Category: Cisco
Welcome to download the newest Pass4itsure 70-470 dumps
FLYDUMPS Cisco 642-384 is to start from the basics, then gradually deepening the focus on the content of the curriculum, which generally takes a lot of study time. You are probably also hesitant; after all, to participate in the Cisco 642-384 exam, it takes a lot of time and money. However, once choose FLYDUMPS Cisco 642-384 exam sample questions, you can save both time and money in your Cisco 642-384 exam. FLYDUMPS provide a convenient way to learn. FLYDUMPS Cisco 642-384 exam sample questions can help you quickly through Cisco 642-384 exam. By way of simulation questions, FLYDUMPS Cisco 642-384 exam sample questions help you understand all test points, and includes multiple-choice questions and experimental operation part of the Cisco 642-384 exam.
QUESTION 132
Which command assigns a cost value of “17” to a switch port?
A. spanning-tree interfacefastethernet 5/8 17
B. spanning-treeportcost 17
C. spanning-treeportcost 17
D. spanning-treevlan 1 cost 17
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 133
You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted interface. You suspect that the rule may be blocking necessary traffic onto the network. What must you do to delete that rule when using Cisco Router and Security Device Manager?
A. Select ACL Editor > Access Rules to delete the rule.
B. You must remove the association between the rule and the interface before deleting the rule
C. You must delete the associated access list on the interface, then reconfigure the access list as required, and then reapply the access group to the proper interface.
D. Go to the Edit Firewall Policy tab to delete the rule.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 134
A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling and both radios set at 20 mW. The wireless bridges are not able to establish or maintain a link.
What is needed to successfully complete this link?
A. An amplifier needs to be installed at one of the sites.
B. The antenna must be raised high enough to clear the trees
C. Lower loss cabling needs to be used to bring the EIRP into legal limits.
D. Due to the trees, a 21-dBi dish needs to be used for its narrower beam width.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 135
You connect via Telnet to a Cisco access point and enter the command show dot11 link test. Which output might you obtain?
A. signal-to-noise ratio
B. incoming and outgoing signal strength
C. TX packets dropped
D. RX packets per second
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 136
Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the sitE.to-site VPN between Router A and Router B.
What is the mostly likely cause of this fault?
A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150-199).
B. The IKE encryption methods on the two routers are different
C. the IPSec policy map names on the two routers are different.
D. the IPSec rules on the two routers are not permitting the Answer: interesting traffic.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 137
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.
How many active VPN clients are currently connected to the 1841 ISR router?
A. 0
B. 1
C. 2
D. 3
E. 4
F. 5
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 138
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.
Which IP address or address range will be used when allocating an internal IP address to the VPN clients
for the “test” VPN group?________________________________________________________________________
A. 10.1.1.100 to 10.1.1.200 I
B. 10.1-1.2 to 10.1.1.254
C. 192.168.1.1 to 192.168.1.100
D. 192.168.1.2 to 192.168.1.254
E. 192.168.1.1
F. 192.168.1.2
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 139
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.
Which authentication method is used by the test” VPN group?
A. RSA Encrypted Nounce
B. RSA Digital Signature
C. PrE.Shared Key
D. Digital Certificate
E. DH2
Correct Answer: C Section: (none) Explanation
Explanation/Reference: QUESTION 140
You are the network consultant. You have a customer with a small network of 15 remote sites is trying to optimize its VPN by migrating some remote sites using Frame Relay connections to the Internet to using cable connections to the Internet. The keypoint for your customer is to save money. Only a moderate amount of IP traffic is passing through the network, most of which is from the remote sites to the central site. IPSec should be used to provide VPN functionality and basic confidentiality is desired..Considering the above requirements. Which solution would be the easiest for this customer to set up and manage?
A. point-to-point
B. partial mesh
C. point-to-multipoint
D. hub-and-spoke
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 141
In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?
A. The WCS sends excessive traffic to the rogue thus overloading the access point.
B. The rogue MAC address is used to spoof broadcastdeassociation packets.
C. The rogue MAC address is used to spoof broadcastdeauthentication packets.
D. The WCS sends out excessive signals on the same channel when the rogue is detected.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 142
With industry-leading services and performance, the Cisco Catalyst 6500 Series Switch is Cisco’s flagship switching solution. It delivers the most comprehensive feature sets for core, distribution, wiring closet, data center, enterprise WAN routing, and Metro-Ethernet deployments. Which layer you think is recommended that the Cisco Catalyst 6500 Series WLSM be placed?
A. core
B. distribution
C. access
D. presentation
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 143
The Cisco Lifecycle Services approach defines the activities needed to help you successfully deploy and operate Cisco technologies and optimize their performance throughout the lifecycle of your network. Which statement is an accurate list of Cisco Lifecycle Services phases?
A. initiation, prepare, plan, design, implement, operate, and optimize
B. site assessment, risk assessment, solution selection and acquisition, testing, and operations
C. prepare, plan, design, implement, operate, and optimize
D. deployment, testing, implementation, and production
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 144
Which IP address or address range will be used when allocating an internal ip address to the VPN client for the test
A. 120.1.1.100 to 10.1.1.200
B. 10.1.1.2 to 10.1.1.254
C. 192.1681.1 to 192.1681.1.100
D. 192.1681.2 to 192.1681.1.254
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 145
Which authentication method is used by the test VPN group?
A. RSA EncryptedNounce
B. RSA Digital Signature
C. Pre-shared key
D. DH2
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 146
A network administrator is troubleshooting an EIGRP connection between RA and RB. Given the debug output on RA, which two statements are true?(Choose two)
A. RA received a hello packet with mismatched hello timers.
B. RA received a hello packet with mismatched metric-calculation mechanisms.
C. RA will form an adjacency with RB.
D. RAwill not form an adjacency with RB.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 147
You are the network administrator. There is one Gigabit Ethernet port on the Cisco CE520 used in the Smart Business Communications System. Which port role assignment would you make for?
A. Cisco Express 520
B. Cisco UC520
C. Cisco CE520
D. Cisco 871W
Correct Answer: B Section: (none) Explanation Explanation/Reference:
QUESTION 148
Refer to the exhibit. CK-SA and CK-SC are running PVST+ STP, and CK-SB is running 802.1 Q STP. If the BPDU of the root in VLAN 1 is better than the BPDU of the root in VU\N 2, then there is no blocking port in the VLAN 2 topology. The BPDU of VU\N 2 never makes a “full circle” around the topology; it is replaced by the VLAN 1 BPDU on the CK-SB-CK-SC link, because CK-SB runs only one STP merged with VU\N 1 STP of PVST+. Thus, there is a forwarding loop.
What does PVST+ do to correct this?
A. CK-SA sends PVST+ BPDUs ofVLAU 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
B. CK-SB sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SA) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
C. CK-SC sends PVST+BPDUsofVU\N 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SAwill put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
D. CK-SA sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SB) towards CK-SB. CK-SA will put port CK-C-CK-B into a type-inconsistent state, which prevents the loop.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 149
A wireless autonomous 1200 access point running core feature set in root mode has its SSID set to Factory_floor and provides connection to a repeater access point with its SSID set to factory_floor, if the root-mode access point is using channel 11 which channel will the repeater access point use?
A. channel 11
B. channel 1 or 6
C. anynonoverlapping channel
D. The root access point and the repeater will negotiate this setting
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 150
The VPN server uses a preshared key for remote device authentication
A. TRUE
B. FALSE
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 151
A customer with a large enterprise network wants to allow employees to work from home over the Internet. The customer anticipates a large amount of traffic, predominantly toward the central site. The customer also requires a VPN using strong user authentication and encryption to protect highly sensitive data. Which solution best meets this customer’s requirements?
A. remote-access VPN with software encryption
B. remote-access VPN with hardware encryption
C. site-to-site VPN with hub-and-spoke tunnels using 3DES and pre-shared secrets
D. site-to-site Cisco Easy VPN
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 152
The tables contain information from the Cisco Router and Security Device Manager configurations of RA and RB. Traffic between PC1 and PC2 is not successfully establishing the site-to-site VPN between -RA and -RB. What is the mostly likely cause of this fault?
A. RAis using a standard IP ACL (100-149) while RB is using a Turbo ACL(150-199).
B. The IPSec encryption methods used by each router do not match.
C. The D-H Group settings on the two routers are the same.
D. The IPSec rules on the two routers are not permitting the correct interesting traffic.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 153
You are the network consultant. When will you assess a customer’s current network infrastructure?
A. plan
B. design
C. operate
D. optimize
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 154
A client is experiencing lower throughput and more packet retransmits is one area of the wireless network. At these times, the client utility shows high signal strength but low signal quality. What may be causing this issue?
A. The client does not support Cisco Compatible Extensions version 2.
B. Diversity is not enabled in the access point.
C. The WDS is failing to register the client card in the WLSM.
D. The channel is set incorrectly in the access point or in the client configuration.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 155
Which statement is correct about the current address translation configurations on the security appliance?
A. Dynamic NAT is used to translate the 10.0.1.100 host on the inside interface to a global address of
192.168.1.1
B. Port AddressTranslation(PAT) is used to translate any host on the inside interface to the 192.168.1.100 global address.
C. Static NAT is used to translate the 172.16.1.2 host on thedmzl interface to a global address of
192.168.1.102
D. Dynamic NAT is used to translate any host ondmzl and dmz2 interfaces to a mapped address from the address from the address pool of 192.168.1.110 to 192.168.1.250
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 156
VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted to the trunking encapsulation protocol (802.1 q or ISL).You worry about the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration can be used to mitigate VLAN hopping? (Choose two.)
A. switchporttrunk encapsulation
B. switchport mode trunk
C. switchport access vlan
D. switchport mode access
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 157
CiscoWorks SNMS is a part of the CiscoWorks family of products for managing small to large networks. CiscoWorks SIMMS is a new Web-based network management solution for small to medium-sized businesses, with 40 or fewer Cisco internetworking devices such as switches, routers, hubs, and access servers. CiscoWorks SNMS can also monitor third-party IT assets such as servers, applications, services, and printers A Public Switched Telephone Network (PSTN) trunk is typically the voice interconnect between any business and the outside world. Which network management tool is designed to allow businesses to manage up to 40 devices?
A. CiscoWorks Unrestricted
B. CiscoWorks WAN Management
C. CiscoWorks LAN Management
D. CiscoWorks SNMS
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 158
Which statement is correct about the information in the Cisco Adaptive Security Device Manager General and License Information screen?
A. The security appliance supports active/active failover only.
B. The security appliance supports 3DES-AES only.
C. The managed device is a Cisco ASA 5540 Security Appliance with VPN premium license enabled.
D. The managed device is Cisco PIX515E Security Appliance.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 159
Which three are different types of STP inconsistencies in a Layer 2 network?(Choose three)
A. MAC inconsistency
B. Root inconsistency
C. EtherChannel inconsistency
D. type inconsistency
Correct Answer: BCD Section: (none) Explanation Explanation/Reference:
QUESTION 160
According to the error log, VLAN 1 is where the BPDU was received, and VLAN 2 is where the BPDU originated. When inconsistency is detected, what happens?
A. VLAN 1 is blocked, while VLAN 2 is forwarding
B. VLAN1 is blocked, while VLAN 2 is listening
C. Both VLANs are listening on the port from which this BPDU is send
D. Both VLANs are blocked on the port from which this BPDU is received
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 161
Which is the current configured default gateway IP address on the security appliance?
A. 172.16.10.1
B. 172.16.1.1
C. 192.168.1.2
D. 10.0.1.1
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 162
Which statement is true about a Cisco Aironet 350 Series wireless client when its green LED appears to be off and its amber LED is blinking?
A. The client adapter is scanning for a network.
B. The client adapter is in ad hoc mode.
C. The client adapter is performing a self-test.
D. The client adapter is in power-save mode.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 163
You are the Cisco Configuration Assistant. Your IT Manager tells you 802.11b telephone can receive an audio signal from an access point, but cannot send audio. What is the most likely reason?
A. The value of RSSI telephone is greater than 30.
B. The access point only receives 802.11g data rates.
C. The security settings in the telephone mismatch the access point.
D. The telephone transmit power is significantly lower than the t the access point
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Flydumps.com provides you with the most reliable practice exams to master Cisco 642-384 Certification. Our Microsoft questions and answers are certified by the senior lecturer and experienced technical experts in the Microsoft field. These test questions provide you with the experience of taking the Cisco 642-384 actual test.
Welcome to download the newest Pass4itsure CISSP-ISSEP dumps:
https://www.pass4itsure.com/issep.html
http://www.i-tec.org/avaya-3102-certification-exam-best-quality-avaya-3102-exam-dumps-with-the-knowledge-and-skills/
Welcome to download the newest Pass4itsure ITILFND dumps:
You just need the right Cisco 642-384 Exam and you’ll be continuing your journey when it comes to achievement. Even though there are plenty of internet websites that accomplish this, but many are often false as well as outdated. For that reason, take care too essential with your number of the website. FLYDUMPS Cisco 642-384 exam sample questions test out generator data, questions, the actual test out responses along with other products to offer you an in depth in addition to rational stories Cisco 642-384 test desired goals, giving an absolute test out conditions, these Cisco 642-384 study materials provide this particular expertise on your the genuine Cisco 642-384 exam sample questions test out features in the solutions examiner.
QUESTION 139
You connect via Telnet to a Cisco access point and enter the command show dot11 link test. Which output might you obtain?
A. signal-to-noise ratio
B. incoming and outgoing signal strength
C. TX packets dropped
D. RX packets per second
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 140
Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the sitE.to-site VPN between Router A and Router B.
What is the mostly likely cause of this fault?
A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150-199). ”
B. The IKE encryption methods on the two routers are different
C. the IPSec policy map names on the two routers are different.
D. the IPSec rules on the two routers are not permitting the Answer: interesting traffic.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 141
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.
How many active VPN clients are currently connected to the 1841 ISR router?
A. 0
B. 1
C. 2
D. 3
E. 4
F. 5
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 142
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the
tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.
Which IP address or address range will be used when allocating an internal IP address to the VPN clients for the “test” VPN group?________________________________________________________________________
A. 10.1.1.100 to 10.1.1.200 I
B. 10.1-1.2 to 10.1.1.254
C. 192.168.1.1 to 192.168.1.100
D. 192.168.1.2 to 192.168.1.254
E. 192.168.1.1
F. 192.168.1.2
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 143
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.
Which authentication method is used by the test” VPN group?
A. RSA Encrypted Nounce
B. RSA Digital Signature
C. PrE.Shared Key
D. Digital Certificate
E. DH2
Correct Answer: C Section: (none) Explanation Explanation/Reference:
QUESTION 144
You are the network consultant. You have a customer with a small network of 15 remote sites is trying to optimize its VPN by migrating some remote sites using Frame Relay connections to the Internet to using cable connections to the Internet. The keypoint for your customer is to save money. Only a moderate amount of IP traffic is passing through the network, most of which is from the remote sites to the central site. IPSec should be used to provide VPN functionality and basic confidentiality is desired..Considering the above requirements. Which solution would be the easiest for this customer to set up and manage?
A. point-to-point
B. partial mesh
C. point-to-multipoint
D. hub-and-spoke
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 145
In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?
A. The WCS sends excessive traffic to the rogue thus overloading the access point.
B. The rogue MAC address is used to spoof broadcastdeassociation packets.
C. The rogue MAC address is used to spoof broadcastdeauthentication packets.
D. The WCS sends out excessive signals on the same channel when the rogue is detected.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 146
With industry-leading services and performance, the Cisco Catalyst 6500 Series Switch is Cisco’s flagship switching solution. It delivers the most comprehensive feature sets for core, distribution, wiring closet, data center, enterprise WAN routing, and Metro-Ethernet deployments. Which layer you think is recommended that the Cisco Catalyst 6500 Series WLSM be placed?
A. core
B. distribution
C. access
D. presentation
Correct Answer: B Section: (none) Explanation
Explanation/Reference: QUESTION 147
The Cisco Lifecycle Services approach defines the activities needed to help you successfully deploy and operate Cisco technologies and optimize their performance throughout the lifecycle of your network. Which statement is an accurate list of Cisco Lifecycle Services phases?
A. initiation, prepare, plan, design, implement, operate, and optimize
B. site assessment, risk assessment, solution selection and acquisition, testing, and operations
C. prepare, plan, design, implement, operate, and optimize
D. deployment, testing, implementation, and production
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 148
Which IP address or address range will be used when allocating an internal ip address to the VPN client for the test
A. 120.1.1.100 to 10.1.1.200
B. 10.1.1.2 to 10.1.1.254
C. 192.1681.1 to 192.1681.1.100
D. 192.1681.2 to 192.1681.1.254
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 149
Which authentication method is used by the test VPN group?
A. RSA EncryptedNounce
B. RSA Digital Signature
C. Pre-shared key
D. DH2
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 150
A network administrator is troubleshooting an EIGRP connection between RA and RB. Given the debug output on RA, which two statements are true?(Choose two)
A. RA received a hello packet with mismatched hello timers.
B. RA received a hello packet with mismatched metric-calculation mechanisms.
C. RA will form an adjacency with RB.
D. RAwill not form an adjacency with RB.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 151
You are the network administrator. There is one Gigabit Ethernet port on the Cisco CE520 used in the Smart Business Communications System. Which port role assignment would you make for?
A. Cisco Express 520
B. Cisco UC520
C. Cisco CE520
D. Cisco 871W
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 152
Refer to the exhibit. CK-SA and CK-SC are running PVST+ STP, and CK-SB is running 802.1 Q STP. If the BPDU of the root in VLAN 1 is better than the BPDU of the root in VU\N 2, then there is no blocking port in the VLAN 2 topology. The BPDU of VU\N 2 never makes a “full circle” around the topology; it is replaced by the VLAN 1 BPDU on the CK-SB-CK-SC link, because CK-SB runs only one STP merged with VU\N 1 STP of PVST+. Thus, there is a forwarding loop.
What does PVST+ do to correct this?
A. CK-SA sends PVST+ BPDUs ofVLAU 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
B. CK-SB sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SA) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
C. CK-SC sends PVST+BPDUsofVU\N 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SAwill put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
D. CK-SA sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SB) towards CK-SB. CK-SA will put port CK-C-CK-B into a type-inconsistent state, which prevents the loop.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 153
A wireless autonomous 1200 access point running core feature set in root mode has its SSID set to Factory_floor and provides connection to a repeater access point with its SSID set to factory_floor, if the root-mode access point is using channel 11 which channel will the repeater
access point use?
A. channel 11
B. channel 1 or 6
C. anynonoverlapping channel
D. The root access point and the repeater will negotiate this setting
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 154
The VPN server uses a preshared key for remote device authentication
A. TRUE
B. FALSE
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 155
A customer with a large enterprise network wants to allow employees to work from home over the Internet. The customer anticipates a large amount of traffic, predominantly toward the central site. The customer also requires a VPN using strong user authentication and encryption to protect highly sensitive data. Which solution best meets this customer’s requirements?
A. remote-access VPN with software encryption
B. remote-access VPN with hardware encryption
C. site-to-site VPN with hub-and-spoke tunnels using 3DES and pre-shared secrets
D. site-to-site Cisco Easy VPN
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 156
The tables contain information from the Cisco Router and Security Device Manager configurations of RA and RB. Traffic between PC1 and PC2 is not successfully establishing the site-to-site VPN between -RA and -RB. What is the mostly likely cause of this fault?
A. RAis using a standard IP ACL (100-149) while RB is using a Turbo ACL(150-199).
B. The IPSec encryption methods used by each router do not match.
C. The D-H Group settings on the two routers are the same. ”
D. The IPSec rules on the two routers are not permitting the correct interesting traffic.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 157
You are the network consultant. When will you assess a customer’s current network infrastructure?
A. plan
B. design
C. operate
D. optimize
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 158
A client is experiencing lower throughput and more packet retransmits is one area of the wireless network. At these times, the client utility shows high signal strength but low signal quality. What may be causing this issue?
A. The client does not support Cisco Compatible Extensions version 2.
B. Diversity is not enabled in the access point.
C. The WDS is failing to register the client card in the WLSM.
D. The channel is set incorrectly in the access point or in the client configuration.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 159
Which statement is correct about the current address translation configurations on the security appliance?
A. Dynamic NAT is used to translate the 10.0.1.100 host on the inside interface to a global address of
192.168.1.1
B. Port AddressTranslation(PAT) is used to translate any host on the inside interface to the 192.168.1.100 global address.
C. Static NAT is used to translate the 172.16.1.2 host on thedmzl interface to a global address of
192.168.1.102
D. Dynamic NAT is used to translate any host ondmzl and dmz2 interfaces to a mapped address from the address from the address pool of 192.168.1.110 to 192.168.1.250 ”
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 160
VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible.
VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted to the trunking encapsulation protocol (802.1 q or ISL).You worry about the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration can be used to mitigate VLAN hopping? (Choose two.)
A. switchporttrunk encapsulation
B. switchport mode trunk
C. switchport access vlan
D. switchport mode access
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 161
CiscoWorks SNMS is a part of the CiscoWorks family of products for managing small to large networks. CiscoWorks SIMMS is a new Web-based network management solution for small to medium-sized businesses, with 40 or fewer Cisco internetworking devices such as switches, routers, hubs, and access servers. CiscoWorks SNMS can also monitor third-party IT assets such as servers, applications, services, and printers A Public Switched Telephone Network (PSTN) trunk is typically the voice interconnect between any business and the outside world. Which network management tool is designed to allow businesses to manage up to 40 devices?
A. CiscoWorks Unrestricted
B. CiscoWorks WAN Management
C. CiscoWorks LAN Management
D. CiscoWorks SNMS
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 162
Which statement is correct about the information in the Cisco Adaptive Security Device Manager General and License Information screen?
A. The security appliance supports active/active failover only.
B. The security appliance supports 3DES-AES only.
C. The managed device is a Cisco ASA 5540 Security Appliance with VPN premium license enabled.
D. The managed device is Cisco PIX515E Security Appliance.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 163
Which three are different types of STP inconsistencies in a Layer 2 network?(Choose three) A. MAC inconsistency
B. Root inconsistency
C. EtherChannel inconsistency
D. type inconsistency
Correct Answer: BCD Section: (none) Explanation
Explanation/Reference:
QUESTION 164
According to the error log, VLAN 1 is where the BPDU was received, and VLAN 2 is where the BPDU originated. When inconsistency is detected, what happens?
A. VLAN 1 is blocked, while VLAN 2 is forwarding
B. VLAN1 is blocked, while VLAN 2 is listening
C. Both VLANs are listening on the port from which this BPDU is send
D. Both VLANs are blocked on the port from which this BPDU is received
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 165
Which is the current configured default gateway IP address on the security appliance?
A. 172.16.10.1
B. 172.16.1.1
C. 192.168.1.2
D. 10.0.1.1
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 166
Which statement is true about a Cisco Aironet 350 Series wireless client when its green LED appears to be off and its amber LED is blinking?
A. The client adapter is scanning for a network.
B. The client adapter is in ad hoc mode.
C. The client adapter is performing a self-test.
D. The client adapter is in power-save mode.
Correct Answer: D Section: (none) Explanation
Explanation/Reference: QUESTION 167
You are the Cisco Configuration Assistant. Your IT Manager tells you 802.11b telephone can receive an audio signal from an access point, but cannot send audio. What is the most likely reason?
A. The value of RSSI telephone is greater than 30.
B. The access point only receives 802.11g data rates.
C. The security settings in the telephone mismatch the access point.
D. The telephone transmit power is significantly lower than the t the access point
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Get yourself composed for Microsoft actual exam and upgrade your skills with Flydumps Cisco 642-384 practice test products. Once you have practiced through our assessment material, familiarity on Cisco 642-384 exam domains get a significant boost. Flydumps practice tests enable you to raise your performance level and assure the guaranteed success for Cisco 642-384 exam.
Welcome to download the newest Pass4itsure ITILFND dumps: https://www.pass4itsure.com/itilfnd.html
http://www.i-tec.org/avaya-3101-testing-new-updated-avaya-3101-study-material-up-to-50-off/
Welcome to download the newest Examwind 2V0-641 dumps:
Achieving the Cisco 642-384 certification is the goal of many IT & Network professionals. The passing rate of the Cisco 642-384 Test is incredibly low. The purpose of Flydumps Cisco 642-384 practice test is to promote Cisco 642-384 Certification. It’s surely not an easy task to do but doing the Cisco 642-384 Training by using our Cisco 642-384 exam sample questions will ensure and encourage that you can earn the Cisco 642-384 Certification. You don’t have to worry about passing your Cisco 642-384 exam or completing the latest Cisco 642-384 Exam Objectives anymore because Flydumps Cisco 642-384 exam sample questions do it all for you.
QUESTION 109
You are configuring a VLAN and the switch you are using requires that you do so within the VLAN database. Which command allows you to enter the VLAN database?
A. Switch#vlan database
B. Switch (config)# vlan database
C. Switch (config-if)# vlan database
D. Switch (vlan)# vlan database
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 110
Which two statements best describe the wireless core feature set using autonomous access points when implementing repeater topology? (Choose two.)
A. RF overlap between access points should be 10 to 15 percent with unique channels configured.
B. RF overlap between primary and repeater access points should be 10 to 15 percent with the same channel configured.
C. RF overlap between primary and repeater access points should be 50 percent with the same channel configured
D. RF overlap between primary and repeater access points should be 50 percent with unique channels configured.
E. Clients that are associated with the repeater access point will have 10 to 15 percent less data throughput than clients that are associated with the primary root access point.
F. Clients that are associated with the repeater access point will have 50 percent less data throughput than clients that are associated with the primary root access point
Correct Answer: CF Section: (none) Explanation
Explanation/Reference:
QUESTION 111
:Refer to the exhibit. The Cisco Aironet 802.1 la/b/g Wireless LAN Client Adapter has two LEDs. Which two LED states indicate that the card is associated to an access point and is working properly? (Choose two.)
A. green LED off; amber LED solid
B. green LED off; amber LED blinking sporadically
C. green LED blinking quickly: amber LED blinking quickly
D. green LED blinking slowly, amber LED blinking slowly
E. green LED blinking slowly; amber LED blinking quickly
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 112
Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configuration of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the sitE.to-site VPN between Router A and Router B. What is the mostly likely cause of this fault?
A. The IPSec and IKE encryption methods do not match. They all have to be either 3DES or AES.
B. Router A is using a standard IP ACL (100-149) while Router B is using a turbo ACL (150-199).
C. The D.H Group settings on the two routers are set to group 2. They must be set to group 1 for SHA. 1.
D. The IPSec policy map names on the two routers do not match. They must be the same on both routers.
E. The IPSec rules on the two routers are not permitting the correct interesting traffic
Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 113
OSPF routes are being redistributed into EIGRP but they are not showing up in the routing table. What are two possible causes? (Choose two.)
A. CEF has not been enabled.
B. Synchronization has been turned off.
C. incorrect distribute lists have been configured
D. No default metric has been configured for EIGRP
E. Theip classless command is missing.
F. There are mismatched autonomous system numbers.
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 114
Which two statements best describe the wireless implementation of Cisco Aironet root and non- root bridging? (Choose two.)
A. Point-to-point access points can be used if one is root and the other is non-root.
B. WGB can be used with an access point if the distance is less than one mile
C. Root mode must be enabled only on one side in a point-to-point link to intemperate with other vendors and comply with 802.11
D. Up to 17 non-root bridges can associate to a root bridge
E. Point-to-point WGB can be used if total number of PCs is fewer than eight. The neighbor 10.1.1.1 is the BDR
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 115
The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points?
A. 48-bit IV
B. AES
C. TKIP
D. MIC
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 116
A company needs to provide sitE.to-site VPN, remote access VPN, and firewall protection. Which device best supports all three functions?
A. Cisco PIX
B. Cisco ASA
C. Cisco Concentrator
D. Cisco Router and Security Device Manager
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 117
Refer to the exhibit. R2 is always in the init state. Which two statements are correct? (Choose two.)
A. R2 is seeing hello packets from R1.
B. R2 is not seeing hello packets from R1.
C. The exchanging of data between R1 and R2 is occurring because each is sending hello packets.
D. Two-way communication has not been established between R1 and R2 because R2 is not seeing its router ID in the hello packets that it is receiving from R1
E. R2 has an access list defined for SO that is blocking an OSPF multicast IP address of 224.0.0.5.
Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 118
Which two features are only supported when using the Cisco Router and Security Device Manager (SDM) Advanced Firewall wizard and not supported when using the Cisco SDM Basic Firewall wizard? (Choose two.)
A. deep-packet inspections
B. IP unicast Reverse Path Forwarding on the outside (untrusted) interface
C. DMZ services
D. Custom inspection rules
E. proxy authentication
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 119
:When troubleshooting poor network performance, which two symptoms would typically be associated with a network layer problem? (Choose two.)
A. Packet loss is more than 30 percent
B. There is excessive broadcast traffic.
C. There are excessive CRC errors.
D. Pings succeed only part of the time
E. Slips are detected on WAN interfaces.
F. ARP requests are timing out.
Correct Answer: AD Section: (none) Explanation Explanation/Reference:
QUESTION 120
Which command can be used to verify that RIPv2 is running on a router?
A. show startup-config
B. show ip route
C. showip route rip
D. Show ip protocols
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 121
Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.)
A. Layer 2 and Layer 3 services can be configured in a CiscoAironet autonomous AP or a Cisco Integrated Services Router.
B. Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router
C. Layer 2 and Layer 3 services can be configured in a CiscoAironet autonomous AP or controllers.
D. Layer 3 services can be configured in WLSM.
E. Layer 3 services can be configured in WLSE.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 122
You have just configured and enabled the Cisco IOS Firewall feature set from a remote location using the Cisco Router and Security Device Manager (SDM) Firewall wizard. You later want to doublE. check your configuration using Cisco SDM. However, you find that you can no longer connect to the Cisco IOS Firewall using Cisco SDM.
What is the probable cause of this failure?
A. You must additionally specify the Cisco SDM management port number to gain access when the configuration has been applied.
B. You have not generated an RSA key pair between the host and device to allow secure access via Cisco SDM.
C. You have been locked out via access lists mat nave been applied to the router as a result of your Cisco SDM configuration.
D. You must specify the host IP address of Cisco SDM in the Configuration panel for allowed management connections.
Correct Answer: C Section: (none) Explanation
Explanation/Reference: QUESTION 123
An 802.11 b telephone is receiving an audio signal from an access point, but cannot send audio. What is a possible cause?
A. the RSSI value on the telephone is greater than 35.
B. The access point is set to receive only at 802.11g data rates.
C. The security settings in the telephone do not match the settings in the access point.
D. The transmit power in the telephone is significantly lower than the transmit power in the access point.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 124
Refer to the exhibit. A host on the Sales subnet (10.0.2.0/24) is not able to initiate a web connection to an outside website. According to the network diagram and partial Cisco Adaptive Security Device Manager configuration shown in the exhibit, what is the cause of the problem?
A. The dynamic NAT global pool is not configured correctly.
B. The source networks for static NAT are not configured correctly.
C. The administrator has not added an access list to allow the connection.
D. The source network for dynamic NAT is not configured correctly
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 125
Users logging into Cisco Router and Security Device Manager should be authenticated using the Cisco ISR local user database. Currently, none of the users can access Cisco Router and Security Device Manager via HTTP. You should check the configuration of which command or commands when attempting to resolve this problem?
A. There is no ip http secure-server
B. There is ip http authentication local
C. There is linevty 0 5 login local
D. There isaaa new-model
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 126
When using Cisco Router and Security Device Manager to configure AAA login authentication policies, which four methods are available? (Choose four.)
A. group RADIUS: use a list of RADIUS hosts
B. group TACACS+ use a list of TACACS+ hosts
C. enable: use enable password
D. otp: use onE.time password
E. local use local database
F. default: use line password
Correct Answer: ABCE Section: (none) Explanation
Explanation/Reference:
QUESTION 127
You have just configured HSRP and need to determine which router is active. Which command should you enter?
A. show ip hsrp active
B. show standby active
C. show star
D. show active
Correct Answer: C Section: (none) Explanation
Explanation/Reference: QUESTION 128
A North American customer is using 2.4-GHz radios in a point-to-point configuration. The radio power level is 17 dBm and is transmitting at 11 Mbps. The customer is using 21.5-dBi dish antennas and 50 feet of cabling, with a loss of 8.4 dB per 100 feet. The customer increased the distance between the transmitter stations and began experiencing link problems.
Without using a professional installer, which step should the customer take to fix the situation?
A. Use a cable with a lower loss.
B. Upgrade to an 802.11a radio.
C. Install a higher gain antenna.
D. Increase the transmitter power.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 129
A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which two of these might have caused this problem? (Choose two.)
A. Theip https server command is missing from the running configuration.
B. The ip http securE.server command is missing from the running configuration
C. The user is trying to launch Cisco Router and Security Device Manager from the inside (secured) interface with a firewall enabled.
D. The user has a privilege level lower than 15.
E. The browser security level is set too high.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 130
Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.)
A. The primary Layer 2 WDS server address is configured via the infrastructure access point GUI.
B. The primary Layer 2 WDS server address is automatically discovered by the infrastructure access points through multicast
C. The primary Layer 2 WDS is selected by the highest MAC address, followed by priority number.
D. The primary Layer 2 WDS is selected by the highest priority number followed by MAC address.
E. The primary Layer 2 WDS is selected by the highest IP address, followed by MAC address.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 131
Refer to the exhibit. A network administrator is troubleshooting an EIGRP connection between Router A and Router B. Given the debug output on Router A, which two statements are true? (Choose two.) Router A= debug eigrp packets . m .
01:39:13:
EIGRP: Received HELLO on SerialQ 0 nbr 10.1.2.2
01:39:13:
AS 100, Flags 0x0, Seq 0/0 idbQ 00 iidbQ un/rely 0/0 peerQ un/rely 0/0
01:39:13:
K-value mismatch
A.
Router A received a hello packet with mismatched autonomous system numbers.
B.
Router A received a hello packet with mismatched hello timers.
C.
Router A received a hello packet with mismatched authentication parameters.
D.
Router A received a hello packet with mismatchedmetriC.calculation mechanisms
E.
Router A will form an adjacency with Router B.
F.
Router A will not form an adjacency with Router B
Correct Answer: DF Section: (none) Explanation
Explanation/Reference:
Easiest way to get Cisco 642-384 certification is to log on to the Cisco 642-384 FLYDUMPS and purchase the Cisco 642-384 exam sample questions to do Cisco 642-384 exam questions and answers to obtain your Cisco 642-384 certification. FLYDUMPS Cisco 642-384 Exam is paired with Cisco 642-384 for use on simulator. To help with these preparations there are plenty of FLYDUMPS Cisco 642-384 exam sample questions available on the Internet that can dispel all these fears and nervousness. These Cisco 642-384 Exam Questions range from the official Cisco 642-384 Certification Training courses and official Cisco 642-384 Certification Self Study Training Guides from Cisco 642-384 Press, to the FLYDUMPS Cisco 642-384 exam sample questions.
Welcome to download the newest Examwind 2V0-641 dumps: http://www.examwind.com/2V0-641.html
http://www.maeeonline.org/isaca-cisa-practice-test-provide-latest-isaca-cisa-exam-demo-with-the-knowledge-and-skills/
Welcome to download the newest Examwind 642-384 dumps:
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials.
This Blog provides you everything you will need to take a certification examination and Exam Preparation Material. Like actual certification exams, our Practice Tests are in Flydumps Our Cisco 642-384 Exam will provide you with exam questions with verified answers that reflect the actual exam. These questions and answers provide you with the experience of taking the actual test. High quality and Value for the Cisco 642-384 Exam:100% Guarantee to Pass Your Cisco 642-384 exam and get your EMC certification.
QUESTION 113
OSPF routes are being redistributed into EIGRP but they are not showing up in the routing table. What are two possible causes? (Choose two.)
A. CEF has not been enabled.
B. Synchronization has been turned off.
C. incorrect distribute lists have been configured
D. No default metric has been configured for EIGRP
E. Theip classless command is missing.
F. There are mismatched autonomous system numbers.
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 114
Which two statements best describe the wireless implementation of Cisco Aironet root and non- root bridging? (Choose two.)
A. Point-to-point access points can be used if one is root and the other is non-root.
B. WGB can be used with an access point if the distance is less than one mile
C. Root mode must be enabled only on one side in a point-to-point link to intemperate with other vendors and comply with 802.11
D. Up to 17 non-root bridges can associate to a root bridge
E. Point-to-point WGB can be used if total number of PCs is fewer than eight. The neighbor 10.1.1.1 is the BDR
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 115
CORRECT TEXT
Refer to the exhibit. Which two statements are
A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: : about what is displayed? (Choose two.) Answer: C, D
QUESTION 116
The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points?
“Pass Any Exam. Any Time.” – www.actualtests.com 43 Cisco 642-384: Practice Exam
A. 48-bit IV
B. AES
C. TKIP
D. MIC
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 117
A company needs to provide sitE.to-site VPN, remote access VPN, and firewall protection. Which device best supports all three functions?
A. Cisco PIX
B. Cisco ASA
C. Cisco Concentrator
D. Cisco Router and Security Device Manager
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 118
CORRECT TEXT
Which two statements are
A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: : about using Cisco Router and Security Device Manager (SDM) to configure the OSPF routing protocol? (Choose two.) Answer: B, E
QUESTION 119
Refer to the exhibit. R2 is always in the init state. Which two statements are correct? (Choose two.)
A. R2 is seeing hello packets from R1.
B. R2 is not seeing hello packets from R1. “Pass Any Exam. Any Time.” – www.actualtests.com 44 Cisco 642-384: Practice Exam
C. The exchanging of data between R1 and R2 is occurring because each is sending hello packets.
D. Two-way communication has not been established between R1 and R2 because R2 is not seeing its router ID in the hello packets that it is receiving from R1
E. R2 has an access list defined for SO that is blocking an OSPF multicast IP address of 224.0.0.5.
Correct Answer: AD Section: (none) Explanation
Explanation/Reference: QUESTION 120
Which two features are only supported when using the Cisco Router and Security Device Manager (SDM) Advanced Firewall wizard and not supported when using the Cisco SDM Basic Firewall wizard? (Choose two.)
A. deep-packet inspections
B. IP unicast Reverse Path Forwarding on the outside (untrusted) interface
C. DMZ services
D. Custom inspection rules
E. proxy authentication
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 121
:When troubleshooting poor network performance, which two symptoms would typically be associated with a network layer problem? (Choose two.)
A. Packet loss is more than 30 percent
B. There is excessive broadcast traffic.
C. There are excessive CRC errors.
D. Pings succeed only part of the time
E. Slips are detected on WAN interfaces.
F. ARP requests are timing out.
Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 122
Which command can be used to verify that RIPv2 is running on a router?
“Pass Any Exam. Any Time.” – www.actualtests.com 45 Cisco 642-384: Practice Exam
A. show startup-config
B. show ip route
C. showip route rip
D. Show ip protocols
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 123
Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.)
A. Layer 2 and Layer 3 services can be configured in a CiscoAironet autonomous AP or a Cisco Integrated Services Router.
B. Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router
C. Layer 2 and Layer 3 services can be configured in a CiscoAironet autonomous AP or controllers.
D. Layer 3 services can be configured in WLSM.
E. Layer 3 services can be configured in WLSE.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 124
You have just configured and enabled the Cisco IOS Firewall feature set from a remote location using the Cisco Router and Security Device Manager (SDM) Firewall wizard. You later want to doublE. check your configuration using Cisco SDM. However, you find that you can no longer connect to the Cisco IOS Firewall using Cisco SDM.
What is the probable cause of this failure?
A. You must additionally specify the Cisco SDM management port number to gain access when the configuration has been applied.
B. You have not generated an RSA key pair between the host and device to allow secure access via Cisco SDM.
C. You have been locked out via access lists mat nave been applied to the router as a result of your Cisco SDM configuration.
D. You must specify the host IP address of Cisco SDM in the Configuration panel for allowed management connections. “Pass Any Exam. Any Time.” – www.actualtests.com 46 Cisco 642-384: Practice Exam
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 125
An 802.11 b telephone is receiving an audio signal from an access point, but cannot send audio. What is a possible cause?
A. the RSSI value on the telephone is greater than 35.
B. The access point is set to receive only at 802.11g data rates.
C. The security settings in the telephone do not match the settings in the access point.
D. The transmit power in the telephone is significantly lower than the transmit power in the access point.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 126
Refer to the exhibit. A host on the Sales subnet (10.0.2.0/24) is not able to initiate a web connection to an outside website. According to the network diagram and partial Cisco Adaptive Security Device Manager configuration shown in the exhibit, what is the cause of the problem?
A. The dynamic NAT global pool is not configured correctly.
B. The source networks for static NAT are not configured correctly.
C. The administrator has not added an access list to allow the connection.
D. The source network for dynamic NAT is not configured correctly
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 127
Users logging into Cisco Router and Security Device Manager should be authenticated using the Cisco ISR local user database. Currently, none of the users can access Cisco Router and Security Device Manager via HTTP. You should check the configuration of which command or commands when attempting to resolve this problem?
A. There is no ip http secure-server
B. There is ip http authentication local
C. There is linevty 0 5 login local
D. There isaaa new-model
Correct Answer: B Section: (none) Explanation Explanation/Reference:
QUESTION 128
When using Cisco Router and Security Device Manager to configure AAA login authentication policies, which four methods are available? (Choose four.)
A. group RADIUS: use a list of RADIUS hosts
B. group TACACS+ use a list of TACACS+ hosts
C. enable: use enable password
D. otp: use onE.time password
E. local use local database
F. default: use line password
Correct Answer: ABCE Section: (none) Explanation
Explanation/Reference:
QUESTION 129
CORRECT TEXT
Which two statements are
A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: : about OSPF in a multiarea environment? (Choose two.) Answer: C, D
“Pass Any Exam. Any Time.” – www.actualtests.com 48 Cisco 642-384: Practice Exam
QUESTION 130
You have just configured HSRP and need to determine which router is active. Which command should you enter?
A. show ip hsrp active
B. show standby active
C. show star
D. show active
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 131
A North American customer is using 2.4-GHz radios in a point-to-point configuration. The radio power level is 17 dBm and is transmitting at 11 Mbps. The customer is using 21.5-dBi dish antennas and 50 feet of cabling, with a loss of 8.4 dB per 100 feet. The customer increased the distance between the transmitter stations and began experiencing link problems.
Without using a professional installer, which step should the customer take to fix the situation?
A. Use a cable with a lower loss.
B. Upgrade to an 802.11a radio.
C. Install a higher gain antenna.
D. Increase the transmitter power.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 132
CORRECT TEXT Which three statements are
A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: : about the IEEE 802.3af Power over Ethernet standard? (Choose three.) Answer: A, C, E
QUESTION 133
A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which two of these might have caused this problem? (Choose two.)
“Pass Any Exam. Any Time.” – www.actualtests.com 49 Cisco 642-384: Practice Exam
A. Theip https server command is missing from the running configuration.
B. The ip http securE.server command is missing from the running configuration
C. The user is trying to launch Cisco Router and Security Device Manager from the inside (secured) interface with a firewall enabled.
D. The user has a privilege level lower than 15.
E. The browser security level is set too high.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 134
Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.)
A. The primary Layer 2 WDS server address is configured via the infrastructure access point GUI.
B. The primary Layer 2 WDS server address is automatically discovered by the infrastructure access points through multicast
C. The primary Layer 2 WDS is selected by the highest MAC address, followed by priority number.
D. The primary Layer 2 WDS is selected by the highest priority number followed by MAC address.
E. The primary Layer 2 WDS is selected by the highest IP address, followed by MAC address.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 135
Refer to the exhibit. A network administrator is troubleshooting an EIGRP connection between Router A
and Router B. Given the debug output on Router A, which two statements are true? (Choose two.)
Router A= debug eigrp packets
. m .
01:39:13:
EIGRP: Received HELLO on SerialQ 0 nbr 10.1.2.2
01:39:13:
AS 100, Flags 0x0, Seq 0/0 idbQ 00 iidbQ un/rely 0/0 peerQ un/rely 0/0
01:39:13:
K-value mismatch
A.
Router A received a hello packet with mismatched autonomous system numbers.
B.
Router A received a hello packet with mismatched hello timers.
C.
Router A received a hello packet with mismatched authentication parameters.
D.
Router A received a hello packet with mismatchedmetriC.calculation mechanisms
E.
Router A will form an adjacency with Router B.
F.
Router A will not form an adjacency with Router B “Pass Any Exam. Any Time.” – www.actualtests.com 50 Cisco 642-384: Practice Exam
Correct Answer: DF Section: (none) Explanation
Explanation/Reference:
QUESTION 136
Which command assigns a cost value of “17” to a switch port?
A. spanning-tree interfacefastethernet 5/8 17
B. spanning-treeportcost 17
C. spanning-treeportcost 17
D. spanning-treevlan 1 cost 17
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 137
You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted interface. You suspect that the rule may be blocking necessary traffic onto the network. What must you do to delete that rule when using Cisco Router and Security Device Manager?
A. Select ACL Editor > Access Rules to delete the rule.
B. You must remove the association between the rule and the interface before deleting the rule
C. You must delete the associated access list on the interface, then reconfigure the access list as required, and then reapply the access group to the proper interface.
D. Go to the Edit Firewall Policy tab to delete the rule.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 138
A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling and both radios set at 20 mW. The wireless bridges are not able to establish or maintain a link.
What is needed to successfully complete this link?
A. An amplifier needs to be installed at one of the sites.
B. The antenna must be raised high enough to clear the trees
C. Lower loss cabling needs to be used to bring the EIRP into legal limits. “Pass Any Exam. Any Time.” – www.actualtests.com 51 Cisco 642-384: Practice Exam
D. Due to the trees, a 21-dBi dish needs to be used for its narrower beam width.
Correct Answer: B Section: (none) Explanation
Explanation/Reference
Cisco 642-384 Certification is indeed the top most qualification from FLYDUMPS, providing a string of highly qualified professionals to the industry. The exam board has a tough time maintaining a certain quality of professionalism in the industry and these examinations are a step towards elimination of third-class knowledge. The fact that FLYDUMPS knows does not make a difference. The Cisco 642-384 exam sample questions are made to introduce a change in IT for the better and change is what is coming to IT. It is well known that HP HP2-Z28 Certification exam test is the hot exam of Cisco 642-384 certification. FLYDUMPS offer you all the Q&A of the Cisco 642-384 real test. It is the examination of the perfect combination and it will help you pass Cisco 642-384 exam at the first time.
Welcome to download the newest Examwind 642-384 dumps: https://www.pass4itsure.com/642-384.html
http://www.maeeonline.org/hfma-chfp-dumps-sale-best-hfma-chfp-practice-test-sale/
Welcome to download the newest Examwind 700-505 dumps:
Flydumps offers the first-hand Cisco 642-812 exam real questions and answers, by train the latest Cisco 642-812 PDF and VCE dumps,you will well prepare for the Cisco 642-812 exam. Visit Flydumps.com to get free new version for training.
QUESTION 156
Given the following configuration on a switch interface, what happens when a host with the MAC address of 0003.0003.0003 is directly connected to the switch port? switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002 switchport port-security violation shutdown
A. The port will shut down.
B. The host will be allowed to connect. TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
C. The host will be refused access.
D. The host can only connect through a hub/switch where 0002.0002.0002 is already connected.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 157
In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Choose three.)
A. STP
B. CDP
C. EAP MD5
D. TACACS+
E. EAP-over-LAN
F. protocols not filtered by an ACL
Correct Answer: ABE Section: (none) Explanation
Explanation/Reference:
QUESTION 158
When you issue a command show port 3/1 on an Ethernet port, you observe the Giants column has a non-zero entry. What could cause this?
A. IEEE 802.1Q
B. IEEE 802.10
C. misconfigured NIC
D. user configuration
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 159
Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Choose two.)
A. VTP mode
B. STP root status
C. negotiation status
D. management domain
E. configuration revision number
Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 160
What are two benefits provided in VTP Version 2 but NOT in VTP Version 1? (Choose two.)
A. supports Token Ring VLANs
B. allows VLAN consistency checks
C. saves VLAN configuration memory
D. reduces the amount of configuration necessary
E. allows active redundant links when used with spanning tree
Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 161
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true? (Choose two.)
A. Changing the bridge priority of S1 to 4096 would improve network performance.
B. Changing the bridge priority of S1 to 36864 would improve network performance.
C. Changing the bridge priority of S2 to 36864 would improve network performance.
D. Changing the bridge priority of S3 to 4096 would improve network performance. TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
E. Disabling the Spanning Tree Protocol would improve network performance.
F. Upgrading the link between S2 and S3 to Gigabit Ethernet would improve performance.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 162
Refer to the exhibit. PCs in VLAN 2 are not able to communicate with PCs in VLAN 3. What could be
the cause?
A. IP routing is not enabled.
B. VTP is not configured correctly on the interfaces.
C. The command mls rp management-interface is missing.
D. The command mls rp ip must be disabled to enable the routing.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 163
Which three statements are true of the Link Aggregation Control Protocol (LACP)? (Choose three.)
A. LACP is used to connect to non-Cisco devices.
B. LACP packets are sent with the command channel-group 1 mode desirable.
C. LACP packets are sent with the command channel-group 1 mode active.
D. Standby interfaces should be configured with a higher priority.
E. Standby interfaces should be configured with a lower priority.
Correct Answer: ACD Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 164
Refer to the exhibit. A workstation PC is connected to the Cisco IP phone access port. Based on the
configuration in the exhibit, how will the traffic be managed?
A. The IP phone access port will override the priority of the frames received from the PC.
B. The IP phone access port will trust the priority of the frames received from the PC.
C. The switch port Fa0/4 will override the priority of the frames received from the PC.
D. The switch port Fa0/4 will trust the priority for the frames received from the PC.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 165
Refer to the exhibit. A trunk link is connected between switch A_SW and switch D_SW. Based on the
configuration shown in the exhibit, how would the traffic coming from the switch A_SW be managed?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. The trunk port Fa0/1 on switch A_SW will trust all CoS values on the frames coming from the IP phone.
B. The trunk port Fa0/1 on switch A_SW will trust all CoS values on the frames received on the IP phone.
C. The trunk port Fa0/1 on switch D_SW will trust all CoS values on the frames coming from port Fa0/1 on A_SW.
D. The trunk port Fa0/1 on switch D_SW will trust all CoS values on the frames received on the A_SW switch port Fa0/4.
E. The trunk port Fa0/1 on switch D_SW will trust all CoS values on the frames received on the IP phone port.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 166
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest
method to the slowest method?
A. CEF, distributed CEF (dCEF), fast switching, process switching
B. distributed CEF (dCEF), CEF, fast switching, process switching
C. fast switching, process switching, distributed CEF (dCEF), CEF
D. process switching, fast switching, distributed CEF (dCEF), CEF
E. process switching, distributed CEF (dCEF), CEF, fast switching
F. process switching, CEF, distributed CEF (dCEF), fast switching TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
Correct Answer: B Section: (none) Explanation Explanation/Reference:
QUESTION 167
What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not
receive a BPDU from its neighbor for three consecutive hello time intervals?
A. RSTP information is automatically aged out.
B. The port sends a TCN to the root bridge.
C. The port moves to listening state.
D. The port becomes a normal spanning tree port.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 168
Refer to the exhibit. Why does the trust state of interface FastEthernet 0/3 show “not trusted”?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. DSCP map needs to be configured for VOIP.
B. ToS has not been configured.
C. ToS has been misconfigured.
D. The command mls qos needs to be turned on in global configuration mode.
E. There is not a Cisco Phone attached to the interface.
Correct Answer: E Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 169
What two things will occur when an edge port receives a BPDU? (Choose two.)
A. The port immediately transitions to the Forwarding state.
B. The switch generates a Topology Change Notification (TCN) BPDU.
C. The port immediately transitions to the err-disable state.
D. The port becomes a normal STP switch port.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 170
What two pieces of information will the show vlan id 5 command display? (Choose two.)
A. VLAN information on port 0/5
B. ports in VLAN 5
C. MTU and type
D. utilization
E. filters
Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 171
Based on the network diagram and routing table output in the exhibit, which of these statements is
true?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. InterVLAN routing has been configured properly, and the workstations have connectivity to each other.
B. InterVLAN routing will not occur since no routing protocol has been configured.
C. Although interVLAN routing is not enabled, both workstations will have connectivity to each other.
D. Although interVLAN routing is enabled, the workstations will not have connectivity to each other.
Correct Answer: A Section: (none) Explanation
Explanation/Reference: QUESTION 172
What is the default VTP advertisement for subset advertisements in Catalyst switches that are in server or client mode?
A. 5 seconds
B. 10 seconds
C. 30 seconds
D. 1 minute
E. 5 minutes
Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 173
Refer to the exhibit. Based upon the debug output that is shown, which three statements about HSRP
are true? (Choose three.)
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. The final active router is the router with IP address 172.16.11.111.
B. The router with IP address 172.16.11.111 has preempt configured.
C. The priority of the router with IP address 172.16.11.112 is preferred over the router with IP address
Correct Answer: Section: (none) Explanation
Explanation/Reference:
QUESTION 174
16.11.111.
A. The IP address 172.16.11.115 is the virtual HSRP IP address.
B. The router with IP address 172.16.11.112 has nonpreempt configured.
C. The router with IP address 172.16.11.112 is using default HSRP priority.
Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 175
What must be configured on a Cisco switch in order to advertise VLAN information?
A. VTP password
B. VTP domain name
C. VTP revision number
D. VTP mode
E. VTP pruning
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 176
Which describes the default load balancing scheme used by the Gateway Load Balancing Protocol
(GLBP)?
A. per host basis using a round-robin scheme
B. per host basis using a strict priority scheme
C. per session using a round-robin scheme
D. per session using a strict priority scheme
E. per GLBP group using a round-robin scheme TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
F. per GLBP group using a strict priority scheme
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 177
When authentication is required, where must 802.1x be configured in order to connect a PC to a
switch?
A. client PC only
B. switch port only
C. switch port and client PC
D. switch port and local router port
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 178
How are STP timers and state transitions affected when a topology change occurs in an STP
environment?
A. All ports will temporarily transition to the learning state for a period equal to the max age timer plus the forward delay interval.
B. All ports will transition temporarily to the learning state for a period equal to the forward delay interval.
C. The default aging time for MAC address entries will be reduced for a period of the max age timer plus the forward delay interval.
D. The default hello time for configuration BDPUs will be reduced for the period of the max age timer.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 179
Refer to the exhibit. VTP has been enabled on the trunk links between all switches within the TEST
domain. An administrator has recently enabled VTP pruning. Port 1 on Switch 1 and port 2 on Switch 4 are
assigned to VLAN 2. A broadcast is sent from the host connected to Switch 1. Where will the broadcast
propagate?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. Every switch in the network receives the broadcast and will forward it out all ports.
B. Every switch in the network receives the broadcast, but only Switch 4 will forward it out port 2.
C. Switches 1, 2, and 4 will receive the broadcast, but only Switch 4 will forward it out port 2.
D. Only Switch 4 will receive the broadcast and will forward it out port 2.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 180
Refer to the exhibit. VLAN 1 and VLAN 2 are configured on the trunked links between Switch A and Switch B. Port Fa 0/2 on Switch B is currently in a blocking state for both VLANs. What should be done to load balance VLAN traffic between Switch A and Switch B?
A. Lower the port priority for VLAN 1 on port 0/1 for Switch A.
B. Lower the port priority for VLAN 1 on port 0/2 for Switch A.
C. Make the bridge ID of Switch B lower than the ID of Switch A.
D. Enable HSRP on the access ports.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 181
Refer to the exhibit. Which two problems are the most likely cause of the exhibited output? (Choose
two.)
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. spanning tree issues
B. HSRP misconfiguration
C. VRRP misconfiguration
D. physical layer issues
E. transport layer issues
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 182
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link? (Choose two.)
A. The switch port attached to LinkB will not transistion to up.
B. One of the two switch ports attached to the hub will go into blocking mode when a BPDU is received.
C. Both switch ports attached to the hub will transition to the blocking state.
D. A heavy traffic load could cause BPDU transmissions to be blocked and leave a switching loop.
E. The switch port attached to LinkA will immediately transition to the blocking state.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 183
Refer to the exhibit and the partial configuration on routers R1 and R2. Hot Standby Routing Protocol (HSRP) is configured on the network to provide network redundancy for the IP traffic. The network administrator noticed that R2 does not became active when the R1 serial0 interface goes down. What should be changed in the configuration to fix the problem?
A. R2 should be configured with a HSRP virtual address.
B. R2 should be configured with a standby priority of 100.
C. The Serial0 interface on router R1 should be configured with a decrement value of 20.
D. The Serial1 interface on router R2 should be configured with a decrement value of 20.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 184
Refer to the exhibit. Which statement is true about the output?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. The port on switch CAT1 is forwarding and sending BPDUs correctly.
B. The port on switch CAT1 is blocking and sending BPDUs correctly.
C. The port on switch CAT2 is forwarding and receiving BPDUs correctly.
D. The port on switch CAT2 is blocking and sending BPDUs correctly.
E. The port on switch CAT3 is forwarding and receiving BPDUs correctly.
F. The port on switch CAT3 is forwarding, sending, and receiving BPDUs correctly.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 185
Refer to the exhibit. What statement is true based upon the configuration of router R1 and router R2?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. Router R1 will become the active virtual gateway.
B. Router R2 will become the active virtual gateway.
C. The hello and hold timers are incompatible with multi-homed BGP.
D. The hello and hold timers are incompatible with OSPF type 5 LSAs.
E. Router R1 will become the master for Virtual Router 1, and router R2 will become the backup for Virtual Router 2.
F. Router R2 will become the master for Virtual Router 1, and router R1 will become the backup for Virtual Router 2.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 186
Refer to the exhibit. The switchport output in Figure 1 displays the default settings of interface
FastEthernet 0/13 on switch SW1. Figure 2 displays the desired interface settings. Which command
sequence would configure interface FastEthernet 0/13 as displayed in Figure 2?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode trunk SW1 (config-if)# switchport trunk native DATA SW1(config-if)# switchport trunk allowed vlan 1,10,20
B. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic auto SW1(config-if)# switchport trunk native DATA SW1(config-if)# witchport trunk allowed vlan add 1,10,20
C. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic desirable SW1(config-if)# switchport trunk native vlan DATA SW1(config-if)# switchport trunk allowed vlan 1,10,20
D. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic desirable SW1(config-if)# switchport trunk native vlan 10 SW1(config-if)# switchport trunk allowed vlan 1,10,20
E. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic desirable SW1(config-if)# switchport trunk native vlan 10
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 187
Refer to the exhibit. For what purpose is the command show ip cef used?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. to display rewritten IP unicast packets
B. to display ARP resolution packets
C. to display ARP throttling
D. to display TCAM matches
E. to display CEF-based MLS lookups
F. to display entries in the Forwarding Information Base (FIB)
Correct Answer: F Section: (none) Explanation
Explanation/Reference:
QUESTION 188
Which two statements are true about HSRP, VRRP, and GLBP? (Choose two.)
A. GLBP allows for router load balancing of traffic from a network segment without the different host IP configurations required to achieve the same results with HSRP.
B. GLBP allows for router load balancing of traffic from a network segment by utilizing the creation of multiple standby groups.
C. GLBP and VRRP allow for MD5 authentication, whereas HSRP does not.
D. Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple available gateways.
E. HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP does not.
Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 189
Refer to the exhibit. Host A and Host B are connected to the Catalyst 3550 switch and have been
assigned to their respective VLANs. The rest of the 3550 configuration is the default configuration. Host A is able to ping its default gateway, 10.10.10.1, but is unable to ping Host B. Given the output displayed in the exhibit, which statement is true?
A. HSRP must be configured on SW1.
B. A separate router is required to support interVLAN routing.
C. Interface VLAN 10 must be configured on the SW1 switch.
D. The global config command ip routing must be configured on the SW1 switch.
E. VLANs 10 and 15 must be created in the VLAN database mode.
F. VTP must be configured to support interVLAN routing.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 190
Refer to the exhibit and the show interfaces fastethernet0/1 switchport outputs. Users in VLAN 5 on
switch SW_A complain that they do not have connectivity to the users in VLAN 5 on switch SW_B. What
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside should be done to fix the problem?
A. Configure the same number of VLANs on both switches.
B. Create switch virtual interfaces (SVI) on both switches to route the traffic.
C. Define VLAN 5 in the allowed list for the trunk port on SW_A.
D. Disable pruning for all VLANs in both switches.
E. Define VLAN 5 in the allowed list for the trunk port on SW_B
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 191
What does the Catalyst switch interface configuration command switchport trunk native vlan 7
accomplish?
A. configures the interface to be a trunking port and causes traffic on VLAN 7 to be 802.1q tagged
B. causes the interface to apply ISL framing for traffic on VLAN 7
C. configures the trunking interface to send traffic from VLAN 7 untagged
D. configures the trunking interface to forward traffic from VLAN 7
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 192
Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1.
Given the output that was generated, which two security statement are true? (Choose two.)
A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.
B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.
C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict command.
D. When the number of secure IP addresses reaches 10, the interface will immediately shut down.
E. When the number of secure MAC addresses reaches 10, the interface will immediately shut down and an SNMP trap notification will be sent.
Correct Answer: BE Section: (none) Explanation
Explanation/Reference: QUESTION 193
Which two statements about the various implementations of STP are true? (Choose two.)
A. Common Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in the network.
B. The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard.
C. Per-VLAN Spanning Tree (PVST) supports 802.1Q trunking. TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
D. Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices.
E. Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and BackboneFast for faster network reconvergence.
F. Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network, regardless of the multiple number of VLANs.
Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
QUESTION 194
Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all
switches in the network. SW_B receives this error message on the console port:
00:06:34:
%CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half
duplex),
with SW_A FastEthernet0/4 (half duplex) ,
with TBA05071417(Cat6K-B) 0/4 (half duplex).
What would be the possible outcome of the problem?
A.
The root port on switch SW_A will automatically transition to full-duplex mode.
B.
The root port on switch SW_B will fallback to full-duplex mode.
C.
The interfaces between switches SW_A and SW_B will transition to a blocking state.
D.
Interface Fa 0/6 on switch SW_B will transition to a forwarding state and create a bridging loop. TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 195
Which two statements are true about BPDU port-guard and BPDU filtering? (Choose two.)
A. BPDU port-guard can be enabled globally, whereas BPDU filtering must be enabled on a per-interface basis.
B. When globally enabled, BPDU port-guard and BPDU filtering apply only to PortFast enabled ports.
C. When globally enabled, BPDU port-guard and BPDU filtering apply only to trunking-enabled ports.
D. When a BPDU is received on a BPDU port-guard enabled port, the interface goes into the err-disabled state.
E. When a BPDU is received on a BPDU filtering enabled port, the interface goes into the err-disabled state.
F. When a BPDU is received on a BPDU filtering enabled port, the interface goes into the STP blocking state.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 196
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the
STP configuration is correct, what will be true about Switch 15?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. All ports will be in forwarding mode.
B. All ports in VLAN 10 will be in forwarding mode.
C. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in blocking mode.
D. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in standby mode.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 197
Refer to the exhibit. Which statement is true?
A. IP traffic matching access list ABC is forwarded through VLANs 5-10.
B. IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.
C. All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list ABC is dropped.
D. All VLAN traffic in VLANs 5-10 that match access list ABC will be forwarded, and all else will be dropped.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 198
Refer to the exhibit. Switch P1S1 is not applying VLAN updates from switch P2S1. What are three
reasons why this is not occurring? (Choose three.)
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. Switch P2S1 is in server mode.
B. Switch P1S1 is in transparent mode.
C. The MD5 digests do not match.
D. The passwords do not match.
E. The VTP domains are different.
F. VTP trap generation is disabled on both switches.
Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
QUESTION 199
Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we conclude about
interfaces Fa0/13 and Fa0/14?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
A. that interfaces Fa0/13 and Fa0/14 are in VLAN 1
B. that interfaces Fa0/13 and Fa0/14 are down
C. that interfaces Fa0/13 and Fa0/14 are trunk interfaces
D. that interfaces Fa0/13 and Fa0/14 have a domain mismatch with another switch
E. that interfaces Fa0/13 and Fa0/14 have a duplex mismatch with another switch
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 200
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?
A. VLAN instance mapping and revision number
B. VLAN instance mapping and member list
C. VLAN instance mapping, revision number, and member list
D. VLAN instance mapping, revision number, member list, and timers
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Cisco 642-812 exam is a challenging Certification Exam. Besides the books, internet is considered to be a treasure house of knowledge. In Flydumps you can find your treasure house of knowledge. This is a site of great help to you. You will encounter the complex questions in the exam, but Passcert can help you to pass the exam easily. Flydumps Latest Cisco 642-812 dumps includes all the knowledge that must be mastered for the purpose of passing the Cisco 642-812 exam.
Welcome to download the newest Examwind 700-505 dumps: http://www.examwind.com/700-505.html
http://www.alnaba.org/sap-c-hanaimp-1-questions-helpful-sap-c-hanaimp-1-exam-guide-with-new-discount/