CB Cababilities Flashcards

To learn (61 cards)

1
Q

What type of connectivity does Comcast Business Dedicated Internet provide?

A

It provides a reliable, private path for network traffic and business applications between a customer’s LAN and the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Comcast’s network scalability allows bandwidth to grow from 2 Mbps up to _____ in select areas.

A

400 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary function of Ethernet Private Line (EPL)?

A

It delivers high-performance, point-to-point connectivity between two sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Comcast Business service enables customers to connect all physically distributed locations as an alternative to traditional hub-and-spoke topologies?

A

Ethernet Network Service (ENS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethernet Virtual Private Line (EVPL) offers what type of virtual connection?

A

It provides point-to-multipoint connectivity from a single location to multiple locations from a single provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the Comcast Business Direct2Cloud (D2C) service?

A

It offers a dedicated Layer 2 Ethernet connection from a designated location to a cloud service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Comcast Business Wavelength Services offer dedicated point-to-point optical transport with bandwidth options of 10 Gbps or up to _____.

A

100 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of the stateful firewall offered in Comcast’s security portfolio?

A

It tracks active connections and analyzes incoming traffic to protect the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The DDoS Mitigation Service from Comcast Business is available for which two connectivity types?

A

DI + Managed Router (on-premises) and DI (top-net).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to the security portfolio chart, Unified Security (UTM) on an Advanced SD-WAN connection monitors for which five types of threats?

A

Botnets, Malware, Phishing, Ransomware, and Insider Threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary difference between Endpoint Detection & Response (EDR) and Managed Detection & Response (MDR)?

A

MDR includes continuous monitoring and response from a 24/7 Security Operations Center (SOC) support team, while EDR focuses on the endpoint technology itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Comcast Business VoiceEdge?

A

It is a hosted voice and Unified Communications (UC) solution that serves as an alternative to traditional PBX products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Comcast Business SIP Trunking is a VoIP service that can scale up to _____ concurrent call sessions (CCS).

A

800

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What feature of SIP Trunking automatically reroutes incoming calls to an alternate trunk group in case of a natural disaster or power outage?

A

Destination unreachable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the core offering of the Comcast Business Meraki Technology Stack?

A

An enterprise-grade, cloud-first networking and security platform combining SD-WAN, WiFi, switches, and unified security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Meraki Technology Stack is available in what two management models?

A

It can be either a fully managed or a self-managed (customer-managed) experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a primary benefit of the Meraki Technology Stack’s single dashboard?

A

It provides full-stack visibility with real-time insights and control across SD-WAN, WiFi, switches, and security in a single pane of glass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

One of the key use cases for the Meraki Technology Stack is to achieve cost and performance efficiencies while replacing fixed _____ lines.

A

MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The security built into the Meraki Technology Stack is backed by threat detection and _____ for reliable security.

A

Unified Threat Management (UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the function of Secure Access Service Edge (SASE)?

A

It combines wide-area networking (WAN) and network security services into a single, cloud-based service model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which four security functions are core components of Comcast’s SASE solution?

A

SD-WAN, Firewall as a Service (FWaaS), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Comcast’s Secure Network Edge solution is designed for what type of customer?

A

Small footprint organizations with one or a few standalone locations that need reliable site-to-SaaS and site-to-cloud connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

For midsize customers with multiple locations and site-to-site connectivity needs, which Managed SD-WAN solution is recommended?

A

Managed SD-WAN Secure OTT (Over the Top).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is AIOps used for within Comcast’s SD-WAN and SASE solutions?

A

It is used for AI-enhanced optimization, predicting and helping prevent outages, and providing real-time analytics and Shadow IT discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The Comcast Business Secure Remote Access solution combines endpoint security, connectivity, and management into a turnkey solution for what purpose?
To enable agile, hybrid workforces with secure SD-WAN connectivity from any location.
26
What service provides 24/7 coverage from cyber threat analysts in Comcast's Managed Security solutions?
Security Operations Center (SOC) services.
27
What is the benefit of Endpoint Detection and Response (EDR)?
It helps improve security posture by providing real-time monitoring and detection of threats such as ransomware, malware, and phishing on endpoints.
28
Comcast's SD-WAN is delivered via universal customer premises equipment (uCPE) and can be combined with which types of network underlay?
It can be combined with both Comcast-provided and customer-provided (BYON) underlays.
29
SD-WAN application-aware traffic steering allows for application prioritization and can direct traffic over the _____ path.
optimal
30
According to the Gartner report, what are the two main areas security and risk management (SRM) leaders are concentrating their efforts on for 2025?
Enabling transformation and embedding resilience.
31
What Gartner trend involves decentralizing cyber-risk decision-making to business technologists while maintaining central oversight?
Collaborative Cyber-Risk Management.
32
Why has the management of machine identities become a critical cybersecurity trend?
The rapid growth of nonhuman identities (from cloud services, DevOps, AI) has created an enticing and often unmanaged target for cyber adversaries.
33
What is the core principle of the 'transitioning to cyber resilience' trend?
Shifting from a purely preventative mindset to a 'when, not if' mentality that seeks to minimize the impact of cyber incidents.
34
SRM leaders face a paradox of _____ where they must balance the push to consolidate vendors for simplicity against the need for niche point solutions.
cybersecurity technology optimization
35
According to Gartner, what is a significant organizational risk associated with CISO and security team burnout?
An increased risk of security breaches due to errors and a compromised ability to protect the organization.
36
What is the focus of the 'Tactical AI' trend for cybersecurity programs?
Prioritizing narrower, demonstrable AI use cases with measurable impact over hype-driven, large-scale transformations.
37
The Gartner report states that by 2026, enterprises combining GenAI with an integrated platforms-based architecture in security programs will experience _____ fewer employee-driven cybersecurity incidents.
0.4
38
According to the 'Power of Comcast Business' slide, what is one key advantage of their network?
It is a large, fast, and reliable network combined with global solutions and expanding points of presence (PoPs).
39
What is the purpose of network redundancy as described in the Connectivity Product Brief?
It provides diverse connectivity options to a primary network for business continuity.
40
Comcast Business Dedicated Internet provides symmetrical dedicated bandwidth configurable from 100Mbps to _____.
400 Gbps
41
What is a primary benefit of Comcast Business Ethernet solutions, as mentioned on slide 5 of the connectivity brief?
They can simplify network management with routing, connectivity, and security solutions from a single provider.
42
According to the diagrams, what is a key difference between EPL and EVPL topologies?
EPL is strictly point-to-point (Site 1 to Site 2), whereas EVPL is point-to-multipoint (Site 1 to Sites 2, 3, and 4).
43
What technology allows Direct2Cloud to set up VLANs for direct interface and reliable performance?
A private, Layer 2 Ethernet connection.
44
What technology is used by Wavelength Services to provide a dedicated optical transport network?
Dense wave division multiplexing (DWDM).
45
According to the Secure Network Solutions brief, what is the goal of a 'Unified digital experience'?
To integrate nationwide connectivity and advanced security solutions into a seamless experience.
46
The Meraki dashboard allows for Read/Write access and SD-WAN analytics, including monitoring for VPN Latency, Jitter, & _____.
Usage
47
According to the Meraki brief, Comcast Business is the #1 Provider of _____ according to Vertical Systems Group’s 2024 LEADERBOARD.
Managed SD-WAN
48
According to the 'Business Imperatives' slide, businesses are looking for steady state evolution and a pragmatic vision, not _____.
hype
49
The 'Rapid Technology Evolution' slide notes that cybercrime is projected to cost $10.5 trillion by what year?
2025
50
What is one thing holding organizations back from accelerating digital transformation, according to the presentation template?
Bandwidth constraints that limit processing loads (or disparate networks, lack of cyber defense depth, etc.).
51
The Managed SD-WAN Secure solution is ideal for which type of customer?
Large enterprises with highly tailored network infrastructure and many locations.
52
What does BYON stand for in the context of SD-WAN connectivity?
Bring Your Own Network.
53
In the Secure Network Edge use case, what is the purpose of the Inbound VIP?
To support video cameras for a third-party security monitoring service.
54
Comcast's SASE solution is enabled by technology from which vendor?
Fortinet.
55
What is the purpose of a Managed Cloud Firewall?
To provide next-generation firewall capabilities in the cloud, deploying on-demand POPs for enterprise scalability.
56
What is the primary benefit of Cloud Security services?
They provide the tools, analytics, and security operations needed to detect threats in public cloud infrastructure and SaaS applications.
57
The 'Advanced Managed Services' included with SD-WAN provide an equipment replacement SLA of 24x7x4 for _____ equipment.
On-Net
58
SD-WAN security features include L3/L4 stateful firewall as well as a _____ to encrypt traffic.
VPN
59
According to the Gartner report, GenAI's ability to be trained on an organization's data creates risks that establish the need for _____ solutions.
Data Security Posture Management (DSPM)
60
Why are SRM leaders transitioning from a 'zero-tolerance for failure' mindset to one of cyber resilience?
The 'zero-tolerance' approach has reached its peak in achieving risk buy-down and increases the risk of security team burnout.
61