliances

  2. MR wireless access points

  3. Catalyst switches

  4. UCS servers

  5. Aironet wireless access points


Answer: A,B Question: 216

Which layout can Cisco Webex flexible video conference support?


  1. active speaker video view where the participant talking will have the most prominent view on the screen

  2. active-active video view where two participants can engage on-screen at the same time

  3. presenter video view where the meeting host shares their desktop on the screen

  4. grid view where the active speaker is visible and other participants show on the bottom strip


Answer: A Question: 217

Which two Cisco Small Business series switches are smart-managed? (Choose two.)


  1. 220

  2. 250

  3. 550X

  4. 350X E. 110


Answer: A,B Question: 218

Which three product families comprise the Meraki Go network stack? (Choose three)


  1. Access points

  2. Security content filters

  3. Network routers

  4. Security gateway and firewall

  5. Network switches


Answer: A,D,E Question: 219

What is the built-in technology on the MR platform that utilizes one-way beacon advertising to interact with applications?


  1. Adaptive Radio Management

  2. BLE (Bluetooth Low Energy)

  3. BeamFlex

  4. Radio Resource Management


Answer: B Question: 220

What are the two most frequent attack vectors used in cyber attacks against small businesses? (Choose two.)


  1. malware

  2. viruses

  3. social engineering

  4. phishing

  5. pop-ups


Answer: A,B,C Question: 221

Which two security tools allow administrators to maximize the security of their Dashboard management accounts'? (Choose two)


  1. Role-based administration

  2. Local (direct) access only policies

  3. Two-factor authentication

  4. Biometric authentication

  5. Captcha challenge-response tests

Answer: A,C Question: 222

What are the three primary operating principles for the entire Webex platform? (Choose three)


  1. Security

  2. Satisfaction

  3. Integration

  4. Simplicity

  5. Transparency

  6. Privacy


Answer: A,E,F Question: 223

Which complete cloud solution product does Cisco offer for customers with less than 1000 users?


  1. Cisco Webex Greenfields Bundle

  2. Cisco Webex A-Flex Bundle

  3. Cisco Webex Work Bundle

  4. Cisco Webex Event Center Bundle


Answer: C Question: 224

What are two of the benefits of leveraging Systems Manager Sentry in a Cisco Meraki full stack"? (Choose two)


  1. efficient management of client VPN settings and Wi-Fi security configurations

  2. helps facilitate the rapid enrollment and onboarding of mobile devices

  3. provides logging and generates consolidated reports of potential security vulnerabilities

  4. entitles the organization to direct access to the SM group within Meraki Support

  5. provides layer 7 application filtering for client network traffic


Answer: A,B