Cisco 642-871 Free Dowload, Buy Best Cisco 642-871 Study Guide With Accurate Answers

Important Info: Cisco 642-871 now is offering the latest and 100 percent pass Cisco 642-871 exam questions and answers, by training our vce dumps you can pass Cisco https://www.pass4itsure.com/642-871.html exam easily and quickly. Visit the site Flydumps.com to get the free Cisco 642-871 exam vce and pdf dumps and FREE VCE PLAYER!

QUESTION 60
Your newly appointed Certkiller trainee wants to know which IEEE wireless standard will allow backward compatibility with 802.11b.
What would your reply be?
A. 802.1q
B. 802.11g
C. 802.11a
D. 802.1g
E. 802.11p

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
The 802.11g standard operates in the same unlicensed portion of the 2.4-GHz spectrum as 802.11b. Both the IEEE 802.11g and 802.11a standards provide a 54-Mbps data rate. IEEE 802.11g provides the benefit of backward compatibility with IEEE 802.11b equipment, preserving users investment in their existing WLAN infrastructure.
Reference: Arch student guide p.10-10
QUESTION 61
You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what the maximum number of wireless IP phones that can register with an Access point is.
What would your reply be?
A. 3
B. 7
C. 8
D. 15
E. 33
F. 35
G. 40
H. 57

Correct Answer: B Section: (none) Explanation
QUESTION 62
You are a network administrator at Certkiller. Your newly appointed Certkiller trainee wants to know what the maximum data rate of 802.11b is.
What will your reply be?
A. 2.4 Mbps data
B. 54 Mbps data
C. 1.44 Mbps data
D. 11 Mbps data
E. 2.4 Mbps data

Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
The 802.11b Standard Long established, the 802.11b standard is used today by the majority of installed
wireless LANs.
General Features:

Has a maximum transmission rate per channel of 11Mbps (actual throughput is about 6 to 7Mbps).
Operates in the 2.4GHz radio band.
Supports three channels at distances up to 350 feet.

QUESTION 63
With regard to wireless enterprise networks, which of the following is true?
A. Routing protocols is the most important consideration
B. Power of the transmitter is the most important consideration
C. RF interference is the most important consideration
D. STP domains is the most important consideration
E. Geological environment is the most important consideration

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
It is very important, since the performance of the network depends of it.
You can use RF design to minimize the RF radiation in coverage areas or directions not required. For
example, if WLAN coverage is required only in the buildings, then you can minimize the amount of RF
coverage outside the building through access-point placement and direction antennas.
The performance of the WLAN and its equipment depends upon its RF environment.

Reference: Arch student guide p.10-23.

QUESTION 64
Your Certkiller.com trainee Sandra is curios about Cisco wireless LAN.
What should you tell Sandra? (Select two.)
A. Only IP can be transmitted over a wireless LAN
B. All stations in a wireless cell share the bandwidth
C. Wireless LANs use CSMA/CD access method
D. Only one station can send at one time
E. Wireless LANs use a token sharing access method.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference: Explanation:
A WLAN consists of an access point communicating over radio frequency to wireless clietnts. The data rate, power level, and antenna choice affect the size of the coverage area of a single wireless cell, which in turn affects how many access points are required in a specific implementation. This topic describes the wireless communication architecture. Only one station in a wireless cell, including the access point, can send data at any one time (D). The bandwidth is shared among all stations (B). If a station wishes to send, it listens and waits for an available slot. WLANs use carrier sense multiple access collision avoidance (CSMA/CA).
Reference: Arch student guide p.10-6.
QUESTION 65
You are the network administrator at Certkiller. Certkiller has an IEEE 802.11b wireless environment. What is the maximum recommended number of calls using G.711 per access point?
A. 7
B. 15
C. 30
D. 50
E. 100

Correct Answer: A Section: (none) Explanation
Explanation/Reference: Explanation:
The maximum recommended number of phones per access point is seven. This limitation is due to the number of packets that can be forwarded per second over an 802.11 link and minimizing transmission delays, rather than a bandwidth limitation of the link.
Reference: ARCH student guide p.10-35
QUESTION 66
What can be done to ensure connections to workstations that are placed on the edge of a wireless access point’s coverage area?
A. Lower data rates
B. Increase data rates
C. Group access point frequency channels together for increased range
D. Enable multicasting

Correct Answer: A Section: (none) Explanation
Explanation/Reference: Explanation:
Data rates affect cell size. Lower data rates (such as 1 Mbps) can extend farther from the access point than can higher data rates (such as 11 Mbps). Therefore, the data rate (and power level) affects cell coverage and consequently the number of access points required.
Reference: Arch student guide p.10-21
QUESTION 67
You are a network administrator at Certkiller. Your newly appointed Certkiller trainee wants to know what the frequency of 802.11b is.
What will your reply be?
A. 5 GHz
B. 2.4 GHz
C. 1.4 GHz
D. 11 MHz

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
Both 802.11b and 802.11g use frequency 2.4GHz. 802.11b is rated at 11Mbps while 802.11g is rated at 54 Mpbs. 802.11g is backwards capable with 802.11b.
Incorrect:
A. 5 GHz – 802.11A
QUESTION 68
You are the network administrator at Certkiller. The Certkiller network is shown in the following exhibit:

What is the Certkiller VPN topology as shown in the illustration?
A. Full-mesh VPN
B. Hub-and-spoke VPN
C. Hierarchical VPN
D. Token Ring
E. Private WAN

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 69
Which of the following types of VNP technology is needed when multicast, broadcast and non-IP packets needs to be tunneled?
A. IPSec
B. GRE
C. Triple-DES
D. IKE
E. None of the above.

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
In site-to-site VPNs, the principal tunneling is generic routing encapsulation (GRE). If only IP-unicast packets are being tunneled, simple encapsulation provided by IPSec is suffiecient. GRE is used when multicast, broadcast, and no-IP packets need to be tunneld.
Reference: Arch student guide p.9-7
QUESTION 70
Which of the following will cause Egress Blocking?
A. Packet flooding.
B. Re-transmission of packets blocking all traffic.
C. Large data packets blocking voice packets.
D. Large voice packets blocking data packets.
E. Excessive data fragmentation.

Correct Answer: C Section: (none) Explanation
QUESTION 71
Certkiller Ltd. is a medium-sized company with 12 stationary offices and one head office, where every office is several hundred miles away from the next. You are the network administrator and the CEO of Certkiller wants you to design a VNP. Considering the scenario, what type of VNP would you design?
A. Enterprise remote access VPN
B. Wireless VPN
C. Remote access VPN
D. Site to site VPN
E. Wide area wireless VNP

Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
Since the company is not big the solution may be cost effective. The offices are very far so the internet connection may be used. The best solution here would be site-to-site VPN. Site-to-Site VPNs are an alternative WAN infrastructure used to connect branch offices, home offices, or business partners sites to all or portions of an enterprise’s network. VPNs do not inherently change private WAN requirements, such as support for multiple protocols, high reliablility, and extensive scalability, but instead meet these requirements more cost-effectively and with greater flexibility. Site-to-site VPNs utilize the most pervasive transport technologies available today, such as the public Internet or service provider IP networks, by employing tunneling and encryption for data privacy and QoS for transport reliability.
QUESTION 72
You are a network administrator at Certkiller. You have designed a high availability network based on a redundant network topology. Your newly appointed Certkiller trainee wants to know what the advantages of this design are.
What will your reply be? (Choose two.)
A. It reduces the cost of the network.
B. It can guarantee Quality of Service.
C. Redundant topologies are easier to configure.
D. It allows the secondary path to automatically take over for the primary path.
E. It reduces the impact of individual network device failure.

Correct Answer: DE Section: (none) Explanation
Explanation/Reference: Explanation:
Loss of IP connectivity can be caused by local-link failure, full-loss connectivity by the service provider, or device failure. For a typical remote site, an alternate path (dedicated or dial-on-demand) to the head-end site can protect against local-link failure or loss of service provider connectivity. Protection against a local-device failure at a remote site I is not usually provided unless the importance of connectivity for the remote site warrants the cost. For a typical head-end site, you can achieve redundancy by implementing multiple provider connections and by deploying multiple head-end routers.
Reference: Arch student guide p.9-34
QUESTION 73
You work as a network administrator at the small real estate company Certkiller.com located in Toronto area. Certkiller.com has two locations 100 miles apart. Each site has 10 computers attached to a LAN with high speed Internet access. There is a need to securely transmit large amounts of customer data from one office location to the other.
Which topology would provide a low-cost, secure solution?
A. Individual remote access VPN
B. Leased point-to-point connections
C. ISDN dial-up access
D. Site-to-site IPSec-based VPN

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 74
Which IP NAT implementation allows IPSec peers to establish a connection through a NAT device?
A. PAT
B. PAT-T
C. Dynamic NAT
D. IPSec ESP NAT

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
NAT Traversal (NAT-T) lets IPSec peers establish a connection through a NAT device.
It does this by encapsulating IPSec traffic in UDP datagrams, using port 4500, thereby providing NAT
devices with port information. NAT-T autodetects any NAT devices, and only encapsulates IPSec traffic
when necessary.

Reference: Arch student guide p.9-64

QUESTION 75
What are two benefits of choosing a site-to-site VPN instead of a private WAN? (Choose two)
A. Usually less expensive.
B. Guaranteed bandwidth.
C. Globally available.
D. Increased reliability.

Correct Answer: AC Section: (none) Explanation
Explanation/Reference: Explanation:
Site-to-site VPNs are primarily deployed to connect office locations of an enterprise. They provide an alternative to the WAN infrastructure, while offering significant cost benefits. They enable new infrastructure applications such as extrantet, and extend and enhance network connectivity. Enterprise WAN requirements for traditional private WAN services, such as multiprotocol support, high -availability, scalability, and security, are also requirements for VPNs. VPNs can often meet these requirements more cost-effectively and with greater flexibility than private WAN services using leased lines or virtual circuit technologies such as Frame Relay and ATM.
Reference: Arch student guide p.9-27,9-28.
QUESTION 76
Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?
A. Availability
B. Performance
C. Functionality
D. Manageability
E. Scalability

Correct Answer: C Section: (none) Explanation
QUESTION 77
Which of the following characteristics determines the choice of Layer 1 technology for WAN, remote, or Internet access at the Enterprise Edge? (Choose Two.)
A. Scalability.
B. Transportability
C. Loss
D. Layer 2 technology
E. Layer 1 media
F. All of the above.

Correct Answer: CE Section: (none) Explanation
QUESTION 78
You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know which of the following application characteristics are significant and must be taken into account in the Enterprise Edge design process.
What would your reply be? (Choose three.)
A. Database magnitude
B. Delay sensitivity
C. Data content
D. Bandwidth usage
E. Loss tolerance
F. All of the above.

Correct Answer: BDE Section: (none) Explanation QUESTION 79
You are contracted as a network administrator for a small newly established company, Certkiller.com. The network consists of three buildings that 150 hundred feet apart that are connected via fast Ethernet single-mode fiber. 10Mbps hubs with 100Mbps Ethernet uplinks over multi-mode fibers to a switch in each building provide access to the network. Category 5 wiring connects over 200 users to the hubs.
The CEO of Certkiller wants you to design a new network that will take scalability, performance, manageability, security and availability into account, while still keeping costs low as the company is still relatively new.
What recommendation regarding wiring infrastructure would you include in your network design?
A. Install Category 5e copper to the desktop from the wiring closets.
B. Replace the copper wiring with fiber optic cables will save costs over a longer period.
C. Maintain the current wiring structure.
D. Install multi-mode fiber to the desktop from the wiring closets.
E. Replace the multi-mode fiber within the buildings with single-mode fiber.

Correct Answer: C Section: (none) Explanation
QUESTION 80
Which of the following would you select to keep VLAN design complexity to a minimum? (Choose one option.)
A. Use campus wide VLANs.
B. Use building distribution level VLANs.
C. Use VLANs in the campus backbone.
D. Use per-switch VLANs at the access layer.
E. Use VLANs in the core.
F. All of the above.

Correct Answer: D Section: (none) Explanation
QUESTION 81
Under which of the following circumstances would you consider using OSPF to be a viable choice for use as a routing protocol. (Choose four.)
A. Authentication is required.
B. NBMA connections exist.
C. The network is non-hierarchical.
D. Only internal routes should be considered.
E. Load balancing between multiple routes is required.
F. Fast convergence is necessary.
G. External routes are not an issue.

Correct Answer: ABEF Section: (none) Explanation
Explanation/Reference: Explanation:
OSPF offers these features: 1) With OSPF, there is no limitation on the hop count. The intelligent use of VLSM is very useful in IP address allocation. 2) OSPF uses IP multicast to send link-state updates. This ensures less processing on routers that are not listening to OSPF packets. Updates are only sent when routing changes occur rather than periodically. This ensures a better use of bandwidth. 3) OSPF offers fast convergence because routing changes are propagated instantaneously and not periodically (a characteristic of distance vector routing protocols). 4) OSPF allows for effective load balancing 5) OSPF allows for routing authentication by using different methods of password authentication 6) OSPF allows for the transfer and tagging of external routes injected into an autonomous system. This keeps track of external routes injected by exterior protocols such as Border Gateway Protocol (BGP).
Reference: Arch student guide p.2-49
QUESTION 82
You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know which of the objectives mentioned below meet the requirements for the Server Farm module.
What would your reply be? (Choose Two.)
A. Provide availability with overall network design.
B. Provide medium switch port density.
C. Provide remote dial-up access.
D. Provide up to 100 Gbps of outbound capacity.
E. Provide scalability with switches and server load balancing.
F. All of the above.

Correct Answer: AE Section: (none) Explanation
QUESTION 83
In which networks would it be the norm to use Static Routing? (Choose two.)
A. Dial-on-demand networks
B. Smaller expanding networks
C. Stub networks
D. Token ring networks.
E. Multi-homed networks
F. Not so stubby network

Correct Answer: AC Section: (none) Explanation
Explanation/Reference: Explanation:
Static routing is primarily use for:
1) Routing to and from stub networks. A stub network only carries traffic for local hosts, and typically has
only one entry/ exit point. Even if it has paths to more than one other network, it does not carry traffic for
other networks.
2) Smaller network that are noet expected to grow significantly.
3) Supporting special features such as dial-on-demand routing (DDR) and on-demand routing 4)
Specifying routes toward dialing peers in dial-in environments.

Reference: Arch student guide p.2-46.

QUESTION 84
When selecting a router for an Edge solution, which is the first step that you, the Certkiller technician, would use Cisco Product Advisor for?
A. To determine the environment in which the router will be used.
B. To select the number of WAN ports required.
C. To determine types of protocols to be supported.
D. To select the appropriate switches.
E. To select the number of LAN ports required.

Correct Answer: A Section: (none) Explanation
QUESTION 85
Which of the following are characteristic in defining a Campus Backbone submodule? (Choose Three.)
A. Partial mesh generally used to avoid redundant links.
B. Usually, no policy enforcement.
C. Provides high speed, low overhead of low latency switching.
D. Full mesh to allow redundancy.
E. Implements policy-based filtering.
F. Transports aggregate traffic from the other submodules and functional areas.
G. All of the above.

Correct Answer: BCF Section: (none) Explanation
QUESTION 86
What are the design options that will allow network segmentation? (Choose two.)
A. VLANs
B. Token Ring
C. Ethernet Trunking
D. Separate, flat networks
E. Rapid Spanning Tree (RST)

Correct Answer: AD Section: (none) Explanation
QUESTION 87
Which of the following application characteristics are important to the Enterprise Edge design process? (Choose three.)
A. Data content
B. Bandwidth usage
C. Database size
D. Delay sensitivity
E. Loss tolerance

Correct Answer: BDE Section: (none) Explanation QUESTION 88
Which two routing protocols are more appropriate in an NBMA environment? (Choose two)
A. IGRP
B. RIPv2
C. EIGRP
D. OSPF

Correct Answer: CD Section: (none) Explanation
Explanation/Reference: Explanation:
D: Intitialy OSPF was designed for networks that consisted of point-to-point links, but later it was successfully adapted for operation in LAN and NBMA environments.
C: EIGRP is suitable for nonbroadcast multi-access (NBMA) environments where there are split horizon issues, such as with Frame Relay or ATM multipoint interfaces. Not B or A: Use of RIP and RIPv2 in NBMA networks is not appropriate because of large bandwidth requirements at the Network Management module of a campus network design
QUESTION 89
Cisco has various management tools aimed at various markets. Which of the following Cisco network management tools is targeted toward small to medium-size business?
A. Netsys
B. CiscoWorks Lite
C. CiscoWorks Standard
D. CiscoWorks Premium
E. CiscoWorks for Windows

Correct Answer: E Section: (none) Explanation
QUESTION 90
Certkiller has 1500 managed devices and 15,000 end users on a campus network.
LAN Management Solution (LMS) is being deployed as the network management application.

What is the recommended number of network management server(s)?

A. 1
B. 2
C. 3
D. 4

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 91
Which statement about CiscoWorks 2000 Inventory Manager is true?
A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
Inventory Manager: Inventory Manager provides current inventory of all Cisco devices (routers, switches, firewalls) in the network, including support for Cisco CallManager, VPN concentrator, and WAN switches. Hardware and software summary information, includes detailed reports for groups of devices, memory, flash, software version, interface, and stack modules.
Reference: Arch student guide p.4-19
QUESTION 92
According to good network design practices, what should be done to segment a physical network? (Choose three)
A. Use Layer 3 switching to reduce the scope of broadcast domains.
B. Use Layer 3 switching to reduce the scope of failure domains.
C. Use a Layer 2, switched domain to reduce the size of a collision domain.
D. Use Layer 2 switched domains to increase the size of a policy domain.
E. Use access control list to define policy domains.
F. Use access control lists to define failure domains.

Correct Answer: ACE Section: (none) Explanation
QUESTION 93
Which factors in a business environment will increase the need for remote access? (Choose Two.)
A. The ability to provide a more flexible work environment.
B. The need for authentication.
C. The rising costs of office space.
D. The need for a means of charging back leasing costs.
E. All of the above.

Correct Answer: AC Section: (none) Explanation
Explanation/Reference: Explanation:
A. Having remote users will decrease the need for additional office space.
C. Allowing users to work from home provide a more flexible work environment.
Incorrect Answers:
B. The need for authentication would not suggest a need for remote access.
D. Irrelevant
QUESTION 94
What are the features that influence Redundancy requirements of a WAN from a branch office to a regional office? (Choose Two.)
A. Impact if the site is an aggregation point.
B. Impact of the site is non-existent or unavailable.
C. Routing and switching requirements
D. Critical importance of the site and the number of users.
E. All of the above.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference: Explanation:
The correct answers should be:
-criticality of the site – number of users According to Cisco.
Not A: The official Cisco course notes “Designing Cisco Network Service Architectures (ARCH) v1.2”
states on page 3-16 “Branch offices normally do not act as aggregation points. Redundancy depends on
the criticality of the site and the number of users”.

QUESTION 95
Your newly appointed Certkiller trainee wants to know which ATM service class will not allow delay or loss and is the most appropriate for traffic.
What would your reply be?
A. Real Time Variable Bit Rate (rt-VBR)
B. Constant Bit Rate (CBR)
C. Virtual Time Variable Bit Rate (vt-VBR)
D. Available Bit Rate (ABR)
E. Unspecified Bit Rate (UBR)
F. Non-Real Time Bit Rate (nrt-VBR)

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
Constant bit rate (CBR): This traffic category has a bandwidth guarantee. Use it for traffic least tolerant of delay or loss.
Reference: Arch student guide p.3-35.
QUESTION 96
Which one of the following application requirements would make DSL an inappropriate choice for a Layer 1 technology?
A. Low cost
B. High bandwidth
C. High link quality
D. Always on
E. All of the above

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
Enterprises are increasingly turning to DSL to expand the use of telecommuting, reduce costs, and provide Internet-based services. DSL offers always-on access, allowing users to work at remote offices as if they were on site.
Reference: Arch student guide p.3-66
QUESTION 97
When designing a network for an online bookstore, the availability of which two Enterprise Edge modules would be the most critical issue? (Select two)
A. WAN module
B. Internet Connectivity module
C. Remote Access and VNP module
D. E-commerce module

Correct Answer: BD Section: (none) Explanation
Explanation/Reference: Explanation:
For book store the most critical are E-Commerce and Internet Connectivity module.
E-Commerce: Enables enterprises to deploy e-commerce applications and take advantage of the Internet.
All e-commerce transactions pass through a series of intelligent services to provide performance,
scalability, and availability within the overall e-commerce network design.

Internet connectivity: Provides internal users with connectivity to Internet services.
Internet users can access the information on publicly available servers. Additionally, this module accepts
Virtual Private Network (VPN) traffic from remote users and remote sites and forwards it to the Remote
Access and VPN module.

Reference: Arch student guide p.3-5

QUESTION 98
You are a network administrator at Certkiller. Certkiller has an ATM network.
Your newly appointed Certkiller trainee wants to know which method is used to prevent large data volumes from delaying voice packets on the Certkiller network.
What will your reply be?
A. CCS
B. FRF.11
C. Increased MTU
D. Separate VCs for data and voice

Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
All other answers are wrong. With separate Vc you could easily assign different QOS parameters
QUESTION 99
You are a network administrator at Certkiller. Certkiller has a regional office in London and branch offices in Newcastle, Oxford, and Liverpool. You need to provide redundancy from Oxford office to the office in London.
What two choices can you make? (Choose two.)
A. Multiple Frame Relay PVCs
B. Dual Wan links to the regional office
C. Dual Wan links to another branch office
D. Single links – one to the regional office and one to another office

Correct Answer: BD Section: (none) Explanation
Explanation/Reference: Explanation:
If the branch office requires redundant links, the design will use either dual WAN links to two different regions or connect to another branch that connects to a regional site. The link between two branch offices is generally the minimum amount of bandwidth to support each branch. In that case, oversize the link between the branch and regional site to support a fraction of the bandwidth (usually half) of the other branch site. A third method is to implement a dial-on-demand circuit through either ISDN or the PSTN.
Reference: Arch student guide p.3-22.
QUESTION 100
Which two statements are true about MLP interleaving? (Choose two)
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of the larger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved, even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are no longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Previous implementations of Cisco IOS Multilink PPP (MLP) include support for Link Fragmentation Interleaving (LFI). This feature allows the delivery of delay-sensitive packets, such as the packets of a Voice call, to be expedited by omitting the PPP Multilink Protocol header and sending the packets as raw PPP packets in between the fragments of larger data packets. This feature works well on bundles consisting of a single link. However, when the bundle contains multiple links there is no way to keep the interleaved packets in sequence with respect to each other. Interleaving on MLP allows large packets to be multilink encapsulated and fragmented into a small enough size to satisfy the delay requirement of real-time traffic; small real-time packets are not multilink encapsulated and are transmitted between fragments of the large packets.
QUESTION 101

A network administrator is designing the routing schema to be used for the WAN connections between the corporate headquarters and the branch offices. Each of the branch offices has its own network server providing most of the local services needed. The branch offices need only periodic connectivity to the corporate headquarters, so ISDN BRI in a DDR configuration was chosen for WAN connectivity.
Which two routing protocols are most appropriate for this network? (Choose two)
A. RIPv2
B. IGRP
C. EIGRP
D. OSPD
E. IS-IS

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Because both these routing protocol have a feature call snapshot routing.

The following routing protocols are supported for snapshot routing :

1 – RTMP.
2 – RTP.
3 – RIPv2.
4 – IGRP.
5 – Novel IPX – RIP and SAP

QUESTION 102
You are the network administrator at Certkiller. Certkiller has been issued a portion of a Class C address from their ISP. There are 320 users that will need access to the Internet. The CEO now wants you to design a network that requires private internal addressing for the users within the company and also requires a website for external users.
Which types of Network Address Translation would you propose? (Choose two.)
A. Static
B. Overlapping
C. Persistent
D. Dynamic

Correct Answer: AD Section: (none) Explanation
Explanation/Reference: Explanation:
Static NAT would be good for the Web server. Dynamic NAT should be used for the 320 users of the
company.
Static NAT: Maps an unregistered IP address to a registered IP address on a one-to-one basis. Static NAT
is particularly useful when a device needs to be accessible from outside the network.
Dynamic NAT: Maps an unregistered IP address to a registered IP address from a group of registered IP
addresses.

QUESTION 103
Certkiller has obtained a block of public Internet addresses to provide addresses for their publicly accessed services. Part of the Certkiller.com corporate network is illustrated in the network topology exhibit.

Which one of the following statements is the best design for the Internet connectivity solution?
A. To facilitate Internet connection load sharing, static routing should be used on the Internet routers, with static routes on each Internet router pointing to the networks hosted by the ISP connected to the router.
B. To enable the proper redundancy capabilities of multi-homing, a BGP connection should be made to ISP A, and floating static routes should be installed to direct traffic to ISP B.
C. To enable the proper redundancy capabilities of multi-homing, a BGP connection should be made both ISP A and ISP B.
D. To facilitate Internet connection load sharing, the Internet routers should be configured to run HSRP.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 104
Certkiller.com, an insurance company, has a single link to the Internet through a local ISP. The ISP provides web hosting for Certkiller.com. E-mail is the main application for 175 users at Certkiller.com’s single office. The remaining 750 employees at Certkiller.com are involved in the manufacturing process and do not have network access. Fifteen host devices, available in kiosks to all employees, are used for internal human resource applications.
You are now required to recommend a suitable routing mechanism for the Certkiller.com enterprise edge.
A. RIP V2
B. BGP
C. Default route
D. IBGP
E. EBGP

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
When Implementing a single-homed system, the routing decision is to use default routes pointing to the network that connects the site to the ISP. The default route is then advertised throughout the corporate site, so that any packets with an unknown destination are forwarded to the ISP.
Reference: Arch student guide p.3-57.
QUESTION 105
Certkiller uses a single ISP connection. Certkiller is finishing development of a web site that will be used for catalog information and sales to external customers. The web site is expected to have a large amount of traffic. Certkiller has 2,800 internal network users, of which 300 require simultaneous external Internet connectivity.
What should be designed into the network to improve accessibility to Certkiller ‘s web site?
A. Mirrored server farm
B. Multi-homed ISPs
C. Redundant distribution routers
D. Firewall

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
ISP multi-homing solutions improve availability and load balancing for WANs that use the Internet. Multiple connections, known as multi-homing, reduce the chance of a potentially catastrophic shutdown if one of the connections should fail. Multi-homing really makes a difference if one connection to an ISP fails. As soon as the router assigned to connect to that ISP determines that the connection is down, it will reroute all data through one of the other routers.
Reference: Arch student guide p.3-89
QUESTION 106
In an Internet e-commerce, browser-based application, which method can have the greatest impact on optimizing WAN bandwidth usage?
A. Multiplexing
B. Compression
C. Content networking
D. Secure sockets layer (SSL)

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
Content networking with its WCCP mechanism provides cashing of web pages and pictures which user already loaded so if he want to load the webpage again it loads from the local cash, not from the Internet.
This optimizes WAN bandwidth usage.
QUESTION 107
The SAFE medium network design suggest which of the following modules?
A. Campus infrastructure and Internet connectivity.
B. Campus infrastructure, Internet connectivity, and network management.
C. Corporate Internet, campus, and WAN.
D. Frame/ATM and ISP edge.

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Reference: Arch student guide p.6-82
QUESTION 108
A network vulnerability scanner is part of which critical element of network and system security?
A. Host security
B. Perimeter security
C. Security monitoring
D. Policy management

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
Intrusion protection: To ensure that a network remains secure, it is important to regularly test and monitor the state of security preparation. Network vulnerability scanners can proactively identify areas of weakness, and intrusion detection systems can monitor and respond to security events as the occur. Using security monitoring solutions, organizations can obtain unprecedented visibility into both the network data stream and the security posture of the network.
Reference: Arch student guide p.6-22
QUESTION 109
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?
A. IPSec in tunnel mode.
B. IPSec in transport mode.
C. GRE with IPSec in transport mode.
D. GRE with IPSec in tunnel mode.

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Reference: Arch student guide p.9-40, 9-41.
QUESTION 110
Which of the following IOS queuing features are recommended at present to use as queuing method when sending voice traffic?
A. WFQ
B. IO RTP Priority
C. CQ
D. PQ
E. Codec
F. LLQ
G. ARQ
Correct Answer: F Section: (none) Explanation

Explanation/Reference:Explanation:
In choosing from among the many available prioritization sc hemes, the major factors to consider include the type of traffic involved and the type of media on the WAN. For multiservice traffic over an IP WAN, Cisco recommends low-latency queuing (LLQ) for low-speed links. LLQ allows up to 64 traffic classes with the ability to specify, for example, strict priority queuing behavior for voice and interactive video. A minimum bandwidth for Systems Network Architecture (SNA) data and market data feeds, and weighted fair queuing for other traffic types.
Reference: Arch student guide p.11-77.

Flydumps is ready to provide Cisco 642-871 candidates with Cisco 642-871 training materials which can be very much helpful for getting Cisco https://www.pass4itsure.com/642-871.html certification, which means that candidates.Cisco 642-871 can easily get access to the services of Cisco 642-871 for practice exam, which will assure them 100% Cisco 642-871 success rate.Though Cisco 642-871 tests are not easy at all,but they do not make Cisco 642-871 things complicated.

You may also like