Welcome to download the newest Examwind 642-647 VCE dumps: http://www.examwind.com/642-647.html
With the help of Cisco 642-384 exam sample questions, candidates can measure themselves accurately against the pass requirement, track their progress and know that they’re ready for the exam not only this if you want to know the style of the exam interface and get some other Cisco 642-384 test prep help then you can use exam questions. The Cisco 642-384 exam materials interface provided by this tool is actually better than the real thing.
QUESTION 55
When troubleshooting poor network performance, which two symptoms would typically be associated with a network layer problem? (Choose two)
A. Packet loss is more than 30 percent
B. There is excessive broadcast traffic
C. There are excessive CRC errors
D. Pings succeed only part of the time
E. Slips are detected on WAN interfaces
F. ARP requests are timing out
Correct Answer: AD Section: (none) Explanation
Explanation/Reference: QUESTION 56
Which screen on the Cisco ASDM home page would you use to see which access list rules are in effect?
A. NAT
B. Interfaces
C. Routing
D. Security Policy
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 57
Which type of antenna is used when coverage in all directions is required?
A. directional
B. bidirectional
C. omnidirectional
D. patch
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 58
Which service should be disabled or filtered via a firewall because an attacker could use the service to download a copy of Cisco IOS software from a router (thereby making the router vulnerable to DOC attacks)?
A. PAD service
B. finger service
C. TCP/UDP
D. BOOTP
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 59
Which two statement best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two)
A. Layer 2 and Layer 3 services can be configured in a CiscoAironet autonomous AP or a Cisco Integrated Services Router
B. Layer 2 services can be configured in a CiscoAironet autonomous AP or a Cisco Integrated Services Router
C. Layer 2 and Layer 3 services can be configured in a CiscoAironet autonomous AP or controllers
D. Layer 3 services can be configured in WLSM
E. Layer 3 services can be configured in WLSE
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 60
Refer to the exhibit.
Switches A and C are running PVST+ STP, and switch B is running 802.1Q STP, if the BPDU of the root in VLAN 1 is better than the BPDU of the root in VLAN 2, then there is no blocking port in the VLAN 2 topology. The BPDU of VLAN 2 never makes a full circle around the topology, it is replaced by the VLAN 1 BPDU on the B_C link, because B runs only one STP merged with VLAN ! STP of PVST+ Thus, there is a forwarding loop What does PVST+ do to correct this?
A. Switch A sends PVST+BPDUs of VLAN 2 (to the SSTP address that is flooded by switch B) towards Switch C. Switch C will put port C-B into a type-inconsistent, which prevents the loop
B. Switch B sends PVST+BPDUs of VLAN 1 (to the SSTP address that is flooded by switch A) towards Switch C. Switch C will put port C-B into a type-inconsistent, which prevents the loop
C. Switch C sends PVST+BPDUs of VLAN 2 (to the SSTP address that is flooded by switch B) towards Switch C. Switch C will put port C-B into a type-inconsistent, which prevents the loop
D. Switch A sends PVST+BPDUs of VLAN 1 (to the SSTP address that is flooded by switch B) towards Switch B. Switch A will put port C-B into a type-inconsistent, which prevents the loop “Pass Any Exam. Any Time.” – www.actualtests.com 21 Cisco 642-384: Practice Exam
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 61
What is used to prevent outside resources from accessing private information within the company?
A. IPsec
B. VPN
C. PIN
D. Firewalls
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 62
Which type of security allows visibility into the state of the operating system and is the only way to inspect encrypted traffic?
A. zero updated architecture
B. network-based security
C. endpoint-based security
D. ACLs
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 63
Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System? (Choose two)
A. allow for guest access
B. increase connection speeds
C. add additional access points
D. network management with CLI
Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 64
To avoid carrying every length of cable, lighting arrestors, and splitters when performing site surveys, engineers can outfit their survey kits with which item?
A. Category 5 cable
B. RP-TNC plug
C. antenna attenuator D. RP-TNC connector
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 65
Which two are components of AAA? (Choose two)
A. access control lists
B. Cisco IOS Software
C. Cisco Secure Access Control Server
D. Security Audit wizard
E. network access server
Correct Answer: CE Section: (none) Explanation
Explanation/Reference:
QUESTION 66
Which three business requirements development activities are performed in the prepare phase before creating a technology strategy? (Choose three)
A. identifying and assessing customer business requirements
B. documenting and categorizing customer business requirements in terms of performance, availability, capacity, and security
C. producing a documented technology strategy
D. creating a bill of materials
E. presenting documented business requirements to a customer and having the customer validate them
F. completing a site survey
Correct Answer: ABE Section: (none) Explanation
Explanation/Reference:
QUESTION 67
Which port-sales SMART Design documents are available to help you better serve your customers? (Choose three)
A. Design Guide
B. Small Business Product Guide
C. Implementation Guide
D. Solution Profile
E. Cisco Configuration Assistant
F. Application Notes
Correct Answer: ACF Section: (none) Explanation Explanation/Reference:
QUESTION 68
Which type of VPN is deal for employees who use a home PC or public computer to access the network?
A. IP secemote access VPN
B. mobile VPN
C. dialup 0ffload VPN
D. SSL VPN
E. GET VPN
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 69
Which benefit can be obtained by using the change management service component in the operate phase?
A. reduced operating costs, due to consistent framework for making necessary changes in an efficient and accountable manner
B. greater accuracy, completeness, and timeliness of network configuration information
C. notification provided to interested parties regarding problems that have been identified, and a system that scales with customer requirements
D. improved system service quality and fewer disruptions
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 70
Refer to the exhibit.
The tables contain information from the Cisco Configuration Professional configurations of Router A and
Router B. Traffic between Host 1 and Host 2 is not successfully establishing the site-to-site VPN between
Router A and Router B.
What is the mostly likely cause of this fault?
A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150199)
B. The IKE encryption methods on the two routers are different
C. The IPSec policy map names on the two routers are different
D. The IPSec rules on the two routers are not permitting the correct interesting traffic
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 71
Which of the following best describe the customer benefits of change management in the operate phase?
A. reduce unnecessary disruption, delays, rework, and other problems by establishing test cases for use in verifying that the system meets operational, functional, and interface requirements
B. improve its ability to make sound financial decisions by developing a business case based on its business requirements and establishing a basis for developing a technology strategy
C. reduce operating costs and limit changE.related incidents by providing a consistent and efficient set of processes
D. improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the system
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 72
Which of these is the best definition of the Cisco Lifecycle Services approach?
A. It defines the minimum set of services required to successfully deploy and operate a set of Cisco technologies.
B. It determines how best to price Cisco products.
C. It provides partners with a useful way to leverage Cisco resources.
D. It consists of these phases: plan, deploy, support, and troubleshoot.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 73
What two types of telephony interfaces are used for PSTN connectivity? (Choose two.)
A. Digital
B. Optical
C. Analog
D. CDMA
Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 74
Which statement correctly describes the keys witch model of deployment for call processing?
A. All IP Phones are able to answer any incoming PSTN call on any line
B. PSTN calls are routed through a receptionist or automated attendant.
C. All IP Phones in the system have a single unique extension number.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 75
Which definition best describes the implementation service component within the implement phase?
A. providing a step-by-step plan that details the installation andservicE.commission tasks required in order to create a controlleD.implementation environment that emulates a customer network
B. assessing the ability of site facilities to accommodate proposed infrastructure changes
C. developing and executingprooF-oF-concept tests, validating high-level infrastructure design, and identifying any design enhancements
D. Installing, configuring and integrating systems components based on an implementation plan developed in earlier phases
E. improving a customer’s infrastructure security system
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 76
A customer with a small enterprise network of 15 remote sites is trying to optimize its VPN by migrating some remote sites using Frame Relay connections to the Internet to using cable connections to the Internet. Minimizing costs is one of the customer’s highest priorities. Only a moderate amount of IP traffic is passing through the network, most of which is from the remote sites to the central site. IPSec should be used to provide VPN functionality and basic confidentiality is desired.
Based on the traffic patterns, which topology would be the easiest for this customer to set up and manage?
A. full mesh
B. partial mesh
C. point-to-multipoint
D. hub and spoke
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 77
How can the proper configuration of Voice Mail be tested at an end user’s IP phone?
A. Press the “i” button.
B. Press the “Settings” button.
C. Press the “Services” button.
D. Press the “Messages” button
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 78
In what location is it recommended that the Cisco Catalyst 6500 Series WLSM be placed?
A. distribution layer
B. core layer
C. access layer
D. network management functional module
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 79
Which of these is an accurate list of Cisco Lifecycle Services phases?
A. initiation, planning, analysis, design, development, implementation, operations and maintenance
B. project planning, site assessment, risk assessment, solution selection and acquisition, testing, and operations
C. Prepare, plan design implement operate, and optimize
D. analysis, design, deployment, testing, implementation, and production I E. presales, project planning, development, implementation, operations testing, and operations sign-off
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 80
What port role assignment would you make for the Gigabit Ethernet port on the Cisco CE520 used in the Smart Business Communications System?
A. IP Phone and desktop
B. Cisco UC520
C. Cisco CE520
D. Cisco 871W
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 81
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.
Which method list and method is used to authenticate the remote access VPN users? (Choose two.)
A. sdm_vpn_xauth_ml_1
B. sdm_ypn_group_ml_1
C. SDM_CMAP_1
D. local database on the ISR
E. remote TACACS+ server
F. remote Radius Server
Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 82
Refer to the exhibit. Switches A and C are running PVST+ STP, and Switch B is running 802.10 STP. If the
BPDU of the root in VLAN 1 is better than the BPDU of the root in VLAN 2, then there is no blocking port in
the VLAN topology. The BPDU of VLAN 2 never makes a “full circle” around the topology; it is replaced by
the VLAN 1 BPDU on the B. C link, because B runs only one STP merged with VLAN 1 STP of PVST+.
Thus, there is a forwardin loop.
What does PVST+ do to correct this?
A. Switch A sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B) towards Switch C. Switch C will put port C.B into a typE.inconsistent state, which prevents the loop.
B. Switch B sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch A) towards Switch C. Switch C will put port C.B into a typE.inconsistent state, which prevents the loop.
C. Switch C sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B) towards Switch C. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop.
D. Switch A sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch B) towards Switch B. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop. Switch B sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch A) towards Switch C. Switch C will put port C.B into a typE.inconsistent state, which prevents the loop.
E. Switch C sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B) towards Switch C. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop.
F. Switch A sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch B) towards Switch B. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 83
Which interface on the Cisco UC520 is assigned an IP address either statically or through DHCP?
A. Switch B sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch A) towards Switch C. Switch C will put port C.B into a typE.inconsistent state, which prevents the loop.
B. Switch C sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B) towards Switch C. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop.
C. Switch A sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch B) towards Switch B. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop. Switch B sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch A) towards Switch C. Switch C will put port C.B into a typE.inconsistent state, which prevents the loop.
D. Switch C sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B) towards Switch C. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop.
E. Switch A sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch B) towards Switch B. Switch A will put port C.B into a typE.inconsistent state, which prevents the loop.
F. WAN interface
G. LAN interface
H. Switch port
I. PSTN Interface
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 84
Which benefit can be obtained by using the change management service component in the operate phase?
A. Reduced operating costs due to a consistent framework for making necessary changes in an efficient and accountable manner
B. Greater accuracy, completeness, and timeliness of network configuration information
C. Notification provided to interested parties regarding problems that have been identified, and a system that scales with customer requirements
D. Improved system service quality and fewer disruptions
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 85
What are two ways to test the LAN connectivity on the Cisco CE520? (Choose two.)
A. Ping the IP address of the Cisco-Data Access VLAN from the Cisco UC520 console.
B. Ping the IP address of the Cisco-Data VLAN from a device attached to the Cisco CE520
C. Ping default gateway from the Cisco UC520.
D. Ping the IP address of the Cisco-voice VLAN from a device attached to the Cisco CE520.
E. Ping default gateway from the Cisco CE520.
F. Ping the IP address of the Cisco-Distribution VLAN from the Cisco UC520 console.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 86
Which statement correctly describes configuration of the VPN server?
A. It requires definition of a Group ID for remote clients.
B. It requires configuration of port settings for the VPN server on the Cisco UC520.
C. It uses apreshared Key for remote device authentication
D. The WAN interface is preselected.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 87
In a new Cisco UC520 installation, when must IP routing be configured?
A. When the service provider assigns static IP information
B. When the service provider assigns dynamic IP information.
C. When analog PSTN trunks are used.
D. When digital PSTN trunks are used.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 88
Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System? (Choose two).
A. allow for guest access
B. increase connection speeds
C. add additional access points
D. network management with CLI
Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 89
Which critical issue should you account for when implementing an integrated network security management design?
A. NAT interoperates with encrypted voice traffic
B. host-based intrusion detection systems reside in the network
C. All network devices aretime.synchronized
D. SNMP community read-write strings are configured to allow for total management access
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 90
In which of these phases is a customer’s current network infrastructure assessed?
A. Plan
B. Design
C. Implement
D. Prepare
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 91
To save time during rediscovery, which three types of device information does Cisco Configuration Assistant retain? (Choose three.)
A. IP Address
B. MAC Address
C. Host Name
D. Communication Protocol
E. Port Settings
F. Topology
Correct Answer: ACD Section: (none) Explanation
Explanation/Reference:
QUESTION 92
Which dial plan scenario may require PSTN trunks for outbound calls?
A. All the employees, the auto attendant or receptionist, and the voiceE-mail system nave direct inward dial numbers using analog trunks.
B. A subset of the employees, the auto attendant or receptionist, and the voiceE-mail system have direct inward dial numbers, and the remaining employees do not have direct inward dial numbers.
C. All the employees, the auto attendant or receptionist, and thevoiceE-mail system have direct inward dial numbers using digital interfaces.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 93
What are two configurable options for Call Control on the Cisco UC520? (Choose two.)
A. Shared Key
B. PBX
C. Key System
D. Encryption
E. Call Waiting
Correct Answer: BC Section: (none) Explanation
Explanation/Reference: QUESTION 94
Refer to the Exhibit. According to Cisco VPN Client Software output Shown, Which two Statement are correct about the connection entry named isr? (Choose Two)
A. HMAC.SHA1 is used to authenticate the remote users.
B. Preshared key is used to authenticate the remote peer
C. AES is used to provide data confidentiality.
D. The Cisco VPN Client software is assigned an internal IP address of 192.168.1.1.
E. The PC that is running the Cisco vpn Client software win not have access to the local LAN once the PC is connected into the VPN
Correct Answer: BE Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 35 Cisco 642-384: Practice Exam
QUESTION 95
Refer to the exhibit. According to the Cisco Adaptive Security Device Manager window, which statement about address translation is correct?
A. Using Network Address Translation, any host on the DMZ1 subnet (172.16.1.0) will be translated to a mapped address on the outside interface of 192.168.1.11. I
B. Using port address translation, DMZ2 host 172.16.10.2 will be translated on DMZ1 to IP address
172.16.1.22 with a dynamically assigned port address.
C. Using Network Address Translation host 10.0 1.10 on the inside network will be dynamically translated to a mapped address from the address pool of 192.168.1.20 to 192.168.1.94.
D. Using port address translation, outside host 192.168.1.10 with a dynamically assigned port address will be translated to 10.0.1.11 on the inside interface.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 96
Which two are benefits of installing Cisco Monitor Director at an SMB site for the partner selling the solution? (Choose two.)
A. simplifies Smart Business Communications System installation
B. allows the end customer to get free software updates
C. monthly recurring revenue mode
D. automated monthly reporting on system performance
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 97
Which Cisco Catalyst Express 520 feature optimizes quality of service?
A. Cisco Configuration Assistant
B. Cisco Smart ports
C. Cisco Network Admission Control
D. Cisco Smart Assist
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 98
Which three business requirements development activities are performed in the prepare phase before creating a technology strategy? (Choose three.)
A. Identifying and assessing customer business requirements
B. Documenting and categorizing customer business requirements in terms of performance, availability, capacity and security
C. Producing a documented technology strategy
D. Creating a bill of materials
E. Presentdocumented business requirements to a customer and having the customer validate them
F. Completing a site survey
Correct Answer: ABE Section: (none) Explanation
Explanation/Reference:
QUESTION 99
Refer to the exhibit. This display has been truncated to remove information that is not relevant to the question. What would be a reason that there have been 21 ignored packets?
A. EthernetO has no CDP neighbors.
B. There are no free input buffers to accept new packets
C. There are no free output buffers for packets, which are traversing the router, to go into for transmission.
D. EthernetO and the neighbor that it is connected to are not running the same routing protocol.
E. This is not a valid error display. The display has been modified to show that there have been ignored packets.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 100
After configuring VTP. you no longer receive updates as expected. Which command can you use to verify the number of VTP advertisements being transmitted?
A. show vtp database
B. show vtp counters
C. showvtp statistics
D. showvtp status
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 101
You enter the command show ip ospf neighbor and see “two-way/DROTHER” listed as the state for neighbor 10.1.1.1. What does this status indicate?
A. The neighbor 10.1 1 1 is not a DR or BDR
B. The neighbor relationship with 10.1.1.1 has not yet completed.
C. DR and BDR election is in progress.
D. The neighbor 10.1.1.1 is the BDR.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 102
Which design phase service component includes the development and documentation of the test case or cases used to verify that a deployed infrastructure meets operational, functional, and interface requirements?
A. Implementation Plan.
B. Business Plan
C. Staging Plan
D. Detailed Design Development
E. Systems Acceptance Test Plan Development
Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 103
Which implement phase service component consists of explaining the benefits and limitations of purchased support options to a customer and ensuring that the customer understands operational processes and responsibilities?
A. Staging and System Migration
B. Post Implementation Support Handoff Meeting
C. Detailed Design Development
D. Staff Training
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 104
In which of these phases is a customer’s network assessed to determine its system readiness?
A. plan
B. design
C. operate
D. implement
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 105
How many voice expansion slots are provided by the Cisco UC520?
A. One
B. two
C. three
D. four
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 106
A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.)
A. switch port port-security
B. switch port port-security tagging
C. switch port accessvlan
D. switch port doublE.tag snooping
E. switch port mode access
Correct Answer: CE Section: (none) Explanation
Explanation/Reference:
QUESTION 107
Which network management tool is designed to allow businesses to manage up to 40 devices?
A. Cisco Works Unrestricted
B. Cisco Works SNMS
C. Campus Manager D. Resource Management Essentials
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 108
You are troubleshooting OSPF neighbor establishment problems, which are occurring over Frame Relay interfaces that use the default OSPF network type. What should you verify in the router configuration?
A. theip ospf network point-to-point statement under the Frame Relay interface
B. The ip ospf priority 0 statement on the Frame Relay interface on the designated router
C. The neighbor statements on the Frame Relay interface
D. The framE.relay map statement on the Frame Relay interface
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Cisco 642-384 tests containing questions that cover all sides of tested subjects that help our members to be prepared and keep high level of professionalism. The main purpose of Cisco 642-384 exam is to provide high quality test that can secure and verify knowledge, give overview of question types and complexity that can be represented on real exam certification.
Welcome to download the newest Examwind 642-647 VCE dumps: http://www.examwind.com/642-647.html
Cisco 642-384 Tests, New Release Cisco 642-384 Dumps PDF Online