Advanced Security for Account Managers-ASAM



Similar documents
Readiness Assessments: Vital to Secure Mobility

Exam Questions Demo Cisco. Exam Questions Cisco Express Foundation for Field Engineers

Cisco Passguide Exam Questions & Answers

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Secure BYOD Solution

Cisco Actualtests Exam Questions & Answers

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Cisco SecureX Product Brochure

Remote Management Services Portfolio Overview

How To Protect Your Network From Attack From A Network Security Threat

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Cisco TrustSec Solution Overview

Cloud Managed Security with Meraki MX

Requirements When Considering a Next- Generation Firewall

Secure Network Access for Personal Mobile Devices

Unified Threat Management, Managed Security, and the Cloud Services Model

Preemptive security solutions for healthcare

The Cisco ASA 5500 as a Superior Firewall Solution

Cisco Unified Workforce Optimization for Cisco Unified Contact Center Express

Bring Your Own Device

Implementing Cisco IOS Network Security

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence

Implementing Cisco IOS Network Security v2.0 (IINS)

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco Unified Access Technology Overview: Converged Access

Cisco ISR Web Security with Cisco ScanSafe

Emerging Trends in the Network Security Market in India, CY 2013

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Information Technology Strategic Plan

Meraki 2015 Solution Brochure

What Is Cisco Mobile Workspace Solution?

MSP Relevance. MSP Relevance. the Era of Cloud Computing. the Era of Cloud Computing. Brought to You By: A Channel Company White White Paper Paper

IPS AIM for Cisco Integrated Services Routers

How WAN Design Needs to Change

A Mock RFI for a SD-WAN

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Cisco Advanced Routing and Switching for Field Engineers - ARSFE

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Preparing your network for the mobile onslaught

BYOD(evice) without BYOI(nsecurity)

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

Deploying Firewalls Throughout Your Organization

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013

E-Guide. Sponsored By:

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Security Practices for Online Collaboration and Social Media

Network Virtualization

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Symantec Client Management Suite 8.0

IINS Implementing Cisco Network Security 3.0 (IINS)

CISCO EXAM QUESTIONS & ANSWERS

NX 9500 INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD

IBM EXAM QUESTIONS & ANSWERS

Cisco Security Intelligence Operations

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Delivering Control with Context Across the Extended Network

Securing the Small Business Network. Keeping up with the changing threat landscape

Top 10 Reasons Enterprises are Moving Security to the Cloud

The Fortinet Secure Health Architecture

Managed Security Services for Data

Secure Your Mobile Device Access with Cisco BYOD Solutions

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Brocade and McAfee Change the Secure Networking Landscape with High Performance at Lowest TCO

Cisco Cloud Web Security

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015

Securing Virtual Applications and Servers

Threat-Centric Security for Service Providers

Cisco ASA 5500 Series Firewall Edition for the Enterprise

Braindumps QA

Cisco and VMware Virtualization Planning and Design Service

Business Case for a DDoS Consolidated Solution

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Cisco Threat Defense for Borderless Networks

Symantec Mobile Management 7.2

Cisco IOS Advanced Firewall

Cisco s BYOD / Mobility

The Next Generation Network:

Transcription:

Advanced Security for Account Managers-ASAM Number: 646-580 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/

Exam A QUESTION 1 What are three major trends that fuel the demand for security? (Choose three.) A. mobility B. collaboration C. bandwidth optimization D. cloud E. IT standardization Correct Answer: ABD /Reference: QUESTION 2 What does not need to be considered in regard to the customer's workflow? A. how the customer securely accesses the online software solutions B. the number of antivirus products that are in use on the customer's network C. how the service partner can securely use outsourced engineers D. how the service engineer accesses customer and service company information Correct Answer: B /Reference: QUESTION 3 Which three statements accurately describe the evolution of the workplace and its impact on security? (Choose three.) A. Mobility causes location borders to shift. B. Cloud services cause end-user locations to shift. C. Cloud services cause application borders to shift. D. IT consumerization causes location borders to shift. E. IT consumerization causes device borders to shift. Correct Answer: ABE /Reference: QUESTION 4 Which two statements best describe the challenges that customers encounter when providing services in a borderless world? (Choose two.) A. how to secure standardized end-user equipment

B. how to manage security C. how to access cloud applications and data securely D. how to secure access within the company network E. the type of WAN to deploy Correct Answer: BC /Reference: QUESTION 5 What are two security effects of BYOD? (Choose two.) A. TCO is reduced because employees use their privately owned devices. B. Corporate content must be secured on devices that are owned by employees. C. Numerous new devices must be securely integrated into the corporate infrastructure. D. Corporate users expect the same look and feel when using their own devices. Correct Answer: BC /Reference: QUESTION 6 Which statement best describes the impact of cloud applications? http://www.gratisexam.com/ A. Moving applications to the cloud simplifies security. B. Access to cloud applications is only possible from dedicated endpoints. C. There is no need to inspect data coming from the cloud for malicious content. D. Using cloud services causes loss of control, which needs to be addressed by additional security measures. Correct Answer: D /Reference: QUESTION 7 Which statement is true regarding the security of IPv6? A. IPsec is an integrated part of IPv6 and, therefore, all IP-related security threats are eliminated when using an IPv6-only network.

B. Existing IPv4 firewalls can secure IPv6 traffic if IPv6 is tunneled over IPv4. C. Existing IPv4 firewalls can secure IPv6 traffic unless IPv6 is tunneled over IPv4. D. Endpoints that tunnel IPv6 over IPv4 can traverse firewalls without inspection of the IPv6 traffic. Correct Answer: D /Reference: QUESTION 8 What is a major challenge in the retail market? A. supply chain reduction B. enabling IPsec VPN connectivity to the customers C. securing critical data, such as payment information D. sharing confidential content with customers Correct Answer: C /Reference: QUESTION 9 What are two requirements to enable centralized PoS applications? (Choose two.) A. physical security at the stores B. IP surveillance at the stores C. secure network infrastructure D. implementing intrusion prevention at the network edge of the stores E. reliable and highly available network infrastructure Correct Answer: CE /Reference: QUESTION 10 What is a major challenge of manufacturing markets? A. managing global supply chains B. creating a comprehensive learning experience C. securing online payment information D. sharing confidential content with a large audience Correct Answer: B /Reference:

QUESTION 11 What are two challenges that are specific to the education market? (Choose two.) A. share confidential content securely with a large audience B. create a comprehensive learning experience C. manage global supply chains D. high capital expenditure E. global competition Correct Answer: AB /Reference: QUESTION 12 Which vertical segment is most affected by operating regulatory requirements? A. education B. finance C. anufacturing D. etail Correct Answer: B /Reference: QUESTION 13 What are the three main drivers for changing operations? (Choose three.) A. change of market trends B. change of competition C. change of application software version D. change of relative strengths E. change of networking equipment in the network F. change of ISP G. change of internal collaboration solutions Correct Answer: ABD /Reference: QUESTION 14 What are two common requirements of most tasks in business processes? (Choose two.) A. interaction

B. sharing office spaces C. collaboration D. globalization E. managing external resources Correct Answer: AC /Reference: QUESTION 15 Which statement correctly describes the relevance of security within a business process? A. In order to create a streamlined business process, all devices and applications must be integrated securely and reliably. B. Each business process on its own relies on a small fragment of the overall security implementation. C. Operations are a key enabler of security. D. Security is influenced by quality, performance, cost, and time of a business process. Correct Answer: A /Reference: QUESTION 16 From a business perspective, what is the main advantage of Cisco security architecture? A. ability to maintain high operational agility while changes to operations, processes, staff, and infrastructure occur B. ease of management C. reduction of TCO D. ability to easily adapt business processes based on changes in the security architecture Correct Answer: A /Reference: QUESTION 17 What are two major differentiators between Cisco and the competition? (Choose two.) A. BYOD architecture B. Cisco SecureX architecture and services C. Cisco Secure ACS D. Cisco TrustSec E. Cisco ASA Correct Answer: BD

/Reference: QUESTION 18 Which two statements are true regarding Cisco leadership in security technologies? (Choose two.) A. Cisco is the market leader in enterprise security revenue. B. Gartner evaluated Cisco as the leader in IP surveillance, SSL VPN, and email security. C. Gartner evaluated Cisco as the leader in SSL VPN, secure web gateway, network access D. Cisco has a background of more than 25 years of proven firewall development. Correct Answer: AC /Reference: QUESTION 19 Which two statements best describe an enterprise architecture? (Choose two.) A. The organizing logic for business processes and IT infrastructure reflects the integration and standardization requirements of the company's operating model. B. The organizing logic for business processes and communication paths reflect the requirements of the company's operational model. C. The alignment of various elements and systems into one holistic entity. D. The operating model is the desired state of business process integration and business process standardization for delivering goods and services to customers. E. The operational model is the desired state of the IT infrastructure that is required for delivering goods and services. Correct Answer: AD /Reference: QUESTION 20 What are three foundational principles of Cisco SecureX Architecture? (Choose three.) A. network management B. content access control C. context-aware security enforcement D. virtual office management E. network and global intelligence F. context-aware policy G. virtual security Correct Answer: CEF

/Reference: QUESTION 21 Which two statements describe Cisco Security Intelligence Operations? (Choose two.) A. Cisco Security Intelligence Operations is a service that is included with initial product purchases and SMARTnet support contracts. B. Cisco Security Intelligence Operations is a free service. C. Cisco Security Intelligence Operations collects real-time security information from sensors that are deployed across the globe. D. Security data is collected, collated, and processed at sensors, and identified threats are reported to Cisco security operations centers. Correct Answer: AC /Reference: QUESTION 22 What is the role of Cisco AnyConnect in a borderless network? A. Cisco AnyConnect is the network component that provides access control to switch ports. B. Cisco AnyConnect enables secure, reliable, and seamless connectivity of authorized devices within the borderless network. C. Cisco AnyConnect enables malicious content to be filtered from HTTP traffic. D. Cisco AnyConnect is a host intrusion prevention application that includes a personal firewall. Correct Answer: B /Reference: QUESTION 23 Which two statements apply to a collaboration architecture that is integrated with Cisco SecureX? (Choose two.) A. Security services are available at the network level. B. Security services are available for collaboration appliances only. C. Security services are available for collaboration services. D. Security services are not available for client services. E. Cisco AnyConnect does not support secure connectivity to enable access to collaborative applications from mobile devices. Correct Answer: AC /Reference: QUESTION 24

What are two core components of a highly secure Cisco BYOD solution? (Choose two.) A. mobile code B. diverse access infrastructure C. contextual policy D. complex management E. efficient and seamless security Correct Answer: CE /Reference: QUESTION 25 What are four advanced BYOD use cases? (Choose four.) A. guest Wi-Fi B. corporate Wi-Fi C. personal mobile device with profiling and provisioning D. VPN access E. mobile mail F. wired BYOD G. mobile voice and video access Correct Answer: CDFG /Reference: QUESTION 26 What is the primary requirement for collaboration and social media? A. enabling BYOD transformation B. protecting network edges C. authorizing content use D. securing cloud transition Correct Answer: C /Reference: QUESTION 27 What are two driving factors for implementing an open, yet secure, network solution? (Choose two.) A. the need for lower TCO B. the need to access the Internet and cloud-based services from within the enterprise C. the need to access assets that are located within the enterprise from remote locations

D. the need for less downtime E. the need to access assets within the enterprise from office desks Correct Answer: BC /Reference: QUESTION 28 Which two statements are correct concerning Cisco Validated Design? (Choose two.) A. Cisco Validated Design consists of systems that are designed, tested, and documented to facilitate and improve customer deployments. B. Cisco Validated Design incorporates a limited range of technologies and products into a portfolio of solutions that have been developed to address the business needs of customers. C. The design zone for security cannot offer validated designs for several categories. D. SMARTnet provides access to a demonstration lab for each validated design. Correct Answer: AC /Reference: QUESTION 29 Which two statements are true about Cisco Smart Business Architecture? (Choose two.) A. Cisco Smart Business Architecture shifts the view from short term and tactical to long term and strategic. B. Cisco Smart Business Architecture protects IT investments by making sure that all spending is linked to a long-term return on investment. C. Cisco Smart Business Architecture helps build a comprehensive, unified architecture that matches current and future demands. D. Cisco Smart Business Architecture guides are interactive, allowing step-by-step creation of designs that fit individual requirements.embedded Cisco Smart Business Architecture maps are available for download at each step. E. Cisco Smart Business Architecture framework supports enterprise network design without remote locations. Correct Answer: AC /Reference: QUESTION 30 What are two business values of Cisco Validated Design and Cisco Smart Business Architecture? (Choose two.) A. cost reduction B. vision C. agility D. redundancy

Correct Answer: AC /Reference: QUESTION 31 What are two driving factors for new security challenges? (Choose two.) A. increasing number of security patches distributed by operating system vendors B. increasing number of outdated encryption algorithms C. increasing number of attacks from inside the network D. increasing number of employee-owned devices accessing the corporate network E. adoption of virtualization and cloud services Correct Answer: DE /Reference: QUESTION 32 What is the best measure to cope with the new security challenges that are derived from borderless networks? A. Identify new potential entry points of attacks and deploy the appropriate security solutions at the corresponding network access point. B. Identify the vulnerabilities of newly deployed services and protect them at the appropriate point device. C. Move to a more architectural approach of security. D. Update existing security products to the latest hardware and software versions. Correct Answer: C /Reference: QUESTION 33 What are four major solution areas of Cisco SecureX Architecture? (Choose four.) A. secure network and branch B. secure access C. secure mobility D. secure data center and cloud E. secure management F. secure WAN Correct Answer: ABCD /Reference:

QUESTION 34 Which security challenge applies specifically to data center and cloud computing environments? A. lack of IEEE 802.1X support in most of the components B. cloud high availability C. lack of scaling demands D. lack of expertise on how to secure virtual and dynamic environments Correct Answer: D /Reference: QUESTION 35 What are two security products and solutions in the Cisco data center security portfolio? (Choose two.) A. Cisco IP Phone VPN B. Cisco Virtual Security Gateway C. Cisco Nexus 1000V Switch D. Context-Based Access Control Correct Answer: BC /Reference: QUESTION 36 Which product provides zone-based and policy-driven security via a virtual firewall? A. Cisco Virtual Security Gateway B. Cisco ASA 5505v C. Cisco Nexus 1000V D. IPS sensor Correct Answer: A /Reference: QUESTION 37 Which statement correctly describes Cisco VXI security? A. Cisco Virtual Security Gateway protects the virtual environment within the data center. B. Cisco IOS security features secure the data center to defend against unauthorized access. C. Cisco ScanSafe establishes trust between an authorized client and the data center. D. Cisco VXI offers a holistic approach to VDI for customers, but does not include a high-quality rich-media experience.

Correct Answer: A /Reference: QUESTION 38 What are two security challenges of the distributed edge? (Choose two.) A. limited user awareness B. exponential growth in bandwidth C. limited device awareness D. easy policy consistency enforcement E. Internet connectivity redundancy Correct Answer: AC /Reference: QUESTION 39 What are five devices that are suitable to protect the branch and the distributed edge? (Choose five.) A. Cisco ASA B. Cisco IPS C. Cisco IronPort Web Security Appliance D. Cisco Virtual Security Gateway E. Cisco ISR G2 F. Cisco ScanSafe G. SaaS Gateway Correct Answer: ABCEF /Reference: QUESTION 40 What are two security-related challenges in a BYOD mobility environment? (Choose two.) A. internal security audit B. government-defined security compliance C. data loss, stolen devices D. authorized access E. battery lifetime F. IPv6 versus IPv4 TCP/IP stack on the device Correct Answer: CD

/Reference: QUESTION 41 What are three services that are provided to a mobility environment by the Cisco AnyConnect Secure Mobility Solution? (Choose three.) A. comprehensive policy enforcement B. granular policy controls C. secure connectivity D. built-in antivirus software E. host intrusion prevention system Correct Answer: ABC /Reference: QUESTION 42 Which two challenges are related to secure mobile access? (Choose two.) A. Context-Based Access Control B. increased computational requirements in the data center C. policy-based decision whether data need to be secured D. increased TCO E. determine, based on operating system, whether data needs to be secured Correct Answer: AC /Reference: QUESTION 43 Which statement best describes Cisco TrustSec? A. Cisco TrustSec is a Cisco security solution that comprises Cisco Identity Service Engine and Cisco Security Agent. B. Cisco TrustSec is a solution that offers integrated posture, profiling, and guest services to make contextaware access control decisions. C. Cisco TrustSec is an appliance that offers integrated posture, profiling, and guest services to make contextaware access control decisions. D. Cisco TrustSec is a Cisco security product that mitigates security risks by providing comprehensive visibility into who and what is connecting across the entire network infrastructure, as well as exceptional control over what and where they can go. Correct Answer: B

/Reference: QUESTION 44 What is the role of the Cisco AnyConnect Secure Mobile Solution in a mobility environment using Cisco TrustSec? A. Cisco AnyConnect is a unified client that provides secure and intelligent always-on connectivity.the Cisco AnyConnect Secure Mobile Solution automatically detects the networking environment and applies an appropriate security policy. B. Cisco AnyConnect is a client for PCs and laptops, providing secure and intelligent always-on connectivity.the Cisco AnyConnect Secure Mobile Solution automatically detects the networking environment and applies an appropriate security policy. C. Cisco AnyConnect is a unified client that provides secure and intelligent always-on connectivity.the Cisco AnyConnect Secure Mobile Solution natively provides comprehensive security features. D. Cisco AnyConnect is a client for smart phones and tablets only, providing secure and intelligent always-on connectivity.cisco AnyConnect supports Cisco ScanSafe web security to protect mobile devices from malicious web content and threats. Correct Answer: A /Reference: QUESTION 45 Which of these is not a key point when selling security solutions? A. being aware of market trends and challenges B. identifying the stakeholders C. asking the right questions D. understanding all the technical details of the new features at the bit level Correct Answer: D /Reference: QUESTION 46 What are three important components of a business plan? (Choose three.) A. implementation plan B. design of the technical solution, Bill of Materials C. impact on business, key performance indicators D. updated security policy E. value creation Correct Answer: BCE /Reference:

QUESTION 47 Which statement best describes total cost of ownership? A. TCO is the sum of all capital expenditures. B. TCO consists of direct costs (CapEx) and indirect costs, such as labor and training. C. TCO consists of direct costs (CapEx) and indirect costs, such as training, user productivity, competitive advantage, and potential of growth. D. TCO is relevant to the finance manager only. Correct Answer: B /Reference: QUESTION 48 Which statement is true regarding TCO calculations? A. Different stakeholders have the same expectations regarding the TCO calculation. B. Cisco Capital financing offers is a service that provides simple budgeting services and helps customers to convert OpEx to CapEx. C. Business benefits that are beyond the TCO and cannot be measured exactly should not be part of the TCO calculation and therefore should not be presented to the customer. D. Account managers should emphasize strategic values of Cisco SecureX by showing how Cisco SecureX supports the main current market transitions (mobility, collaboration, cloud services, and IT consumerization). Correct Answer: D /Reference: QUESTION 49 Customers might believe that a multivendor solution that is the best product in its category allows more choices and is generally cheaper.what is the weakest argument against this belief? A. The maximum TCO premium of Cisco over other vendors, in most cases, is not more than 7 percent due to IT savings and extended product lifecycles.in addition, Cisco SecureX provides architectural benefits. B. Labor constitutes up to 50 percent of TCO and Cisco delivers 5 to 10 percent labor savings driven by the Cisco end-to-end security approach and single-vendor platform. C. The Cisco architectural approach delivers quality solutions that include improved network uptime, higher user productivity, and lower threat of security breaches. D. Cisco addresses the higher costs with Cisco Capital financing offers. Correct Answer: D /Reference: QUESTION 50

Considering the large number of security vendors, customers may be confused about the role that Cisco has in this market.which two statements correctly describe the Cisco market share? (Choose two.) A. With a market share of more than 20 percent, Cisco is the leader in security appliances and software. B. With a market share of more than 30 percent, Cisco is second in security appliances and software. C. In addition to the security-related products, Cisco SecureX Architecture fully integrates all architectures across the widest networking, collaboration, and data center portfolio in the marketplace. D. Considering Cisco security-related products and security services, the Cisco market share is more than 85 percent. Correct Answer: AC /Reference: QUESTION 51 Business priorities, or customer pain points, are what influence most customer decisions.cisco Smart Services address which three critical business priorities? (Choose three.) A. increase operational efficiency B. deliver training C. improve network availability, compliance, and security D. enable business agility E. organize files F. improve customer satisfaction Correct Answer: ACD /Reference: QUESTION 52 Cisco Collaborative Professional Services allows partners to combine their resources with Cisco assets to perform which three tasks? (Choose three.) A. expand or augment partner professional services B. increase customer satisfaction C. encourage high-margin service revenues D. enable sales of complex networks and architectures E. shift focus to Cisco F. replace partner services Correct Answer: ACD /Reference: QUESTION 53 What are three advantages of a Cisco smart-enabled network? (Choose three.)

A. capture of real-time data B. identification of stresses and potential points of failure C. excessive device monitoring cost D. complex asset and contract management E. time to resolution increases F. reduction of business disruption and internal customer support Correct Answer: ABF /Reference: QUESTION 54 What are four capabilities that are inherent to all Cisco Smart Services? (Choose four.) A. installed base management B. alerts C. device diagnostics D. smart interactions E. 24-hour network monitoring F. trending analysis Correct Answer: ABCD /Reference: QUESTION 55 What are three value statements of SMARTnet Total Care? (Choose three.) A. It provides a more accurate picture of the installed base. B. It reduces administrative effort at time of renewal. C. It eliminates the need for foundational technical support. D. It provides improved risk management. E. It provides professional services assistance. F. It includes network assessment services. Correct Answer: ABD /Reference: QUESTION 56 What are three important indicators or drivers for a Cisco Network Optimization Service engagement? (Choose three.) A. no changes to the customer network

B. issues with network stability C. new technologies that might be disruptive to the network D. acquisition of a new company and in need of merging IT infrastructures E. fast, reliable, easy-to-complete network audits F. ample IT staff to conduct extensive trending and benchmarking analysis Correct Answer: BCD /Reference: http://www.gratisexam.com/