Cisco 642-811 Study Guides, Helpful Cisco 642-811 Practice Questions With Low Price

important Info: These new valid Cisco https://www.pass4itsure.com/642-811.html exam questions were updated in recent days by Cisco 642-811,please visit our website to get the full version of new Cisco 642-811 exam dumps with free version of new VCE Player, you can pass the exam easily by training it!

QUESTION 66
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge. Which switch should the administrator configure as the root bridge and which configuration command must the administrator enter to accomplish this?

A. DSW11(config)# spanning-tree vlan 1 priority 4096
B. DSW12(config)# set spanning-tree priority 4096
C. ASW13(config)# spanning-tree vlan 1 priority 4096
D. DSW11(config)# set spanning-tree priority 4096
E. DSW12(config)# spanning-tree vlan 1 priority 4096
F. ASW13(config)# set spanning-tree priority 4096

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 67
When IP multicast is enabled via PIM, which mode uses the flood and prune method?
A. PIM sparse-dense
B. Bidir-PIM
C. PIM-RP
D. PIM-DM
E. PIM-SM

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 68
Refer to the exhibit. What statement is true about the configuration on switch CAT1?

A. The configuration overrides 802.1p priorities on packets entering ports Fa0/11 and Fa0/12 with a value of 48.
B. The configuration establishes policed DSCP on ports Fa0/11 and Fa0/12 with values ranging from 8 to
56.
C. The configuration overrides the Quality of Service value in packets entering ports Fa0/11 and Fa0/12 with a value of 45.
D. Two IP phones with the MAC addresses of 0008.8595.d1a7 and 0007.8595.d2b7 are connected to CAT1 ports Fa0/11 and Fa0/12, respectively.
E. Security violation shutdown mode has been activated for ports Fa0/11 and Fa0/12.
F. Untagged Port VLAN ID (PVID) frames will carry voice traffic on VLAN 40.
Correct Answer: D Section: (none) Explanation

Explanation/Reference:
QUESTION 69
On a 3550 EMI switch, which three types of interfaces can be used to configure HSRP? (Choose three.)
A. loopback interface
B. SVI interface
C. routed port
D. access port
E. EtherChannel port channel
F. BVI interface

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 70
What are three possible router states of HSRP routers on a LAN? (Choose three.)
A. standby
B. established
C. active
D. idle
E. backup
F. init

Correct Answer: ACF Section: (none) Explanation
Explanation/Reference:
QUESTION 71
How does VTP pruning enhance network bandwidth?
A. by restricting unicast traffic to across VTP domains
B. by reducing unnecessary flooding of traffic to inactive VLANs
C. by limiting the spreading of VLAN information
D. by disabling periodic VTP updates

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 72
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? (Choose two.)

A. BPDUs will be sent out every two seconds.
B. The time spent in the listening state will be 30 seconds.
C. The time spent in the learning state will be 15 seconds.
D. The maximum length of time that the BPDU information will be saved is 30 seconds.
E. This switch is the root bridge for VLAN 200.
F. BPDUs will be sent out every 10 seconds.

Correct Answer: BF Section: (none) Explanation
Explanation/Reference:
QUESTION 73
Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?

A. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode auto
B. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode passive
C. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode desirable
D. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode on

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 74
Which message type was added to IGMPv2?
A. heartbeat
B. join request
C. leave report
D. status report
E. membership report

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 75
Refer to the exhibit. On the basis of the partial configuration provided in the exhibit, what additional configuration is required to allow the router to properly participate in a PIM sparse-dense mode scenario?

A. The RP configuration needs to be added for the router to participate in dense mode network areas.
B. The RP configuration needs to be added for the router to participate in sparse mode network areas.
C. The PIM dense-mode state, refresh interval needs to be configured.
D. IGMP needs to be enabled on the router.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 76
What is the maximum Ethernet frame size on a trunk link configured using IEEE 802.1Q encapsulation?
A. 1496 Bytes
B. 1500 Bytes
C. 1518 Bytes
D. 1522 Bytes
E. 1548 Bytes

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 77
Which two statements are true about a switched virtual interface (SVI)? (Choose two.)
A. An SVI is created by entering the no switchport command in interface configuration mode.
B. An SVI is created for the default VLAN (VLAN1) to permit remote switch administration by default.
C. An SVI provides a default gateway for a VLAN.
D. Multiple SVIs can be associated with a VLAN.
E. SVI is another name for a routed port.

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 78
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?

A. All ports will be in forwarding mode.
B. All ports in VLAN 10 will be in forwarding mode.
C. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in blocking mode.
D. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in standby mode.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 79
About how long does it take for the port to change from blocking to forwarding when spanning-tree PortFast is enabled?
A. immediately
B. 15 seconds
C. 20 seconds
D. 30 seconds
E. 50 seconds

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 80
Refer to the exhibit. Which two commands would both produce the output in the exhibit? (Choose two.)

A. show standby
B. show standby group 10
C. show glbp 10
D. show glbp disabled
E. show glbp active
F. show glbp standby

Correct Answer: CE Section: (none) Explanation Explanation/Reference:
QUESTION 81
Which two statements are true concerning an Ethernet MAC address that maps to a Layer 3 multicast address? (Choose two.)
A. The first 3 bytes of the Ethernet multicast MAC address are 01:00:5E.
B. The last 3 bytes of the Ethernet multicast MAC address are 01:00:5E.
C. When assigning a Layer 3 multicast address, an Ethernet Layer 2 address is automatically generated from the hardcoded MAC address.
D. The multicast address copies the last 23 bits of the IP address into the last 23 bits of the Ethernet multicast MAC address.
E. The Ethernet multicast address assigns the last 24 bits of the MAC address to all Fs.
F. The Ethernet multicast address assigns the first 24 bits of the MAC address to all Fs.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 82
What does the following command accomplish? Switch(config-mst)#instance 10 vlan 11-12
A. enables a PVST+ instance of 10 for vlan 11 and vlan 12
B. enables vlan 11 and vlan 12 to be part of the MST region 10
C. maps vlan 11 and vlan 12 to the MST instance of 10
D. creates an Internal Spanning Tree (IST) instance of 10 for vlan 11 and vlan 12
E. creates a Common Spanning Tree (CST) instance of 10 for vlan 11 and vlan 12
F. starts two instances of MST, one instance for vlan 11 and another instance for vlan 12

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 83
Which two statements are true about Internet Group Management Protocol (IGMP) snooping? (Choose two.)
A. IGMP snooping and Cisco Group Membership Protocol (CGMP) can be used simultaneously on a switch.
B. IGMP snooping and Cisco Group Membership Protocol (CGMP) were developed to help Layer 3 switches make intelligent forwarding decisions on their own.
C. IGMP snooping examines IGMP join/leave messages so that multicast traffic is forwarded only to hosts that sent an IGMP message toward the router.
D. IGMP snooping is an IP multicast constraining mechanism for Layer 2 switches.
E. IGMP snooping is enabled with the ip multicast-routing global configuration command.

Correct Answer: CD Section: (none) Explanation
Explanation/Reference: QUESTION 84
Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value?
A. VTP
B. 802.1Q
C. DTP
D. ISL

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 85
Which three statements are true of the Port Aggregation Protocol (PAgP)? (Choose three.)
A. PAgP is a standards-based protocol defined in IEEE 802.3ad.
B. PAgP is used to connect to non-Cisco devices.
C. PAgP packets are sent with the command channel-group 1 mode desirable.
D. PAgP does not require the STP costs to be the same in order to form an EtherChannel.
E. An Etherchannel link will form if one end of the channel is configured as active and the other end as passive mode.
F. An Etherchannel link will form if one end of the channel is configured as auto and the other end as desirable mode.

Correct Answer: CDF Section: (none) Explanation
Explanation/Reference:
QUESTION 86
When authentication is required, where must 802.1x be configured in order to connect a PC to a switch?
A. client PC only
B. switch port only
C. switch port and client PC
D. switch port and local router port

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 87
Assuming that VLAN 1 and VLAN 2 traffic is enabled on the above network, what effect will the following command have when entered on port 0/2 on Switch Aspanning-tree vlan 1 port-priority 16

A. VLAN 1 traffic will be blocked on Switch B port 1/1.
B. VLAN 2 traffic will be blocked on Switch B port 1/1.
C. VLAN 2 traffic will be blocked on Switch A port 0/2.
D. VLANs 1 and 2 will be blocked on Switch A port 0/1.
E. VLANs 1 and 2 will be blocked on Switch A port 0/2.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 88
LAB
Refer to question 13.

Router name and IP address may be different.
e
A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center
QUESTION 89
What is the cause of jitter?
A. variable queue delays
B. packet drops
C. transmitting too many small packets
D. compression

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 90
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?

e A. The command will be rejected by the switch.
B. Interfaces FastEthernet0/13 and FastEthernet0/14 will no longer be bundled.
C. Dynamic Trunking Protocol will be turned off on interfaces FastEthernet0/13 and FastEthernet0/14.
D. Interfaces FastEthernet0/13 and FastEthernet0/14 will only allow traffic from the native VLAN.
E. Interfaces FastEthernet0/13 and FastEthernet0/14 will continue to pass traffic for VLANs 88,100,360.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 91
Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1. Given the output that was generated, which two security statement are true? (Choose two.)

A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.
B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.
C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict command.
D. When the number of secure IP addresses reaches 10, the interface will immediately shut down.
E. When the number of secure MAC addresses reaches 10, the interface will immediately shut down and an SNMP trap notification will be sent.

Correct Answer: BE Section: (none) Explanation Explanation/Reference:
QUESTION 92
Which three statements are true about the Internet Group Management Protocol (IGMP)? (Choose three.)
A. IGMP is a multicast routing protocol that makes packet-forwarding decisions independent of other routing protocols such as EIGRP.
B. IGMP is used to register individual hosts with a multicast group.
C. IGMP messages are IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1.
D. IGMP snooping runs on Layer 3 routers.
E. IGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic from.
F. There are three IGMP modes: dense mode, sparse mode, and sparse-dense mode.

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 93
Observe the above diagram. Spanning tree is enabled on all devices. Currently either Switch B or C can serve as the root should Switch A fail. A client recently connected Device D, a PC running switching application software, to Switch C port P3/3. The administrator would like to configure Root Guard to ensure that Device D does not assume the role of root. All other parameters must stay the same. On which interface(s) must Root Guard be enabled?

A. P1/2
B. P2/2
C. P3/3
D. P1/1 and P1/2
E. P1/2 and P2/2
F. P1/2, P2/2 and P3/3

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 94
Refer to the exhibit. Given the partial output, which statement is true?

A. The console port will require authentication through TACACS+.
B. The console port will not require any authentication.
C. Users logging in through the network ports will have authentication verified through TACACS+.
D. PPP authentication will be authenticated through the TACACS+ server first.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 95
A network administrator assigns a multicast address of 239.255.8.5 to an application running on a device with an Ethernet MAC address of 01.b2.7d.05.f1.80. Which Layer 2 multicast address will this device use?
A. 01.00.5e.7F.08.05
B. 01.b2.7d.05.f1.80
C. 01.b2.7d.0a.08.05
D. 01.00.5e.05.f1.80
E. ff.ff.ff.ff.ff.ff

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 96
Which statement is true if the spanning tree enhancement Root Guard is enabled?
A. If BPDUs are not received on a nondesignated port, the port is moved into the STP loop-inconsistent blocked state.
B. If BPDUs are received on a PortFast enabled port, the port is disabled.
C. If superior BPDUs are received on a designated port, the interface is placed into the root-inconsistent blocked state.
D. If inferior BPDUs are received on a root port, all blocked ports become alternate paths to the root bridge.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 97
The network operations center has received a call stating that users in VLAN 107 are unable to access resources through Router 1. From the information contained in the graphic, what is the cause of this problem?
A. VLAN 107 does not exist on switch A.
B. VTP is pruning VLAN 107
C. VLAN 107 is not configured on the trunk
D. spanning tree is not enabled on VLAN 107

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 98
Refer to the exhibit. The GigabitEthernet 0/1 interfaces of Switch1 and Switch2 have been properly configured to support trunking. On the basis of the VTP configuration commands that have been issued on Switch1, which command set is required to properly configure VTP on Switch2?

A. Switch2# conf t Switch2(config)# vtp mode serverSwitch2(config)# version 2Switch2(config)# vtp domain eng_groupSwitch2(config)# vtp password switch1
B. Switch2# conf t Switch2(config)# vtp mode serverSwitch2(config)# vtp domain eng_groupSwitch2 (config)# vtp password switch1
C. Switch2# conf t Switch2(config)# vtp mode clientSwitch2(config)# version 2Switch2(config)# vtp domain eng_groupSwitch2(config)# vtp password switch2
D. Switch2# conf t Switch2(config)# vtp mode clientSwitch2(config)# version 2Switch2(config)# vtp domain eng_groupSwitch2(config)# vtp password switch1

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 99
Which type of IGMP message is sent when a network client wants to join a multicast group?
A. host membership query
B. host membership report
C. host membership status
D. host membership notification

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 100
Refer to the exhibit. A network engineer is trying to connect to the console port of Sw2. What authentication process will the switch go through?

A. Authentication will fail because SmartPort has not been enabled.
B. Authentication will fail because an IP address has not been specified for the SmartPort database.
C. The switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the local database.
D. The switch will attempt to authenticate using the enable secret password. If this fails, the switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the password goaway.
E. The switch will contact the SmartPort database. If the SmartPort database is unreachable, the switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the local database.
F. The switch will contact the SmartPort database. If the SmartPort database is unreachable, the switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the enable secret password.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 101
Which three conditions need to be present for UplinkFast to trigger a fast reconfiguration? (Choose three.)
A. The switch must have at least one unblocked port.
B. The switch must have UplinkFast enabled.
C. The switch must be configured for one VLAN.
D. The switch must have at least one blocked port.
E. The failure must be on the root port.
F. The switch must be enabled on a VLAN with switch priority configured.

Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
QUESTION 102
Refer to the exhibit. Based on the configuration provided, how will the user be authenticated?

A. Authentication for all ports will be enforced according to the local database policy.
B. Authentication for all ports will be enforced according to the CON list.
C. The CON list will be used only if the default local authentication failed.
D. No authentication will be required for the console port.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 103
Which router redundancy protocol cannot be configured for interface tracking?
A. HSRP
B. GLBP
C. VRRP
D. SLB
E. RPR
F. RPR+

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 104
Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we conclude about interfaces Fa0/13 and Fa0/14?

A. that interfaces Fa0/13 and Fa0/14 are in VLAN 1
B. that interfaces Fa0/13 and Fa0/14 are down
C. that interfaces Fa0/13 and Fa0/14 are trunk interfaces
D. that interfaces Fa0/13 and Fa0/14 have a domain mismatch with another switch
E. that interfaces Fa0/13 and Fa0/14 have a duplex mismatch with another switch

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 105
Which well-defined routing protocol would a network administrator configure on multicast routers when member routers are widely dispersed?
A. Distance Vector Multicast Routing Protocol (DVMRP)
B. Protocol Independent Multicast Dense Mode (PIM-DM)
C. Multicast Open Shortest Path First (MOSPF)
D. Protocol Independent Multicast Sparse Mode (PIM-SM)
E. Core-Based Trees (CBT)

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 106
What are three functional areas of the Enterprise Composite Network Model? (Choose three.)
A. Enterprise Campus
B. Enterprise Edge
C. Service Provider Edge
D. Building Access
E. Server Farm
F. Campus Backbone
Correct Answer: ABC Section: (none) Explanation

Explanation/Reference:
QUESTION 107
Refer to the exhibit. Why is the line protocol down on interface FastEthernet 0/13 on switch CAT1?

A. Switch CAT1 and switch CAT2 must use ISL encapsulation for these configurations to work.
B. The interfaces on switch CAT1 and switch CAT2 must be in access mode for these configurations to work.
C. Interface FastEthernet 0/13 on switch CAT1 and interface FastEthernet 0/13 on switch CAT2 are in different native VLANs.
D. Interface FastEthernet 0/13 on switch CAT1 and interface Port-channel1 on switch CAT1 are in different native VLANs.
E. Dynamic Trunking Protocol is turned off on interface FastEthernet 0/13 on switch CAT1.
F. Dynamic Trunking Protocol is turned off on interface FastEthernet 0/13 on switch CAT2.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 108
Refer to the exhibit. All switches must be part of a common MST region. On the basis of the information presented in the exhibit, which statement is true?
A. The configuration must be implemented on the MST root switch only.
B. The configuration is optional on the MST root switch.
C. The configuration is mandatory on all MST switches in the MST region.
D. The configuration is optional on all MST switches in the MST region.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 109
What does the Catalyst switch interface configuration command switchport trunk native vlan 7 accomplish?
A. configures the interface to be a trunking port and causes traffic on VLAN 7 to be 802.1q tagged
B. causes the interface to apply ISL framing for traffic on VLAN 7
C. configures the trunking interface to send traffic from VLAN 7 untagged
D. configures the trunking interface to forward traffic from VLAN 7

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 110
Which statement is true about the STP Path Cost on a particular port?
A. It is known only to the local switch where the port resides.
B. It can be modified to help determine Root Bridge selection.
C. Modifying it can cause TCN BPDU to be sent to the Root Bridge.
D. When increased, it can provide higher bandwidth to a connecting port.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 111
Which process plays a major role in the creation of the CEF adjacency table?
A. Address Resolution Protocol (ARP)
B. PDU header rewrite
C. NetFlow switching
D. hello packet exchange

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 112
Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Choose two.)
A. VTP mode
B. STP root status
C. negotiation status
D. management domain
E. configuration revision number

Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
QUESTION 113
Examine the router output above. Which two items are correct? (Choose two.)

A. Router A will assume the active state if its priority is the highest.
B. If Ethernet 0/2 goes down, the standby router will take over.
C. When Ethernet 0/3 of RouterA comes back up, the priority will become 105.
D. The local IP address of Router A is 10.1.0.6.
E. The local IP address of Router A is 10.1.0.20.

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 114
Refer to the exhibit. VLAN 1 and VLAN 2 are configured on the trunked links between Switch A and Switch
B. Port Fa 0/2 on Switch B is currently in a blocking state for both VLANs. What should be done to load balance VLAN traffic between Switch A and Switch B?

A. Lower the port priority for VLAN 1 on port 0/1 for Switch A.
B. Lower the port priority for VLAN 1 on port 0/2 for Switch A.
C. Make the bridge ID of Switch B lower than the ID of Switch A.
D. Enable HSRP on the access ports.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 115
What two pieces of information will the show vlan id 5 command display? (Choose two.)
A. VLAN information on port 0/5
B. ports in VLAN 5
C. MTU and type
D. utilization
E. filters

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 116
In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Choose three.)
A. STP
B. CDP
C. EAP MD5
D. TACACS+
E. EAP-over-LAN
F. protocols not filtered by an ACL

Correct Answer: ABE Section: (none) Explanation
Explanation/Reference:
QUESTION 117
Based on the network diagram and routing table output in the exhibit, which of these statements is true?

A. InterVLAN routing has been configured properly, and the workstations have connectivity to each other.
B. InterVLAN routing will not occur since no routing protocol has been configured.
C. Although interVLAN routing is not enabled, both workstations will have connectivity to each other.
D. Although interVLAN routing is enabled, the workstations will not have connectivity to each other.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 118
A new workstation has consistently been unable to obtain an IP address from the DHCP server when the workstation boots. Older workstations function normally, and the new workstation obtains an address when manually forced to renew its address. What should be configured on the switch to allow the workstation to obtain an IP address at boot?
A. UplinkFast on the switch port connected to the server
B. BackboneFast on the switch port connected to the server
C. PortFast on the switch port connected to the workstation
D. trunking on the switch

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 119
In a static VLAN environment, how does a host join a VLAN?
A. It must be assigned to a VLAN dynamically by the VLAN Server.
B. It automatically assumes the VLAN of the port.
C. It will be assigned to a VLAN based on the username.
D. It will automatically be assigned a VLAN based on its MAC address.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 120
A brand new stand alone Catalyst 3550 switch is being installed. Multiple VLANs will be configured on the switch. What needs to be configured before adding any VLAN to the VLAN database if VTP is in server mode?
A. VTP pruning
B. VTP domain name
C. VTP version number
D. ISL or IEEE 802.1Q trunking

Correct Answer: B Section: (none) Explanation
Explanation/Reference:

Cisco 642-811 Questions and Answers Products basically comprise of the simulated Cisco https://www.pass4itsure.com/642-811.html exam questions AND their most correct answers,accompanied with a methodical elucidation of the Cisco 642-811 answers and the probable wrong answers.The extent to which Cisco 642-811 Questions and Answers Products cover their Cisco subject is so thorough,that once you are done with a Cisco product,passing the Cisco 642-811 exam in first attempt should be a piece of cake.

Continue Reading

Cisco 642-812 Flydumps, New Release Cisco 642-812 Dumps PDF For Download

100% Valid And Pass With latest Cisco 642-812 exam dumps, you will never fail your Cisco 642-812 exam.All the questions and answers are updated and added to the new version timely by our experts.Also now Flydumps is offering free Cisco https://www.pass4itsure.com/642-812.html exam VCE player and PDF files for free on their website.

QUESTION 60
What would happen to a frame if a VLAN port configured as a trunk on the Catalyst switch CK1 were to receive an untagged frame?
A. The frame will cause an error message to be sent.
B. The frame will be dropped.
C. The frame will be processed as a native VLAN frame.
D. The frame will be tagged, and then processed as a native VLAN frame.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
On an IEEE 802.1Q trunk port, all transmitted and received frames are tagged except for those on the
VLAN configured as the native VLAN for the port. Frames on the native VLAN are always transmitted
untagged and are normally received untagged. The default native VLAN is VLAN 1.
Reference:
http://www.cisco.com/en/US/products/hw/optical/ps2006/
products_module_configuration_guide_chapter09186
a

QUESTION 61
Switch CK1 has a trunk link configured with IEEE 802.1Q encapsulation. What is the maximum Ethernet frame size on this trunk port?
A. 1496 Bytes
B. 1500 Bytes
C. 1518 Bytes
D. 1522 Bytes
E. 1548 Bytes

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
The 802.1q tag is 4 bytes; hence the resulting ethernet frame can be as large as 1522 bytes (1518 for the
maximum Ethernet frame size plus the 4 byte 802.1Q tag). The minimum size of the Ethernet frame with
802.1q tagging is 68 bytes.
Reference:
http://www.cisco.com/en/US/tech/ CK3 89/ CK3 90/technologies_tech_note09186a0080094665.shtml

QUESTION 62
The original frame is encapsulated and an additional header is added before the frame is carried over a trunk link. At the receive end, the header is removed and the frame is forwarded to the assigned VLAN.
This describes which technology?
A. DISL
B. DTP
C. IEEE802.1Q
D. ISL
E. MPLS

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 63
Assuming you have an IOS based switch; which command would you execute if you
wanted to specify IEEE 802.1Q encapsulation on a trunked port?
A. Switch(config-if)#switchport trunk encapsulation dot1q
B. Switch(config-if)#switchport encapsulation dot1q
C. Switch(config-if)#switchport trunk encapsulation isl
D. Switch(config)#switchport 0/1 trunk encapsulation isl
E. None of the above

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
Ethernet Trunk Encapsulation Types:

1.
switchport trunk encapsulation isl – Specifies ISL encapsulation on the trunk link.

2.
switchport trunk encapsulation dot1q – Specifies 802.1Q encapsulation on the trunk link.

3.
switchport trunk encapsulation negotiate – Specifies that the interface negotiate with the neighboring interface to become an ISL (preferred) or 802.1Q trunk, depending on the configuration and capabilities of the neighboring interface. The trunking mode, the trunk encapsulation type, and the hardware capabilities of the two connected interfaces determine whether a link becomes an ISL or 802.1Q trunk. Reference: http://www.cisco.com/en/US/products/hw/switches/ps700/ products_configuration_guide_chapter09186a008007 f
QUESTION 64
Two Certkiller switches are connected as shown below:
Which statements are true regarding the configuration of the above pair of switches? (Select two)
A. The trunk is currently using the ISL trunking protocol.
B. The trunk is currently using the 802.1q trunking protocol.
C. By default, all VLANs will be transmitted across this trunk.
D. By default, Switch CK1 and Switch CK2 ‘s Fast Ethernet 0/1 port will not generate DTP messages.
E. By default, the trunk can only support one VLAN, and only that single VLAN is transmitted across the trunk.

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
Explanation:
The second line in each configuration (#switchport trunk encapsulation dot1q) proves that B is correct, as
dot1q is Cisco IOS for 802.1q trunking.

A trunk allows inter-VLAN traffic to flow between directly connected switches. By default, a trunk port is a
member of all VLANs, so traffic for any and all VLANs can travel across this trunk. That includes broadcast
traffic! Reference:
http://www.mcmcse.com/cisco/guides/trunking_and_trunking_protocols.shtml

QUESTION 65
Switches Certkiller 1 and Certkiller 2 are connected as shown in the diagram below:
Use the following output taken from each port Certkiller 1: show config: interface GigabitEthernet0/1 switchport trunk encapsulation dot1q switchport mode dynamic auto no ip address show interface gig0/1 switchport: Name: Gi0/1 Switchport: Enabled Administrative Mode: dynamic auto Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Certkiller 2: show interface gig0/1 switchport: Name: Gi0/1 Switchport Enabled Administrative Mode: dynamic auto Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) In accordance with the above exhibit: what’s preventing the two switches from trunking on the link between them?
A. There is no IP address denied.
B. no shutdown needs to be entered on the interfaces.
C. Both sides are in auto negotiation mode.
D. ISL should be used instead of 802.1q.
E. Access mode VLAN must be different from native mode VLAN.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
In the switchport mode command, you can set the trunking mode to any of the following:

1.
trunk-This setting places the port in permanent trunking mode. The corresponding

switch port at the other end of the trunk should be similarly configured because negotiation is not allowed. You should also manually configure the encapsulation mode.

2.
dynamic desirable (the default)-The port actively attempts to convert the link into
trunking mode. If the far-end switch port is configured to trunk, dynamic desirable, or dynamic auto mode,
trunking is successfully negotiated.
3.
dynamic auto-The port converts the link into trunking mode. If the far-end
switch port is configured to trunk or dynamic desirable, trunking is negotiated.
Because of the passive negotiation behavior, the link never becomes a trunk if both ends of the link are left
to the dynamic auto default.

QUESTION 66
You have just configured an ISL trunk line over Ethernet media between two Cisco Switches, each switch having identical modules, software revisions, and VLAN configurations. Which of the following variables are NOT necessary for the ISL trunk to operate properly? (Select all that apply)
A. Identical trunk negotiation parameters at each end of the link
B. Identical duplex at each end of the link
C. Identical speed at each end of the link
D. Identical native VLAN parameters at each end of the link

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
Explanation: In order for a trunk connection to function properly, it is not necessary for the trunking negotiation parameters to be identical. For example, one end could be configured as “on” and the other could be configured for “auto-negotiate” and the trunk would be operational. Similarly, it is not necessary for the native VLAN parameters to be the same at each end. Incorrect Answers: B, C: One of the requirements for trunking to work is to have both sides of the trunk agree on the speed and duplex settings. Both sides must be configured with identical speed and duplex settings.
QUESTION 67
An ISL trunk connects switches CK1 and CK2 . What is the numerical range of user-configurable ISL VLANs on these switches?
A. 1-1001
B. 0-4095
C. there is no range
D. 0 – 1000
E. None of the above

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: The valid range of user-configurable ISL VLANs is 1-1001. The valid range of VLANs specified in the IEEE 802.1Q standard is 0-4095. In a network environment with non-Cisco devices connected to Cisco switches through 802.1Q trunks, you must map 802.1Q VLAN numbers greater than 1000 to ISL VLAN numbers. 802.1Q VLANs in the range 1-1000 are automatically mapped to the corresponding ISL VLAN. 802.1Q VLAN numbers greater than 1000 must be mapped to an ISL VLAN in order to be recognized and forwarded by Cisco switches.
QUESTION 68
An ISL trunk connects switches CK1 and CK2 . What is true about the Inter-Switch Link (ISL) protocol? (Select two)
A. ISL can be used between Cisco and non-Cisco switch devices.
B. ISL calculates a new CRC field on top of the existing CRC field.
C. ISL adds 4 bytes of protocol-specific information to the original Ethernet frame.
D. ISL adds 30 bytes of protocol-specific information to the original Ethernet frame.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation:
B: A second frame check sequence (FCS) field lies at the end of the frame.
D: ISL is an external tagging process: new 26-byte ISL header is added to the original Ethernet frame. A second 4-byte frame check sequence (FCS) field is added at the end of the frame so 30 bytes of total overhead is added. Incorrect Answers:
A: Cisco’s propriety version of frame tagging is ISL. ISL can only be used between Cisco routers.
C: 30 bytes are added to the Ethernet frame, not 4 bytes. 4 bytes are added using 802.1Q encapsulation.
QUESTION 69
Which of the commands below enables a trunking protocol that appends a four byte CRC to the packet when applied to the Certkiller switch?
A. Switch(config-if)#switchport trunk encapsulation dot1q
B. Switch(config-if)#switchport trunk encapsulation ietf
C. Switch(config-if)#switchport trunk encapsulation fddi
D. Switch(config-if)#switchport trunk encapsulation isl
E. None of the above

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation: ISL is made up of three major components: a header, the original Ethernet frame, and a frame check sequence (FCS) at the end. With ISL, an Ethernet frame is encapsulated with a header that transports VLAN IDs between switches and routers. The 26-byte header containing a 10-bit VLAN ID is added to each frame. In addition, a 4-byte tail is added to the frame to perform a cyclic redundancy check (CRC). This CRC is in addition to any frame checking that the Ethernet frame performs. Reference: Building Cisco Multilayer Switched Networks (Cisco Press) page 99
QUESTION 70
Which statement is true regarding the configuration of ISL trunks?
A. All catalyst switches support ISL trunking.
B. A Catalyst switch will report giants if one side is configured for ISL while the other side is not.
C. ISL trunking requires that native VLANs match.
D. A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.
E. None of the above

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
The 802.1q tag is 4 bytes; hence the resulting ethernet frame can be as large as 1522 bytes. The minimum

size of the Ethernet frame with 802.1q tagging is 68 bytes. ISL frames are the standard MTU used in Ethernet frames, which is 1518 bytes. If one end of the trunk is configured for ISL frames of up to 1518 bytes will be expected on it, while the other end will be sending frames up to 1522 bytes in length. On the ISL configured end, these incoming frames will be considered as giants. This is just one of the reasons why ISL and 802.1Q are incompatible. Incorrect Answers:
A: Not every Cisco switch model supports ISL.
C: In ISL, it is not necessary for the native VLANs to match.
D: Although it is true that each end of a trunk should be configured using the same encapsulation types, it is possible for a switch to have an ISL trunk configured on one port and an 802.1Q trunk on another port.
QUESTION 71
Two Certkiller switches are connected via a trunk using VTP. Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Select two)
A. STP root status
B. VTP mode
C. Negotiation status
D. Management domain
E. Configuration revision number

Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
Explanation:
The role of the VLAN Trunking Protocol (VTP) is to maintain VLAN configuration consistency across the
entire network. VTP is a messaging protocol that uses Layer 2 trunk frames to manage the addition,
deletion, and renaming of VLANs on a network-wide basis from a centralized switch that is in the VTP
server mode. VTP is responsible for synchronizing VLAN information within a VTP domain. This reduces
the need to configure the same VLAN information on each switch.
Using VTP, each Catalyst Family Switch advertises the following on its trunk ports:

1.
Management domain

2.
Configuration revision number

3.
Known VLANs and their specific parameters
QUESTION 72
You need to investigate a VTP problem between two Certkiller switches. The lack of which two prevents VTP information from propagating between switches? (Select two)
A. A root VTP server
B. A trunk port
C. VTP priority
D. VLAN 1
E. None of the above

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation: In Switch tow types of links are available, access and trunk. The interface is in access mode can carry the information of only one VLAN and trunk can carry the information of more than one VLAN. VTP carry the information of more than one vlan so Switch port should be in trunk mode. VLAN1 is the default VLAN on Cisco Switch, by default all interface belongs to VLAN 1.
QUESTION 73
CK1 and CK2 are switches that communicate via VTP. What is the default VTP advertisement intervals in Catalyst switches that are in server or client mode?
A. 30 seconds
B. 5 minutes
C. 1 minute
D. 10 seconds
E. 5 seconds
F. None of the above

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
Periodic ( default is 5 minutes) VTP advertisements are sent out each trunk port with the multicast
destination MAC address 01-00-0C-CC-CC-CC. VTP advertisements contain the following configuration
information:

1.
VLAN IDs (ISL and 802.1Q)

2.
Emulated LAN names (ATM LANE)

3.
802.10 SAID values (FDDI)

4.
VTP domain name

5.
VTP configuration revision number

6.
VLAN configuration, including the maximum transmission unit (MTU) size for each VLAN

7.
Frame format
QUESTION 74
On the network shown below, VTP has been enabled on the trunk links between all switches within the TEST domain. An administrator has recently enabled VTP pruning. Port 1 on Switch Certkiller 1 and port 2 on Switch Certkiller 4 are assigned to VLAN 2. A broadcast is sent from the host connected to Switch Certkiller 1.
Where will the broadcast propagate?
A. Switches Certkiller 1, Certkiller 2 , and Certkiller 4 will receive the broadcast, but only Switch Certkiller 4 will forward it out port 2.
B. Only Switch Certkiller 4 will receive the broadcast and will forward it out port 2.
C. Every switch in the network receives the broadcast and will forward it out all ports.
D. Every switch in the network receives the broadcast, but only Switch Certkiller 4 will forward it out port 2.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
The default behavior of a switch is to propagate broadcast and unknown packets across the network. This
behavior results in a large amount of unnecessary traffic crossing the network.

VTP pruning increases bandwidth efficiency by reducing unnecessary flooding of traffic, such as
broadcast, multicast, unknown, and flooded unicast packets. VTP pruning increases available bandwidth
by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network
devices. By default, VTP pruning is disabled.
Enabling VTP pruning on a VTP server enables pruning for the entire management domain. VTP pruning
takes effect several seconds after it is enabled. By default, VLANs 2 through 1000 or 2 through 1001 are
pruning eligible, depending upon the platform.
VTP pruning does not prune traffic from VLANs that are pruning ineligible. VLAN 1 is always pruning
ineligible and VLAN 1 cannot be removed from a trunk. However, the “VLAN 1 disable on trunk” feature
available on Catalyst 4000, 5000, and 6000 family switches enables the pruning of user traffic, but not
protocol traffic such as CDP and VTP, for VLAN 1 from a trunk. Use the vtp pruning command to make

VLANs pruning eligible on a Cisco IOS-based switch. Switch(vlan)#vtp pruning Once pruning is enabled, use the switchport trunk pruning command to make a specific VLAN pruning ineligible. Switch(config)#interface fastethernet 0/3 Switch(config-if)#switchport trunk pruning vlan remove vlan 5
QUESTION 75
You want to configure switch CK1 to propagate VLAN information across the Certkiller network using VTP. What must be configured on a Cisco switch in order to advertise VLAN information?
A. VTP mode
B. VTP password
C. VTP revision number
D. VTP pruning
E. VTP domain name
F. None of the above

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation: If the switch being installed is the first switch in the network, the management domain will need to be created. However, if the network has other switches running VTP, then the new switch will join an existing management domain. Verify the name of the management domain. If the management domain has been secured, verify and configure the password for the domain. To create a management domain or to add a switch to a management domain, use the vtp domain command in the global configuration mode or VLAN configuration mode. Switch(config)#vtp domain name Switch(vlan)#vtp domain
QUESTION 76
The Certkiller switches have all been upgraded to use VTP version 2. What are two benefits provided in VTP Version 2 that are not available in VTP Version 1? (Select two)
A. VTP version 2 supports Token Ring VLANs
B. VTP version 2 allows VLAN consistency checks
C. VTP version 2 allows active redundant links when used with spanning tree
D. VTP version 2 reduces the amount of configuration necessary
E. VTP version 2 saves VLAN configuration memory

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation: Understanding VTP Version 2 If you use VTP in your network, you must decide whether to use VTP version1 or version2. Note: If you are using VTP in a Token Ring environment, you must use version2. VTP version 2 supports the following features not supported in version1: Token Ring support-VTP version2 supports Token Ring LAN switching and VLANs (Token Ring Bridge Relay Function [TrBRF] and Token Ring Concentrator Relay Function [TrCRF]). Unrecognized Type-Length-Value (TLV) Support-A VTP server or client propagates configuration changes to its other trunks, even for TLVs it is not able to parse. The unrecognized TLV is saved in NVRAM. Version-Dependent Transparent Mode-In VTP version1, a VTP transparent network device inspects VTP messages for the domain name and version, and forwards a message only if the version and domain name match. Because only one domain is supported in the supervisor engine software, VTP version 2 forwards VTP messages in transparent mode without checking the version. Consistency Checks-In VTP version 2, VLAN consistency checks (such as VLAN names and values) are performed only when you enter new information through the CLI or SNMP. Consistency checks are not performed when new information is obtained from a VTP message, or when information is read from NVRAM. If the digest on a received VTP message is correct, its information is accepted without consistency checks. Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2ZY/configuration/guide/ vtp.html#wp1020
QUESTION 77
The Certkiller network administrator needs to enable VTP pruning within the Certkiller network. What action should a network administrator take to enable VTP pruning on an entire management domain?
A. Enable VTP pruning on any switch in the management domain
B. Enable VTP pruning on any client switch in the domain
C. Enable VTP pruning on a VTP server in the management domain
D. Enable VTP pruning on every switch in the domain
E. None of the above

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: The default behavior of a switch is to propagate broadcast and unknown packets across the network. This behavior results in a large amount of unnecessary traffic crossing the network. VTP pruning increases bandwidth efficiency by reducing unnecessary flooding of traffic, such as broadcast, multicast, unknown, and flooded unicast packets. VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. By default, VTP pruning is disabled. Enabling VTP pruning on a VTP server enables pruning for the entire management domain. VTP pruning takes effect several seconds after it is enabled. By default, VLANs 2 through 1000 or 2 through 1001 are pruning eligible, depending upon the platform. VTP pruning does not prune traffic from VLANs that are pruning ineligible. VLAN 1 is always pruning ineligible and VLAN 1 cannot be removed from a trunk. However, the “VLAN 1 disable on trunk” feature available on Catalyst 4000, 5000, and 6000 family switches enables the pruning of user traffic, but not protocol traffic such as CDP and VTP, for VLAN 1 from a trunk. Use the vtp pruning command to make VLANs pruning eligible on a Cisco IOS-based switch. Switch(vlan)#vtp pruning Once pruning is enabled, use the switchport trunk pruning command to make a specific VLAN pruning ineligible. Switch(config)#interface fastethernet 0/3 Switch(config-if)#switchport trunk pruning vlan remove vlan 5
QUESTION 78
VTP is configured on switch CK1 . Which of the following features were added in VTP version 2 that were not previously supported in VTP version 1? (Select two)
A. Supports Token Ring VLANs.
B. Allows VLAN consistency checks.
C. Saves VLAN configuration memory.
D. Reduces the amount of configuration necessary.
E. Allows active redundant links when used with spanning tree.

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation:
VTP Version 2 includes the following improvements: Token Ring VLAN support, TLV support, transparent
mode, and Consistency checks.

Incorrect
Answers:
C, D: These were not improvements added to VTP Version 2.

E: STP detects and prevents loops by logically disabling the redundant path ports so there are no active redundant links.
QUESTION 79
The Certkiller switches are configured to use VTP. What’s true about the VLAN trunking protocol (VTP)? (Select two)
A. VTP messages will not be forwarded over nontrunk links.
B. VTP domain names need to be identical. However, case doesn’t matter.
C. A VTP enabled device which receives multiple advertisements will ignore advertisements with higher configuration revision numbers.
D. A device in “transparent” VTP v.1 mode will not forward VTP messages.
E. VTP pruning allows switches to prune VLANs that do not have any active ports associated with them.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
Explanation:
VTP messages are only transmitted across trunk links.
If the receiving switch is in transparent mode, the configuration is not changed. Switches in transparent
mode do not participate in VTP. If you make VTP or VLAN configuration changes on a switch in
transparent mode, the changes are not propagated to the other switches in the network.
Incorrect
Answers:

B: The VTP domain name is case sensitive and it must be identical with the domain name configured on the VTP server.
C: This is incorrect because if a VTP client receives an advertisement with a higher revision number, it won’t ignore it. In fact, the advertisement with a higher revision level takes precedence when the switch is configured in client mode.
E: VTP pruning enhances network bandwidth use by reducing unnecessary flooded traffic, such as broadcast, multicast, unknown, and flooded unicast packets. VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. It does not prune the individual VLANs.
QUESTION 80
Switch CK1 and CK2 both belong to the Certkiller VTP domain. What’s true about the switch operation in VTP domains? (Select all that apply)
A. A switch can only reside in one management domain
B. A switch is listening to VTP advertisements from their own domain only
C. A switch is listening to VTP advertisements from multi domains
D. A switch can reside in one or more domains
E. VTP is no longer supported on Catalyst switches

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation:
A VTP domain is made up of one or more interconnected devices that share the same VTP domain name.
A switch can be configured to be in only one VTP domain, and each VLAN has a name that is unique

within a management domain.
Typically, you use a VTP domain to ease administrative control of your network or to account for physical
boundaries within your network. However, you can set up as many or as few VTP domains as are
appropriate for your administrative needs. Consider that VTP is transmitted on all trunk connections,
including ISL, IEEE 802.1Q, 802.10, and LANE.
Switches can only belong to one management domain with common VLAN requirements, and they only
care about the neighbors in their own domains.
Reference: CCNP Switching Exam Certification Guide: David Hucaby & Tim Boyles, Cisco Press 2001,
ISBN 1-58720 000-7 page 114

Cisco https://www.pass4itsure.com/642-812.html Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques.“Do I Know This Already?”quizzes open each chapter and allow you to decide how much time you need to spend on each section.Cisco 642-812 lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it.Challenging Cisco 642-812 review questions help you assess your knowledge and reinforce key concepts. Cisco 642-812 exercises help you think about exam objectives in real-world situations,thus increasing recall during exam time.

Continue Reading

Cisco 642-801 Preparation Materials, Up To Date Cisco 642-801 Exam Tests Online Sale

Passed Cisco https://www.pass4itsure.com/642-801.html yesterday on first attempt only using the Exampass premium vce and one corrected answers.Thanks a lot for your valuable update reagding premium dump.It will definitely help me for preparing for the exam before to write.

QUESTION 16
How many update packets would a RIPv2 router send to advertise 77 routes?
A. one update package
B. two update package
C. three update package
D. four update package
E. five update package
F. six update package
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
RIP 2 Packet Format:
The RIP 2 specification (described in RFC 1723) allows more information to be included in RIP packets
and provides a simple authentication mechanism that is not supported by RIP. Figure 47-2 shows the IP
RIP 2
packet format.
The following descriptions summarize the IP RIP 2 packet format fields illustrated in Figure 47-2:
1.
Command-Indicates whether the packet is a request or a response. The request asks that a router send all or a part of its routing table. The response can be an unsolicited regular routing update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are used to convey information from large routing tables.

2.
Version-Specifies the RIP version used. In a RIP packet implementing any of the RIP 2 fields or using authentication, this value is set to 2.

3.
Unused-Has a value set to zero.

4.
Address-family identifier (AFI)-Specifies the address family used. RIPv2’s AFI field functions identically to RFC 1058 RIP’s AFI field, with one exception: If the AFI for the first entry in the message is 0xFFFF, the remainder of the entry contains authentication information. Currently, the only authentication type is simple password.

5.
Route tag-Provides a method for distinguishing between internal routes (learned by RIP) and external routes (learned from other protocols).

6.
IP address-Specifies the IP address for the entry.

7.
Subnet mask-Contains the subnet mask for the entry. If this field is zero, no subnet mask has been specified for the entry.

8.
Next hop-Indicates the IP address of the next hop to which packets for the entry should be forwarded.

9.
Metric-Indicates how many internetwork hops (routers) have been traversed in the trip to the destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route. NoteUp to 25 occurrences of the AFI, Address, and Metric fields are permitted in a single IP RIP packet. That is, up to 25 routing table entries can be listed in a single RIP packet. If the AFI specifies an authenticated message, only 24 routing table entries can be specified. Given that individual table entries aren’t fragmented into multiple packets, RIP does not need a mechanism to resequence datagrams bearing routing table updates from neighboring routers. Since a single update packet can contain at most 25 route entries, 4 packets will be needed to advertise 77 routes.
QUESTION 17
What are three disadvantages of a router-on-stick configuration for InterVLAN routing? (Choose three)
A. InterVLAN routing cannot be filtered by the router.
B. The router becomes a single point of failure for the network.
C. Routers will not route STP BPDUs.
D. There is a possibility of inadequate bandwidth for each VLAN.
E. Additional overhead on the router can occur.
F. NetFlow Switching is required for InterVLAN accounting.
Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
Explanation:
When a single interface is used to route between subnets or networks, this is know as a router-on-a-stick.
To assign multiple IP addresses to the same interface, secondary addresses or subinterfaces are used.
The Advantage is that it is useful when there are limited Ethernet interfaces on the router.
The Disadvantages to this design are:
subnets. resources that will be consumed on the router can become an issue.

QUESTION 18
What are three characteristics of RIPv2? (Choose three)
A. Supports variable-length subnet mask by default.
B. Does not support variable-length subnet mask by default.
C. Supports discontiguous networks by default.
D. Multicast updates to 224.0.0.9.
E. Broadcast updates.
Correct Answer: ACD Section: (none) Explanation Explanation/Reference:
Explanation: Features of RIP v2 To help today’s IP internetworks minimize broadcast traffic, use variable length subnetting to conserve IP addresses, and secure their routing environment from misconfigured or malicious routers, several key features were added to RIP v2. Multicasted RIP Announcements Rather than broadcasting RIP announcements, RIP v2 supports sending RIP announcements to the IP multicast address of 224.0.0.9. Non-RIP nodes are not disturbed by RIP router announcement traffic. Subnet Masks RIP v2 announcements send the subnet mask (also known as a network mask) along with the network ID. RIP v2 can be used in subnetted, supernetted, and variable-length subnet mask environments. Subnets of a network ID do not have to be contiguous (they can be disjointed subnets).
QUESTION 19
The Bellman-Ford algorithm is used by the grand majority of distance vector routing protocols in DUAL (diffusing update algorithm). Which of the following routing protocols is it?
A. IGRP
B. OSPF
C. EIGRP
D. RIP v.2
E. RIP v.1
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: DUAL is used by EIGRP. The Diffusing Update Algorithm (DUAL) is the algorithm used to obtain loop-freedom at every instant throughout a route computation. This allows all routers involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in the recomputation. The DUAL finite state machine embodies the decision process for all route computations. It tracks all routes advertised by all neighbors. The distance information, known as a metric, is used by DUAL to select efficient loop free paths. DUAL selects routes to be inserted into a routing table based on feasible successors. A successor is a neighboring router used for packet forwarding that has a least cost path to a destination that is guaranteed not to be part of a routing loop. When there are no feasible successors but there are neighbors advertising the destination, a recomputation must occur.
QUESTION 20
The Certkiller EIGRP network is displayed in the following topology diagram:

You work as a network technician at Certkiller .com. Study the exhibits carefully. If the command “variance 3” was added to the EIGRP configuration of Certkiller 5, which path or paths would be chosen to route traffic from Certkiller 5 to network X?
A. Certkiller 5- Certkiller 2- Certkiller 1
B. Certkiller 5- Certkiller 2- Certkiller 1 and Certkiller 5- Certkiller 3- Certkiller 1.
C. Certkiller 5- Certkiller 3- Certkiller A and Certkiller 5- Certkiller 4- Certkiller 1.
D. Certkiller 5- Certkiller 2- Certkiller 1, Certkiller 5- Certkiller 3- Certkiller 1, and Certkiller 5- Certkiller 4-Certkiller 1.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: Every routing protocol supports equal cost path load balancing. In addition to that, IGRP and EIGRP also support unequal cost path load balancing. Use the variance command to instruct the router to include routes with a metric less than n times the minimum metric route for that destination, where n is the number specified by the variance command. The variable n can take a value between 1 and 128, with the default being 1, which means equal cost load balancing. Traffic is also distributed among the links with unequal costs, proportionately, with respect to the metric. Reference: http://www.cisco.com/en/US/tech/ CK3 65/technologies_tech_note09186a008009437d.shtml
QUESTION 21
What is the purpose of the “eigrp stub” configuration command?
A. To increase scalability by limiting the EIGRP query range.
B. To reduce the size of the routing table by blocking the D EX (External EIGRP) routes in the EIGRP stub router.
C. To reduce the convergence time by enabling the EIGRP stub router to propagate the EIGRP queries from the EIGRP hub router.
D. To reduce the convergence time by enabling the EIGRP stub router to also perform query requests to the EIGRP hub router.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: Complex, redundant EIGRP networks can cause scalability problems. The best solution to this is to provide a means within the context of the EIGRP protocol itself to control traffic flows and limit query depth. TheEIGRP Stub Router functionality in Cisco IOS Software Release 12.0(7)T can achieve this solution. The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing feature improves network stability, reduces resource utilization, and simplifies stub router configuration. Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network, one or more end (stub) networks are connected to a remote router (the spoke) that is connected to one or more distribution routers (the hub). The remote router is adjacent only to one or more distribution routers. The only route for IP traffic to follow into the remote router is through a distribution router. This type of configuration is commonly used in WAN topologies where the distribution router is directly connected to a WAN. The distribution router can be connected to many more remote routers. Often, the distribution router will be connected to 100 or more remote routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a distribution router, so it becomes unnecessary for the remote router to hold a complete routing table. Generally, the distribution router need not send anything more than a default route to the remote router. When using the EIGRP Stub Routing feature, you need to configure the distribution and remote routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are propagated from the remote (stub) router. The router responds to queries for summaries, connected routes, redistributed static routes, external routes, and internal routes with the message “inaccessible.” A router that is configured as a stub will send a special peer information packet to all neighboring routers to report its status as a stub router. Any neighbor that receives a packet informing it of the stub status will not query the stub router for any routes, and a router that has a stub peer will not query that peer. The stub router will depend on the distribution router to send the proper updates to all peers.
QUESTION 22
The Certkiller OSPF network is displayed below: Refer to the exhibit. All routers have converged and neighbor relationships have been established. Which state is Certkiller 4 in?

A. 2WAY/DROTHER
B. 2WAY/BDR
C. 2WAY/DR
D. FULL/DROTHER
E. FULL/BDR
F. FULL/DR

Correct Answer: F Section: (none) Explanation
Explanation/Reference:
Explanation: The router with the highest OSPF priority on a segment will become the DR for that segment. The same process is repeated for the BDR. In case of a tie, the router with the highest RID will win. The default for the interface OSPF priority is one. Based on the output above, the dead timer shows that the neighbor relationships have already been established, so the state will be Full for all neighbors, and since the OSPF priorities are all set to 1, the router with the highest router ID will be the DR.
QUESTION 23
The Certkiller backbone OSPF network is shown below:

Refer to the exhibit. All routers have been simultaneously rebooted, and neighbor relationships have been established. Which two statements are true? (Choose two.)
A. The Certkiller 1 RID is 1.1.1.1.
B. The Certkiller 1 RID is 10.1.1.1.
C. The Certkiller 1 RID is 192.168.1.1.
D. The Certkiller 2 RID is 10.1.1.2.
E. The Certkiller 2 RID is 192.168.1.2.
F. The Certkiller 2 RID is 192.168.2.1.
Correct Answer: BD Section: (none) Explanation Explanation/Reference:
Explanation: Remember that the RID is the highest IP address on the box or the loopback interface, calculated at boot time or whenever the OSPF process is restarted. Although the other interfaces on routers Certkiller 1 and Certkiller 2 are higher, the loopback interface is always used as the router ID. If more than one loopback interface is configured, the loopback interface with the highest IP address is chosen as the Router ID.
QUESTION 24

Which type of Link State Announcement will Certkiller E use to announce changes in network 22 to Area 1?
A. Type 1 LSA
B. Type 2 LSA
C. Type 3 LSA
D. Type 4 LSA
E. Type 5 LSA

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation: The external link LSA is originated by AS boundary routers and is flooded throughout the AS. Each external advertisement describes a router to a destination in another autonomous system. Default routes for the AS can also be described by AS external advertisements. This is identified as a Type 5 LSA.
QUESTION 25
What is the OSPF cost for the 100 Mbps Ethernet media type?
A. 1
B. 2
C. 6
D. 10
E. 100
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
By default, OSPF uses the formula of 100,000,000 (100M) divided by bandwidth, or 100,000,000/BW. For
a
100M fast Ethernet connection, the formula is 100M/100M = 1.

QUESTION 26
As a Certkiller .com network technician you are required to drag the appropriate IS-IS routing item to its correct definition.

A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
QUESTION 27
Given the NSAP 39.0100.0102.0001.0c00.1211.00, which portion is interpreted by IS-IS as the area?
B. 39.0100
C. 39.0100.0102
D. 0001
E. 0001.0c00
F. 0001.0c00.1211
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: A NET is a NSAP where the last byte is always zero. On a router running IS-IS, a NET can be 8 to 20 B in length. The last byte is always the n-selector and must be zero. The n-selector indicates which transport entity the packet is sent to. An n-selector of zero indicates no transport entity, and means that the packet is for the routing software of the system. The six bytes directly preceding the n-selector are the system ID. The system ID length is a fixed size and cannot be changed. The system ID must be unique throughout each area (Level 1) and throughout the backbone (Level 2). All bytes preceding the system ID are the area ID. The area ID field is the portion of the NSAP preceding the system ID. The following example shows a router with area ID 47.0004.004d.0001 and system ID 0001.0c11.1110: 47.0004.004d.0001.0001.0c11.1110.00 In our example, the six bytes preceding the N selector is 0001.0c00.1211 which is the system ID. The portion preceding this, 39.0100.0102, is the area ID.
QUESTION 28
Which two commands can be used to verify that RIPv2 authentication is working properly to ensure that RIP neighbors form adjacencies properly? (Choose two.)
A. show interface
B. show ip route
C. show ip protocols
D. debug ip rip
E. debug ip rip authentication
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation: Verifying Plain Text Authentication RIP version 2 routers can use either plain text or MD5 authentication. By configuring the routers using RIPv2 authentication, all routing update exchanges will be authenticated before being accepted. This can be verified by observing the output obtained from thedebugip rip and show ip route commands. RB#debug ip rip RIP protocol debugging is on *Mar 3
02:11:39.207: RIP: received packet with text authentication 234 *Mar 3 02:11:39.211: RIP: received v2 update from 141.108.0.10 on Serial0 *Mar 3 02:11:39.211: RIP: 70.0.0.0/8 via 0.0.0.0 in 1 hops RB#show ip route R 70.0.0.0/8 [120/1] via 141.108.0.10, 00:00:25, Serial0 80.0.0.0/24 is subnetted, 1 subnets C
80.80.80.0 is directly connected, Loopback0 141.108.0.0/30 is subnetted, 1 subnets C 141.108.0.8 is directly connected, Serial0 Using plain text authentication improves the network design by preventing the addition of routing updates originated by routers not meant to take part in the local routing exchange process. However, this type of authentication is not secure. The password (234 in this example) is exchanged in plain text. It can be captured easily and thus exploited. As mentioned before, MD5 authentication must be preferred over plain text authentication when security is an issue. Verifying MD5 Authentication By configuring the RA and RB routers as shown above, all routing update exchanges will be authenticated before being accepted. This can be verified by observing the output obtained from the debug ip rip and show ip route commands. RB#debug ip rip RIP protocol debugging is on *Mar 3 20:48:37.046: RIP: received packet with MD5 authentication *Mar 3 20:48:37.046: RIP: received v2 update from
141.108.0.10 on Serial0 *Mar 3 20:48:37.050: 70.0.0.0/8 via 0.0.0.0 in 1 hops RB#show ip route R 70.0.0.0/8 [120/1] via 141.108.0.10, 00:00:03, Serial0 80.0.0.0/24 is subnetted, 1 subnets C 80.80.80.0 is directly connected, Loopback0 141.108.0.0/30 is subnetted, 1 subnets C 141.108.0.8 is directly connected, Serial0 MD5 authentication uses the one-way, MD5 hash algorithm, acknowledged to be a strong hashing algorithm. In this mode of authentication, the routing update does not carry the password for the purpose of authentication. Rather, a 128-bit message, generated by running the MD5 algorithm on the password, and the message are sent along for authentication. Thus, it is recommended to use MD5 authentication over plain text authentication since it is more secure. Reference: http://www.cisco.com/en/US/tech/ CK3 65/technologies_configuration_example09186a0080093f1c.shtml#veri
QUESTION 29

1.
all routers are using BGP

2.
synchronization is OFF in AS 647000
A. Router CK6
B. Routers CK2 and CK6
C. Routers CK2 , CK4 , and CK6
D. Routers CK2 , CK3 , CK4 , and CK6
E. Routers CK1 , CK2 , CK3 , CK4 , and CK6
F. Routers CK1 , CK2 , CK3 , CK4 , CK5 , and CK6
G. It will not be propagated to any other router

Correct Answer: FEACDGB Section: (none) Explanation
QUESTION 30

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
QUESTION 31
Which attribute must exist in the BGP update packet?
A. LOCAL_PREF
B. AGGREGATOR
C. AS_Path
D. Weight
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
The AS PATH is a well known mandatory attribute. Mandatory means that it is required by all routers.
These
attributes are required and are therefore recognized by all BGP implementations.

QUESTION 32
BGP contains two paths to a destination. Assuming both routes were originated locally and have an equal weight, what will be the next determining factor in choosing the best path?
A. lowest MED
B. highest local preference
C. lowest neighbor IP address
D. lowest origin code
E. shortest AS-path
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
How the Best Path Algorithm Works:
BGP assigns the first valid path as the current best path. It then compares the best path with the next path
in list, until it reaches the end of the list of valid paths. The following is a list of rules used to determine the
best path.

1.
Prefer the path with the highest WEIGHT. Note: WEIGHT is a Cisco-specific parameter, local to the router on which it’s configured.

2.
Prefer the path with the highest LOCAL_PREF.

3.
Prefer the path that was locally originated via a network or aggregate BGP subcommand, or through redistribution from an IGP. Local paths sourced by network or redistribute commands are preferred over local aggregates sourced by the aggregate-address command.

4.
Prefer the path with the shortest AS_PATH. Note the following:

5.
Prefer the path with the lowest origin type: IGP is lower than EGP, and EGP is lower than INCOMPLETE.

6.
Prefer the path with the lowest multi-exit discriminator (MED). Note the following:

7.
Prefer external (eBGP) over internal (iBGP) paths. If bestpath is selected, go to Step 9 (multipath).

8.
Prefer the path with the lowest IGP metric to the BGP next hop. Continue, even if bestpath is already selected.

9.
Check if multiple paths need to be installed in the routing table for BGP Multipath. Continue, if bestpath is not selected yet.

10.
When both paths are external, prefer the path that was received first (the oldest one). This step minimizes route-flap, since a newer path will not displace an older one, even if it would be the preferred route based on the next decision criteria (Steps 11, 12, and 13).

11.
Prefer the route coming from the BGP router with the lowest router ID. The router ID is the highest IP address on the router, with preference given to loopback addresses. It can also be set manually using the bgp router-id command.

12.
If the originator or router ID is the same for multiple paths, prefer the path with the minimum cluster list length. This will only be present in BGP route-reflector environments. It allows clients to peer with RRs or clients in other clusters. In this scenario, the client must be aware of the RR-specific BGP attribute.

13.
Prefer the path coming from the lowest neighbor address. This is the IP address used in the BGP neighbor configuration, and corresponds to the remote peer used in the TCP connection with the local router.
QUESTION 33
The Certkiller WAN is displayed below:

You work as an administrator at Certkiller .com. Study the exhibits carefully.
BGP is configured on all routers, synchronization is turned off, and one of the default attributes have
been changed except the MED attribute on Certkiller 5.
Which path is preferred by Certkiller 2 to reach the network 200.200.200.0/24?

A. Certkiller 2- Certkiller 1 because it is the shortest path.
B. Certkiller 2- Certkiller 1 because it has a higher metric.
C. Certkiller 3- Certkiller 4- Certkiller 5 because it has a lower administrative distance.
D. Certkiller 3- Certkiller 4- Certkiller 5 because it has a lower metric.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
In BGP, the lowest MED metric is preferred over a higher metric. By default, the value of the metric is 0, so
for AS 200, the path via Certkiller 5 will have a metric of 0, and the path via Certkiller 1 will have a metric of
150, so the path from Certkiller 5 will be preferred.

QUESTION 34
Which BGP path attribute is Cisco proprietary?
A. weight
B. MED
C. local preference
D. origin
E. next-hop
F. AS-path
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: The WEIGHT attribute is a Cisco proprietary feature used to measure a route’s preference. The WEIGHT inbound route maps. Use the WEIGHT attribute to influence routes from multiple service providers to a central location. Like LOCAL_PREF, assigning a higher weight to a route makes that route more preferred. The WEIGHT attribute also has the highest precedence of any BGP attribute. Reference: CCIE Practical Studies: Configuring Route-Maps and Policy-based Routing, Karl Solie, Cisco Press.

The Cisco contains more than 400 practice questions for the Cisco 642-801 exams,including simulation-based questions.Also contains hands-on exercises and a customized copy of the Cisco https://www.pass4itsure.com/642-801.html exams network simulation software.

Continue Reading

Cisco 642-801 Real Exam Questions And Answers, Discount Cisco 642-801 Test Software On Sale

Hi,I just took CCNA Cisco https://www.pass4itsure.com/642-801.html test and passed with a great score.All examcollection and securitytut dump are no longer valid anymore.I recommend studying Exampass Premium VCE.I can confirm that all Cisco 642-801 new questions appear on my test. Keep up the good work and good luck!

QUESTION 40
Your OSPF router has one serial interface, and one Ethernet LAN interface. The subinterface is configured in the following manner: interface serial 0.122 point-to-point ip address 192.168.1.1 255.255.255.0 encapsulation frame-relay frame-relay interface-dlci 122 Your want to allow hosts on your LAN to send and receive data, but you don’t want routing traffic to go through that interface. Which of the following commands should you use to complete your configuration?
A. interface serial 0.122 point-to-point passive-interface ethernet 0
B. interface ethernet 0 ip address 192.168.12.1 255.255.255.0 passive-interface
C. router ospf 172 area 1 nssa network 192.168.1.0 0.0.0.255 area 0 network 192.168.12.0 0.0.0.255 area 1
D. router ospf 172 passive-interface ethernet 0 network 192.168.1.0 0.0.0.255 area 0 network
192.168.12.0 0.0.0.255 area 1

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
We use the passive-interface command to configure the ethernet interface to be passive. The passive-
interface router configuration command is used to disable sending routing updates on an interface.
Incorrect Answers:

A: We are not configuring the serial interface. Furthermore, the passive-interface command is a router configuration command, not an interface configuration command.
B: We cannot use the passive-interface command like this.
C: We should configure the Ethernet interface as passive, not the area as a not-so-stubby area (NSSA).
QUESTION 41
You have a named Router CertK running EIGRP that has already been configured with the following: Router CertK (config)#access-list 30 deny any Router CertK (config)#access-list 40 permit ip any Router CertK (config)#router eigrp 1 To complete your configuration you want to configure the serial 0/0 interface to prevent routing updates from going out that interface while still allowing the formation and upkeep of neighbor adjacencies on that interface. Drag the correct command phrase from the bottom and place it in

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
We use distribute list 30, which stops IP traffic, on outward traffic on the serial 0/0 interface.
RouterTK continues receiving routing updates from its neighbor, but the distribute-list prevents routes from
being advertised out of serial 0. Furthermore, neighbor adjacencies are allowed to be formed between
RouterTK and its neighbor on serial 0/0.
Incorrect Answers:
passive interface serial 0/0:

On EIGRP, passive interface causes the router to stop sending and receiving hello packets. This will
prevent the interface from maintaining neighbor adjacencies.
distribute-list 40 out serial 0/0:
We must stop outgoing traffic, not allow it.
distribute-list 30 in serial 0-0:
We must stop outgoing traffic, not incoming traffic.
Reference: How Does the Passive Interface Feature Work in EIGRP?
http://www.cisco.com/warp/public/103/16.html

QUESTION 42
he Certkiller network is displayed below:
You need to configure a static route so that users on the corporate network can reach the 172.27.6.0/24
LAN. Based on the diagram above, which of the following is the correct way to do this?

A. Certkiller 1(config)#ip route 172.27.6.0 255.255.255.0 172.17.8.2
B. Certkiller 2(config)#ip route 172.27.6.0 255.255.0.0 172.17.8.2
C. Certkiller 2(config)#ip route 172.27.6.0 255.255.255.0 172.17.8.2
D. Certkiller 1(config)#ip route 172.27.6.0 255.255.0.0 172.17.8.1
E. Certkiller 2(config)#ip route 172.27.6.0 255.255.255.0 172.17.8.1

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation:
Only choice E provides the correct network subnet mask and next hop IP address.
IP route prefix mask {address|Interface} [distance] [tag tag] [permanent]
Prefix 172.27.6.0 mask 255.255.255.0 address 172.17.8.2
Address – The IP address of the next hop router that can be used to reach that network.
Reference: Building Scalable Cisco Networks (Cisco Press) page 464

QUESTION 43
The Certkiller network consists of a main office and a single remote office. You need to configure the
remote office in using the following guidelines:
The main office must learn all of its routes from the regional office.
The regional office must not learn routes from the main office.
The most scalable solution should be used.
Which of the following answer choices best describe what should be done to satisfy these
requirements?

A. Configure static routes pointing to the network behind the central office router
B. Configure a default route pointing to the networks behind the central office router
C. Make the interface that is connected to the central office a passive interface to block incoming updates
D. Enable route update filtering on the interface that is connected to the central office to block incoming updates
E. None of the above will work

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
The only viable solution here is to enable the main office to dynamically learn about all of the regional
office routes, while still not receiving any routes is by enabling incoming route filters.

Incorrect Answers:
A, B: Configuring static routes or default routes on the regional office will not enable the main office to
learn about any of the regional office routes.

C: A passive interface would prevent all route updates to the main office. Passive interfaces do not filter incoming routing updates, so the regional office could still learn routes from the main office. Note: Configuring the main office using a passive interface would satisfy the conditions here, but this Qasks us how to configure the regional office, not the main office.
QUESTION 44
You wish to permit all BGP prefixes between /10 and /18 for the 207.0.0.0 network. How should a BGP prefix list be configured to do this?
A. ip prefix-list 207.0.0.0/8 ge 10 le 18
B. ip prefix-list 207.0.0.0/8 ge 18 le 10
C. ip prefix-list 207.0.0.0/24 ge 10 le 18
D. ip prefix-list 207.0.0.0/24 ge 18 le 10
E. None of the above

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: With prefix lists, the “ge” means “greater than or equal to” while the le means “less than or equal to.” Here, we want to specify all prefixes greater than or equal to 10 and less than or equal to 18 as specified in choice
A. In addition, we must specify an 8 bit network mask, not a 24 bit network mask.
QUESTION 45
Routers CK1 and CK2 are configured for BGP as shown below: RTR CK1 router bgp 200 neighbor
183.215.22.1 remote-as 200 neighbor 183.215.22.1 update-source loopback 1 RTR CK2 router bgp 200 neighbor 147.229.1.1 remote-as 200 These two routers currently have an active BGP peering session between them and they are able to pass routes to each other. Based on these configuration files, which of the following are true? (Select three)
A. RTR CK1 and RTR CK2 are running IBGP inside AS 200
B. The IP address of RTR CK1 ‘s Loopback 1 interface is 147.229.1.1.
C. The IP address of RTR CK1 ‘s Loopback 1 interface is 183.215.22.1.
D. RTR CK1 and RTR CK2 are running EBGP between the autonomous systems.
E. RTR CK1 has forced BGP to use the loopback IP address as the source in the TCP neighbor connection.

Correct Answer: ABE Section: (none) Explanation Explanation/Reference:
Explanation:
A: The two statements that define a remote AS (autonomous) use the same AS number. Both routers must belong to the same AS and there IBGP is used.
B: The IP address of the CK1 loopback address is 147.229.1.1 as specified in the neighbor statement of the CK2 router: neighbor 147.229.1.1 remote-as 200
E: The “neighbor 183.215.22.1 update-source loopback 1” command issued at CK1 makes CK1 use this loopback for the BGP connection to CK2 . See Note 2 below. Note 1: Syntax of neighbor command: Router(config-router)#neighbor {ip-address | peer-group-name} remote-as as-number This command specifies a BGP neighbor. Note 2: For iBGP, you might want to allow your BGP connections to stay up regardless of which interface is used to reach a neighbor. To enable this configuration, you first configure a loopback interface and assign it an IP address (neighbor 183.215.22.1 update-source loopback 1). Next, configure the BGP update source to be the loopback interface (we have to assume this step – it is not indicated by the exhibit). Finally, configure your neighbor to use the address on the loopback interface (neighbor 147.229.1.1 remote-as 200). Incorrect Answers:
C: 183.215.22.1 is the IP address of CK2 , not CK1 .
D: There is only one AS and the routers belong to that AS. Within an AS IBGP is used, not EBGP.
QUESTION 46
The Certkiller BGP router is configured as shown below: router bgp 64000 neighbor 172.16.1.1 remote-as 64000 neighbor 10.1.1.2 remote-as 64550 network 200.52.1.192 mask 255.255.255.224 no synchronization aggregate-address 200.52.1.0 255.255.255.0 The BGP peers 172.16.1.1 and 10.1.1.2 in the above configuration are active, as well as the interface with IP address 200.52.1.192. Based on this information, which statement below is true about your configuration?
A. Router CertK has an IBGP connection with neighbor 10.1.1.2.
B. Router CertK has an EBGP connection with the neighbor 172.16.1.1.
C. Router CertK advertises only a route 200.52.1.0 255.255.255.0 in BGP.
D. Router CertK advertises only a route 200.52.1.192 255.255.255.224 in BGP.
E. Router CertK advertises both the routes to 200.52.1.0 255.255.255.0 and 200.52.1.192
255.255.255.224 in BGP.

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation:
The aggregate route, 200.52.1.0 255.255.255.0, and the more specific route, 200.52.1.192
255.255.255.224, will both be advertised. To only advertise the aggregate route the summaryonly option of
the aggregate-address command must be used.
Note: The aggregate-address command is used to create an aggregate, or summary, entry in the BGP
table.
Incorrect Answers:

A: The neighbor 10.1.1.2 belongs to another autonomous system and is a EBGP neighbor, not an IBGP
neighbor.

B: Router A and neighbor 172.16.1.1 belong to the same autonomous system and is an IBGP neighbor,
not an EBGP neighbor.

C: The summary-only option of the aggregate-address command is used to only advertise the summary
and not the specific routes.

D:
The aggregate route, 200.52.1.0 255.255.255.0, will be advertised as well.
Q304 The Certkiller network consists of two separate autonomous systems as shown below:
You need to configure Router CK2 as a BGP route reflector and Router CK1 as the client. Assuming that
Router CK3 isn’t running BGP, which two of the commands below would you enter on CK2 to satisfy your
goals? (Select two)
A.
neighbor 165.50.12.1 remote-as 65100
B.
neighbor 165.50.12.2 remote-as 64000
C.
neighbor 165.50.12.1 route-reflector-client
D.
neighbor 165.50.12.2 route reflector-client
Answer: B, D
Explanation:

B: Router CK2 (config-router)# neighbor 165.50.12.2 remote-as 64000 We configure router CK1
(165.50.12.2) as a neighbor in AS 64000.
D: Router CK2 (config-router)# neighbor 165.50.12.2 route-reflector-client Configures the router CK2 as a BGP route reflector and configures the specified neighbor CK1 (165.50.12.2) as its client. Incorrect Answers:
A: We must specify router CK1 as neighbor, not CK2 itself (165.50.12.1). Furthermore, we should use the local AS (64000), not the remote AS 65100.
C: We must specify router CK1 as route reflector client, not CK2 itself (165.50.12.1).
QUESTION 47
The Certkiller network consists of a series of routers that are all configured for IBGP. Which one of the following IBGP characteristics is true?
A. The IBGP routers must always be fully meshed.
B. The IBGP routers can be in a different AS.
C. The IBGP routers must be directly connected.
D. The IBGP routers do not need to be directly connected.
E. None of the above are true.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation: The IBGP routers do not have to be directly connected. The remote IBGP peers need only be reachable via a TCP connection. For example, if the network is also running an interior routing protocol such as EIGRP or OSPF, the remote IBGP router could be many hops away, as long as it is reachable via the IGP that is being used. Incorrect Answers:
A: Using route reflectors or confederations a full mesh topology is not necessary.
B: The IBGP routers must be placed in the same AS. Peers that are in different autonomous systems are using EBGP, not IBGP.
C: The IBGP routers do not have to be directly connected.
QUESTION 48
Which of the following statements regarding BGP peer groups are true? (Select two)
A. Peer members inherit all options of the peer group.
B. Peer groups can be used to simplify BGP configurations.
C. Peer groups are optional non-transitive attributes for BGP.
D. A peer group allows options that affect outbound updates to be overridden.
E. A common name should be used on all routers because this information is passed between neighbors.

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation:
A BGP peer group is a group of BGP neighbors with the same update policies.

A: By default members of the peer group inherit all of the configuration options of the peer group. Note: Members can also be configured to override these options
B: Peer groups are normally used to simplify router configurations when many neighbors have the same policy.
Note: BGP neighbors who share the same outbound policies can be grouped together in what is called a BGP peer group. Instead of configuring each neighbor with the same policy individually, Peer group allows to group the policies which can be applied to individual peer thus making efficient update calculation along with simplified configuration.
Incorrect Answers:
C: The only Optional non-transitive attribute in BGP is MED.
D: Does not apply.
E: Using a common router name provides no BGP benefits at all.
Reference: BGP Peer Groups, http://www.cisco.com/warp/public/459/29.html

QUESTION 49
A BGP router is configured as shown below: interface ethernet 0 ip address 10.10.10.1 255.255.0.0 ! int serial 0 ip address 172.16.1.1 255.255.255.252 ! router bgp 65001 neighbor 192.168.1.1 remote-as 65002 Based on the above configuration, which of the following BGP statements would inject the 10.10.0.0/16 prefix into the BGP routing table?
A. network 10.0.0.0
B. network 10.10.0.0 mask 255.255.0.0
C. network 10.10.10.1 mask 255.255.255.255
D. network 10.10.10.0 mask 255.255.255.0
E. network 10.0.0.0 mask 255.255.0.0

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation: The /16 mask is equal to 255.255.0.0, so answer choice B matches the address and the mask. To specify the route as classless, the mask keyword should be included or the network will be summarized at the network boundary.
QUESTION 50
Why would a systems administrator enter in the network command when configuring BGP?
A. Local routes matching the network command are filtered from the BGP routing table.
B. Local routes matching the network command can be installed into the BGP routing table.
C. Routes matching the network command will be filtered from BGP routing updates.
D. External routes matching the network command will be installed into the BGP routing table.
E. None of the above.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
Use the network router configuration command to permit BGP to advertise a network if it is
present in the IP routing table.
Reference: Building Scalable Cisco Networks (Cisco Press) page 342

QUESTION 51
The Certkiller network is depicted in the following diagram: Which of the following command sets would you use if you want Certkiller 1 and Certkiller 2 to exchange BGP routing information? (Select two)

A. Certkiller 2(config)#router bgp 200 Certkiller 2(config-router)#neighbor 10.1.1.1 remote-as 100
B. Certkiller 1(config)#router bgp 100 Certkiller 1(config-router)#exit Certkiller 1(config)#interface S0
Certkiller 1(config-if)#neighbor 10.1.1.2 remote-as 200
C. Certkiller 1(config)#router bgp 100 Certkiller 1(config-router)#neighbor 10.1.1.2 remote-as 200
D. Certkiller 2(config)#router bgp 100 Certkiller 2(config-router)exit Certkiller 2(config)#interface S0
Certkiller 2(config-if)#neighbor remote-as 100
E. Certkiller 1(config)#router bgp 100 Certkiller 1(config-router)#network 10.0.0.0 Certkiller 1(config-router)#neighbor 10.1.1.2 remote-as 100
F. Certkiller 2(config)#router bgp 200 Certkiller 2(config-router)#network 10.0.0.0 Certkiller 2(config-router)#network 10.1.1.1 remote-as 200

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
Explanation:
Choices A and C give the correct syntax for configuring EBGP peering sessions.
Incorrect Answers:
B, D: The BGP peering configurations are placed under the BGP routing process, not in
interface configuration mode.
E, F: The network 10.0.0.0 command is not required here, since this is an EBGP peering session using the
directly connected interface. Since each neighbor shares the 10.0.0.0 network they each already know
how to reach this network.

QUESTION 52
Router TK-1 is configured for BGP routing as shown below: router bgp 65300 network 27.0.0.0 neighbor
192.23.1.1 remote-as 65300 From the perspective of router TK-1, what kind of router is the router with IP address 192.23.1.1?
A. A peer router running IBGP
B. A peer router running EBGP
C. A community member running IBGP
D. A peer group member running IBGP E. A peer group member running EBGP

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
Both the local and remote router is configured with the same autonomous system number so they are peer
routers running IBGP.

QUESTION 53
When you’re configuring BGP on a Cisco router, what is true of the command “network”?
A. Local routes matching the network command are filtered from the BGP routing table.
B. Local routes matching the network command can be installed into the BGP routing table.
C. Sending and receiving BGP updates is controlled by using a number of different filtering methods.
D. The route to a neighbor autonomous system must have the correct MED applied to be installed into BGP routing table.
E. None of the above.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation: The network command allows BGP to advertise an IGP route if it is already in the IP table. A matching route must exist in the routing table before the network is announced. The network command is used to permit BGP to advertise a network if it is present in the IP routing table.
QUESTION 54
Router CK1 needs to be configured to advertise a specific network. Which of the following commands would you use if you wanted to advertise the subnet 154.2.1.0 255.255.255.0 to the EBGP neighbors on your subnet?
A. Router (config-router)#network 154.2.1.0
B. Router (config-router)#network 164.2.1.0
C. Router (config-router)#network-advertise 154.2.1.0
D. Router (config-router)#network 154.2.1.0 mask 255.255.255.0
E. None of the above

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
The network command is used to specify the networks to be advertised by the Border Gateway Protocol
(BGP) and multiprotocol BGP routing processes.
Syntax: network network-number [mask network-mask] [route-map map-name]
Mask and route-map are optional. If the mask keyword is configured, then an exact match must exist in the
routing table.
Incorrect Answers:

A: If we do not specify the subnet mask then additional networks are allowed to be advertised. The classful subnet mask of 154.2.1.0 is 255.255.0.0 – a Class B network.
B: This is using the incorrect IP address, as well as a missing subnet mask.
C: The network-advertise is an invalid command.
QUESTION 55
You are the administrator of a company with BGP connections to multiple ISP’s. How could you configure BGP to make it favor one particular ISP for outbound traffic?
A. Configure weight
B. Enable route reflector
C. Create a distribute list
D. Enable the Longer Autonomous System path option.
E. All of the above.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: If the router learns about more than one route to the same destination, the route with the highest weight will be preferred. Weight is a Cisco BGP parameter that is local to the router. When terminating multiple ISP connections into the same router, weight can be used to affect which path is chosen for outbound traffic. Incorrect Answers:
B: A route reflector cannot be used to influence outbound traffic. A route reflector modifies the BGP split horizon rule by allowing the router configured as the route reflector to propagate routes learned by IBGP to other IBGP peers. This saves on the number of BGP TCP sessions that must be maintained, and also reduces the BGP routing traffic.
C: Distribute lists restrict the routing information that the router learns or advertises. By itself a distribute list cannot make routes from one ISP be preferred to routers from another ISP.
D: This choice describes ASD path pre-pending, which would be used to influence the path that incoming traffic takes, not outgoing.
QUESTION 56
What are two solutions to overcome the full mesh requirement with iBGP? (Choose two)
A. BGP groups
B. BGP local preference
C. Route reflector
D. Confederation
E. Aggregate-address

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
Explanation: In general, all IBGP peers must be configured to be fully meshed. If they are not, then all of the IBGP routers will not have the updated information from the external BGP routers. There are two ways to overcome the scalability issues of a full IBGP mesh: route reflectors and confederations. With route reflectors, internal BGP routers peer only with the route reflector. With confederations, the AS is broken up into smaller, more manageable sub autonomous systems.
QUESTION 57
An ISP is running a large IBPG network with 25 routers. The full mesh topology that is currently in place is inefficiently using up bandwidth from all of the BGP traffic. What can the administrator configure to reduce the number of BGP neighbor relationships within the AS?
A. Route reflectors
B. Route maps
C. Route redistribution
D. Peer groups
E. Aggregate addresses
Correct Answer: A Section: (none) Explanation

Explanation/Reference:
Explanation: In general, all IBGP peers must be configured to be fully meshed. If they are not, then all of the IBGP routers will not have the updated information from the external BGP routers. There are two ways to overcome the scalability issues of a full IBGP mesh: route reflectors and confederations. With route reflectors, internal BGP routers peer only with the route reflector, and then the route reflectors connect with each other. This can considerably reduce the number of IBGP sessions. Another solution to the scalability problem of IBGP is the use of confederations. With confederations, the AS is broken up into smaller, more manageable sub autonomous systems.
QUESTION 58
Arrange the BGP attributes on the left in order or priority.

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
How the Best Path Algorithm Works:
BGP assigns the first valid path as the current best path. It then compares the best path with the next path
in list, until it reaches the end of the list of valid paths. The following is a list of rules used to determine the
best path.

1.
Prefer the path with the highest WEIGHT. Note: WEIGHT is a Cisco-specific parameter, local to the router on which it’s configured.

2.
Prefer the path with the highest LOCAL_PREF. Note the following:

Path without LOCAL_PREF is considered as having the value set with the bgp default local-preference command, or 100 by default.

3.
Prefer the path that was locally originated via a network or aggregate BGP subcommand, or through redistribution from an IGP. Local paths sourced by network or redistribute commands are preferred over local aggregates sourced by the aggregate-address command.

4.
Prefer the path with the shortest AS_PATH. Note the following:

The AS_CONFED_SEQUENCE and AS_CONFED_SET are not included in the AS_PATH length.

5.
Prefer the path with the lowest origin type: IGP is lower than EGP, and EGP is lower than INCOMPLETE.

6.
Prefer the path with the lowest multi-exit discriminator (MED). Note the following:
This comparison is only done if the first (neighboring) AS is the same in the two paths; any confederation sub-ASs are ignored. In other words, MEDs are compared only if the first AS in the AS_SEQUENCE is the same for multiple paths. Any preceding AS_CONFED_SEQUENCE is ignored. If bgp always-compare-med is enabled, MEDs are compared for all paths. This option needs to be enabled over the entire AS, otherwise routing loops can occur.
If bgp bestpath med-confed is enabled, MEDs are compared for all paths that consist only of AS_CONFED_SEQUENCE (paths originated within the local confederation).
Paths received from a neighbor with a MED of 4,294,967,295 will have the MED changed to 4,294,967,294 before insertion into the BGP table.
Paths received with no MED are assigned a MED of 0, unless bgp bestpath missing-as-worst is enabled, in which case they are assigned a MED of 4,294,967,294.
The bgp deterministic med command can also influence this step as demonstrated in the How BGP Routers Use the Multi-Exit Discriminator for Best Path Selection.
7.
Prefer external (eBGP) over internal (iBGP) paths. If bestpath is selected, go to Step 9 (multipath).

Note: Paths containing AS_CONFED_SEQUENCE and AS_CONFED_SET are local to the confederation,
and therefore treated as internal paths. There is no distinction between
Confederation External and Confederation Internal.
8.
Prefer the path with the lowest IGP metric to the BGP next hop. Continue, even if
bestpath is already selected.
9.
Check if multiple paths need to be installed in the routing table for BGP Multipath.
Continue, if bestpath is not selected yet.
10.
When both paths are external, prefer the path that was received first (the oldest one). This step
minimizes route-flap, since a newer path will not displace an older one, even if it
would be the preferred route based on the next decision criteria (Steps 11, 12, and 13).
Skip this step if any of the following is true:

o The bgp best path compare-routerid command is enabled.
Note: This command was introduced in Cisco IOS(r) Software Releases 12.0.11S, 12.0.11SC,
12.0.11S3, 12.1.3, 12.1.3AA, 12.1.3.T, and 12.1.3.E.

o The router ID is the same for multiple paths, since the routes were received from the same router.

o There is no current best path. An example of losing the current best path occurs when the neighbor offering the path goes down.
11.
Prefer the route coming from the BGP router with the lowest router ID. The router ID is the highest IP address on the router, with preference given to loopback addresses. It can also be set manually using the bgp router-id command. Note: If a path contains route-reflector (RR) attributes, the originator ID is substituted for the router ID in the path selection process.

12.
If the originator or router ID is the same for multiple paths, prefer the path with the minimum cluster list length. This will only be present in BGP route-reflector environments. It allows clients to peer with RRs or clients in other clusters. In this scenario, the client must be aware of the RR-specific BGP attribute.

13.
Prefer the path coming from the lowest neighbor address. This is the IP address used in the BGP neighbor configuration, and corresponds to the remote peer used in the TCP connection with the local router.
QUESTION 59
The Certkiller BGP routing table consists of the following network routes:

What is the correct command to summarize these prefixes into a single summary prefix of 192.168.12.0/22 while also allowing for the advertisement of the more specific prefixes?
A. network 192.168.12.0 mask 255.255.252.0
B. network 192.168.12.0 mask 0.0.3.255
C. network 192.168.12.0
D. aggregate-address 192.168.12.0 255.255.252.0
E. aggregate-address 192.168.12.0 255.255.252.0 summary-only
F. aggregate-address 192.168.12.0 255.255.252.0 as-set

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
To summarize BGP prefixes into one aggregated route, use the “aggregate-address” command.
When used alone, this will advertise the aggregate route, along with the individual specific
routing entries. To advertise only the aggregated route, use the “summary-only” keyword, as specified in
choice E.

QUESTION 60
The Certkiller BGP network is displayed below: Certkiller 3 is the hub router and Certkiller 1 and Certkiller 2 are the spokes. There are no virtual circuits between the spoke locations. Each router is in a separate AS. What is needed to successfully route traffic to the 11.11.11.0/24 network from Certkiller 1?

A. The neighbor 10.10.10.1 next-hop-self command on Certkiller 1.
B. The neighbor 10.10.10.1 next-hop-self command on Certkiller 2.
C. The neighbor 10.10.10.1 next-hop-self command on Certkiller 3.
D. Nothing is required. This is the default behavior on this topology

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
The following example illustrates the issue:
BGP Next Hop (NBMA)
If the common media as you see in the shaded area above is a frame relay or any NBMA cloud then the exact behavior will occur as if we were connected via Ethernet. RTC will advertise 180.20.0.0 to RTA with a next hop of 170.10.20.3. The problem is that RTA does not have a direct PVC to RTD, and cannot reach the next hop. In this case routing will fail. In order to remedy this situation a command called next-hop-self is created. The next-hop-self Command Because of certain situations with the next hop as we saw in the previous example, a command called next-hop-self is created. The syntax is: neighbor {ip-address|peer-group-name} next-hop-self The next-hop-self command allows us to force BGP to use a specified IP address as the next hop rather than letting the protocol choose the next hop. In the previous example, the following configuration solves our problem: RTC# router bgp 300 neighbor 170.10.20.1 remote-as 100 neighbor 170.10.20.1 next-hop-self RTC advertises 180.20.0.0 with a next hop = 170.10.20.2 Reference: http://www.cisco.com/warp/public/459/bgp-toc.html#bgpnexthop
QUESTION 61
Exhibit Based on the show ip bgp summary output in the exhibit, which two statements are true? Select two?

A. The BGP session to the 10.1.1.1 neighbor is established.
B. The BGP session to the 10.2.2.2 neighbor is established.
C. The BGP session to the 10.3.3.3 neighbor is established.
D. The router is attempting is attempting to establish a BGP peering to the 10.1.1.1 neighbor.
E. The BGP session to the 10.3.3.3 neighbor is established, but the router has not received any BGP routing updates from the 10.3.3.3 neighbor.
F. The router is attempting to establish BGP peering with the 10.2.2.2 neighbor.

Correct Answer: AFCEBD Section: (none) Explanation
QUESTION 62
we want to hide some of your internal IP subnets from outside networks. By what means can you conceal the details of your IP addressing scheme to the outside world?
A. Subnetting
B. Supernetting
C. Challenge Handshake Protocol
D. Usernames and passwords

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation: In large internetworks, hundreds or even thousands of networks can exist. In these environments, it is often not desirable for routers to maintain all these routes in their routing table. Route summarization (also called route aggregation or supernetting) can reduce the number of routes that a router must maintain because is it a method of representing a series of network numbers in a single summary address. By advertising only one large supernet to the outise world, the details of your IP network scheme can remain hidden.
QUESTION 63
The Certkiller network will be using a new ISP for their Internet connection. The new Internet provider will be allocating a new registered class C IP address subnet to use. In order to not have to change out the entire internal IP addressing scheme on your network, you plan to use NAT to translate all of the internal IP address to the new IP addresses that are being assigned to Certkiller . You have been assigned the task of making changes so that the following requirements are met: Maintain the current IP addressing scheme Configure Certkiller ‘s router for network address translation (NAT) so all the internal computers use the same external IP address Configure a static translation so Certkiller employees can access their email from the internet. Privileged mode password: Certkiller The IP Addresses are shown below: Name: Certkiller NAT SO 192.168.15.1/24 E0 10.100.5.1/24 E-mail Server’s External Address 192.168.15.5/24 E-mail Server’s Internal Address 10.100.5.5/24 To configure the router click on a host icon that is connected to a router by a serial console cable.

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Certkiller NAT(config-if)#exit Certkiller NAT(config)#exit Certkiller NAT#copy run start Q322

You have been assigned the task of configuring the routers to meet the following requirements:
In the unlikely event that a link goes down, you have to ensure a backup link exists
The proper metrics must be distributed through the IGRP portion of the network Based on this information,
which of the following should you do? (Select two)

A. Apply the distance command to Main
B. Apply the distance command to CK2
C. Apply the distribute-list command to Main
D. Apply the distribute-list command to CK2
Answer: B, C Explanation:
B: Most routing protocols, including IGRP and RIP, use the distance command to modify the administrative distance. We need to change the metric of the RIP routes learned by CK2 .
C: To control the advertising and processing of routes in routing updates the distribute-list
command is used.
Incorrect Answers:

A: We change the administrative distance of RIP routes on CK2 .

D: We should apply the distribute-list command to Main, not to CK2 .

QUESTION 64
Network topology exhibit

Certkiller .com is changing ISPs. As a result, they will need to install an Email server and utilize network address translation (NAT) for the internal network. Certkiller .com does not want to change the IP Addresses on all of the internal routers and servers. The new ISP, Foo Services, will allocate a registered class C address for Certkiller to use. The internal IP Address scheme will remain the same. Configure the router to provide NAT so that all internal Certkiller PCs will use the single external IP Address assigned to the router interface. Configure a static translation so that Certkiller .com’s Email server will be accessible from the Internet. Name: Certkiller NAT S0: 192.168.17.1/24 E0: 10.0.216.1/24 Secret Password: Certkiller
A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
192.168.212.5/24 Web Server’s Internal Address 10.0.243.5/24
QUESTION 65
One of the virtues of a Link-State routing protocol is its hierarchical design. What advantages does this equate to in network design? (Select two)
A. It allows link-state protocols to support VLSM.
B. It allows them to support address summarization.
C. It reduces the need to flood LSAs to all devices in the internetwork.
D. Routers are no longer required to keep track of the topology of the entire autonomous system.

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
Explanation: Hierarchical design can limit the requirement to notify all devices. The use of areas restricts the flooding to the logical boundary of the area rather than to all devices in the OSPF domain. Another advantage of hierarchical network design is that the entire network is divided into multiple smaller sections, so that much of the routing information is kept within a small area. In a non-hierarchical network, each router is required to maintain routing information for all other routers within the entire network. Incorrect Answers:
A: Although link state protocols do indeed support VLSM, it is not due to a hierarchical network design. For example, RIP version 2 supports VLSM, but it is not hierarchical.
B: Although address summarization can indeed be configured on routers configured in a hierarchical design, it is an independent function and is not related to the fact that a tiered network design is being used.
QUESTION 66
In regards to the three layered hierarchical network design, which of the following are responsibilities of the distribution layer? (Choose 2)
A. Reliable transport structure
B. Route redistribution
C. Optimized transport structure
D. Address aggregation
E. Unauthorized entry access control lists

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation: The distribution layer is responsible for what enters and exits a network, including the
consolidation of traffic from multiple subnets into a core connection. Route redistribution and address
aggregation happen at this layer.
Incorrect Answers:
A, C: This is a function of the core layer.

E. This is a function of the access layer.
QUESTION 67
Which of the following are advantages of implementing a hierarchical IP addressing scheme when designing a large network? (Select two)
A. Smaller routing tables
B. Efficient address allocation
C. Translation of private addresses
D. Support for link-state routing protocols

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation: Hierarchical IP addressing uses the addresses more conservatively, by planning for the correct use of subnet masks and route summarization. A hierarchical network design facilitates the use of IP routing summarization, which will reduce the size of the routing tables.
QUESTION 68
The Certkiller frame relay network is shown in the diagram below: Based on the information given in this diagram, which of the following are true??

A. The network is using a two-layer full-mesh hierarchical design.
B. The network is using a two-layer hub-and-spoke hierarchical design.
C. To improve scalability, route summarization at Routers CK1 , CK2 , CK3 , CK4 , CK5 , and CK6 should be performed.
D. Routers A and B are the distribution layer routers.
E. Routers CK1 , CK2 , CK3 , CK4 , CK5 and CK6 are the access layer routers.
F. To improve security, packet filtering that uses ACLs at Routers A and B must be implemented.

Correct Answer: CEADB Section: (none) Explanation
Explanation/Reference:
A: The network shown here is using a 3 level tiered approach: Core, Distribution, and Access.
B: Three layers are used, not two.
D: Routers A and B are the Core routers here.
E: These routers make up the Distribution layer.
QUESTION 69
You are trying to determine the best routing protocol to use for the large Certkiller network. Which routing protocols should you avoid when deploying a large network? (Select two)
A. IGRP
B. OSPF
C. EIGRP
D. RIP v.2
E. RIP v.1

Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
Explanation: Both RIP version 1 and version 2 should only be used in relatively small networks. A large network would be congested by RIP broadcasts. These frequent broadcasts contain the entire routing table, and could saturate links.
QUESTION 70
What are some of the features that are important for designing large, scalable networks? (Select three)
A. A tiered network design model.
B. Sufficient memory on the router.
C. Multiple EIGRP autonomous systems.
D. Good address space allocation scheme.

Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
Explanation:
A: A tiered network design model such as Core, Distribution, and Access is also needed for
large networks.

B: Sufficient capacity of the routers, in particular the memory, is required for large networks.

D: Good allocation of address space is required- Each region should have a unique address
space so route summarization is possible.
Incorrect Answers:

C: Configuring multiple EIGRP autonomous systems can add extra overhead and it provides no
additional benefits.

QUESTION 71
Two of the following routing protocols require a tiered, hierarchical topology. Which ones are they? (Select two)
A. IS-IS
B. IGRP
C. OSPF
D. EIGRP
E. RIP v2

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
Explanation:
IS-IS and OSPF both require a hierarchical topology. The use of multiple areas and a core
backbone area means that they are hierarchical by nature.

QUESTION 72
What has become the leading Interior Routing Protocol (IGP) in use by Internet service providers?
A. IS-IS
B. OSPF
C. EIGRP
D. RIPv2
E. BGP4

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: In recent years, the IS-IS routing protocol has become increasingly popular, with widespread use among Service Providers. It is a link state protocol, which enables very fast convergence with large scalability. It is also a very flexible protocol and has been extended to incorporate leading edge features such as MPLS Traffic Engineering. It is also chosen because it is an IETF standard based protocol, rather than a proprietary protocol such as IGRP or EIGRP. Reference: http://www.cisco.com/en/US/tech/ CK3 65/ CK3 81/technologies_white_paper09186a00800a3e6f.sht ml
QUESTION 73
Two of the following routing protocols support load balancing over unequal cost links.Which ones are they? (Select two)
A. IGRP
B. OSPF
C. EIGRP
D. RIP v2
E. RIP v1

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
Explanation:
IGRP and EIGRP support unequal cost path load balancing, which is known as variance. OSPF,
RIP v1 and RIP v2 do not support this.
Reference: http://www.cisco.com/warp/public/103/19.html

QUESTION 74
You are required to choose a routing protocol that supports variable length subnet masks (VLSM) for your network. Which of the following would meet this requirement? (Choose three)
A. IS-IS
B. IGRP
C. OSPF
D. EIGRP
E. RIP v1

Correct Answer: ACD Section: (none) Explanation
Explanation/Reference:
Explanation:
IS-IS, EIGRP, OSPF, RIP V2 and static routes all support VLSM.
Incorrect Answers:

B: IGRP is the predecessor to EIGRP and does not support VLSM.
E: RIP version 1 is a distance vector routing protocol that does not support VLSM.
QUESTION 75
Cisco routers automatically perform route summarization for various protocols. Which three of the following routing protocols are they? (Select three)
A. IS-IS
B. IGRP
C. OSPF
D. EIGRP
E. RIP v.1

Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
Explanation:
Sending route summaries – Routing information advertised out an interface is automatically summarized at

major (classful) network address boundaries by RIP, IGRP, and EIGRP. Specifically, this autonomous summarization occurs for those routes whose classful network address differs from the major network address of the interface to which the advertisement is being sent. Reference: Building Scalable Cisco Networks (Cisco Press) page 79

CCNA Exam Certification Guide is a best-of-breed Cisco https://www.pass4itsure.com/642-801.html exam study guide that has been completely updated to focus specifically on the objectives.Senior instructor and best-selling author Wendell Odom shares preparation hints and Cisco 642-801 tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge.Cisco 642-801 Material is presented in a concise manner,focusing on increasing your understanding and retention of exam topics.

Continue Reading

Cisco 642-591 Certification Exam, Up To Date Cisco 642-591 Study Material Online

Completed the Cisco 642-591 test and passed with high scores.New Cisco 642-591 test have been changed with many questions last month ago,and now new exam questions and answers have been added on Cisco https://www.pass4itsure.com/642-591.html,which is realiable according to my real test.

QUESTION 30
Which two of the following are Cisco Unity Connection components that, when changed, will not affect the settings of existing users? (Choose two.)
A. Contact Templates
B. Users Templates
C. Enterprise Parameters
D. Service Parameters
E. Call Handlers

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 31
Which of the following applications collects, distributes, and aggregates user attributes and capabilities?
A. Cisco Unity Connection
B. Cisco Unified Presence
C. Cisco Unified Communications Manager
D. Cisco Unified Personal Communicator

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 32
When using Cisco Unity Connection, which call handler type offers different call actions based on the digits that are selected?
A. digit analysis
B. system
C. directory
D. interview
E. call management

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 33
Which five of the following commands will integrate a Cisco Unity Express module with a Cisco Unified Communications Manager Express router. (Choose five.)
Exhibit:

A. ip route 10.1.131.2 255.255.255.255 interface Service-Engine 1/0
B. service-module ip address 10.1.130.2 255.255.255.0
C. ip unnumbered Loopback0
D. service-module ip address 10.1.131.2 255.255.255.0
E. service-module ip default-gateway 10.1.131.1
F. ip unnumbered vlan130
G. service-module ip default-gateway 10.1.30.1.1
H. interface lntegrated-Service-Engine1/0

Correct Answer: ACDEH Section: (none) Explanation
Explanation/Reference:
QUESTION 34
Drag and Drop
Select and Place:

Correct Answer:
Section: (none) Explanation
Explanation/Reference:

The actual Cisco https://www.pass4itsure.com/642-591.html exam questions and answers will sharpen your skills and expand your knowledge to obtain a definite success.save your money and time on your preparation for your Cisco 642-591 certification exam. You will find we are a trustful partner if you choose us as your assistance on your Cisco 642-591 certification exam. Now we add the latest Cisco 642-591 content and to print and share content.

Continue Reading

Cisco 642-587 Exam Questions, Buy Discount Cisco 642-587 Exam Q&As Are Based On The Real Exam

Passed with high score today for Cisco https://www.pass4itsure.com/642-587.html Exam. Windows 8.1 new questions will be added so I’m lucky to pass today.Almost all questions were the same includes the new question, DirectAccess, EFS, AD CS..Only used Flydumps premium vce file.

QUESTION 40
A Cisco WCS version 4.0 has been installed on a server with a dual Pentium
3.0 GHz processor, 4 GB RAM, and an 80 GB hard drive. A location appliance has been incorporated into the network and is being monitored by the Cisco WCS. There are 3000 devices to be tracked but not all of them are being tracked on the Cisco WCS. What can be done to correct the problem?
A. Add 4 GB of RAM to the Cisco WCS.
B. Add a 120 GB hard drive to the Cisco WCS.
C. Add a new location appliance.
D. Add a new Cisco WCS server dedicated to the location appliance.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 41
When optimizing a standalone point-to-multipoint bridge installation with eight non-root bridges, which of the following RTS threshold and CWmin settings would be correct for the non-root bridges?
A. RTS threshold=4000, CWmin=3
B. RTS threshold=1, CWmin=4
C. RTS threshold=4000, CWmin=5
D. RTS threshold=1, CWmin=5

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 42
Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However, employees there have been experiencing problems when tracking objects using active RFID tags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?
A. allow for the automatic containment of rogue access points
B. ensure each area is covered by a minimum of three access points
C. ensure channels are deployed such that they do not overlap
D. ensure a minimum RSSI value of -50
Correct Answer: B Section: (none) Explanation

Explanation/Reference:
QUESTION 43
Which of the following parameter sets must be configured on the Cisco Wireless Location Appliance?
A. location views
B. object definitions
C. access points
D. network connections

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 44
What is the correct order of steps for upgrading a Cisco WCS?
A. back up the database, stop the WCS, upgrade the WCS, restore the database, start the WCS
B. stop the WCS, back up the database, upgrade the WCS, restore the database, start the WCS
C. back up the database, stop the WCS, upgrade the WCS, start the WCS, restore the database
D. stop the WCS, back up the database, upgrade the WCS, start the WCS, restore the database

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 45
Which protocol does the RADIUS server use inside the secure tunnel of EAP-FAST to authenticate the client when one-time passwords are in use?
A. MS-CHAP v2
B. PAP
C. GTC
D. MD5

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 46
When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones, which two general control settings should you select? (Choose two.)
A. Aggressive Load Balancing on
B. Aggressive Load Balancing off
C. Multicast on
D. Multicast off
E. AP Fallback on
F. AP Fallback off

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 47
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side, which of the following actions should you perform on the wired infrastructure?
A. Take no action, you have achieved your goal.
B. Implement a Cisco Secure IPS sensor.
C. Implement a protected port on the access switches.
D. Implement 802.1X on the switch ports.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 48
EAP-FAST provides a secure tunnel during Phase One to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?
A. generic token card
B. x.509 certificate
C. preshared key
D. Protected Access Credential

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 49
You are troubleshooting a problem with a Cisco 7920 wireless IP phone that is causing the phone to drop calls. The problem appears to be a roaming bandwidth issue. In order to verify what kind of issue it is, you decide to increase the bandwidth reserved for roaming on the WLAN controller to the maximum. What level do you set the bandwidth to?
A. 5 percent
B. 15 percent
C. 25 percent
D. 35 percent

Correct Answer: C Section: (none) Explanation Explanation/Reference:
QUESTION 50
Using the WLSE, you are trying to push out a configuration job to a standalone access point, but the job does not start. Which of the following would cause this failure?
A. invalid parameter in the template
B. pop-up blocker enabled in the browser
C. incorrect SNMP communities on the access point
D. unsupported version of IOS firmware in the access point

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 51
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS? (Choose two.)
A. 064 Tunnel-Type
B. 066 Tunnel-Client-Endpoint
C. 067 Tunnel-Server-Endpoint
D. 081 Tunnel-Private-Group-ID
E. 082 Tunnel-Assignment-ID
F. 083 Tunnel-Preference

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 52
In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP or EAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attempts report on the Cisco Secure ACS, you find this error: “Unknown network access server NAS.” Which problem may have caused this failure?
A. misconfigured EAP type on the access point
B. misconfigured EAP type on the AAA server
C. misconfigured IP address of the access point on the AAA server
D. misconfigured IP address of the AAA server on the access point

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
What is the maximum number of hexadecimal characters allowed when configuring the WPA or WPA2 passphrase in Cisco ADU?
A. 16
B. 32
C. 64
D. 128

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 54
A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAP AP2. H-REAP AP2 has six other clients associated to it, which continue to pass traffic. What has caused this problem?
A. H-REAP AP1 lost its connection to the controller.
B. H-REAP AP2 lost its connection to the controller.
C. H-REAP AP1 has reached its client limit.
D. H-REAP AP2 has reached its client limit.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 55
You are configuring a wireless LAN controller for QoS. Which 802.11e user priority tag should you apply to voice applications?
A. 1
B. 3
C. 4
D. 6

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 56
You are using ADU and are authenticated and associated to an access point.
However, you are unable to obtain an IP address. Which of these has caused this problem?
A. invalid SSID
B. invalid 802.1X authentication type
C. invalid encryption type
D. invalid WEP key

Correct Answer: D Section: (none) Explanation Explanation/Reference:
QUESTION 57
Which parameter, when enabled on a standalone access point, gives the highest priority to a voice packet even when QoS is not enabled?
A. QoS Element for Wireless Phones
B. IGMP Snooping
C. WMM
D. AVVID Priority Mapping

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 58
You review the Failed Attempts logs on an AAA server and find: “unknown network access server error.” Which failure could produce this error?
A. failure of the wireless client and AAA server handshake
B. supplicant authentication failure
C. AAA client and AAA server handshake failure
D. wrong password used by the supplicant

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 59
If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a network when you select which of the following modes from the AP Mode drop-down menu on the controller?
A. Monitor
B. Rogue Detector
C. Sniffer
D. Mirror

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 60
On a WLAN controller, what is the default limit on the number of entries in the database that will be used for local authentication?
A. 50
B. 128
C. 512 D. 1024

Correct Answer: C Section: (none) Explanation
Explanation/Reference:

We help you do exactly that with our high quality Cisco 642-587 Certification using the above training materials.Regardless of whichever computer you have, you just need to download one of the many Cisco https://www.pass4itsure.com/642-587.html PDF readers that are available for free.

Continue Reading

Cisco 642-513 Actual Questions, High Pass Rate Cisco 642-513 Real Exam Questions And Answers Covers All Key Points

GOOD NEWS:Flydumps has published the new version with all the new added questions and answers.By training the Cisco https://www.pass4itsure.com/642-513.html VCE dumps, you can pass the exam easily and quickly.

QUESTION 31
What happens if the Agent UI control rule is not present in any active rule modules?
A. The Agent UI becomes present on the system.
B. The Agent UI is not present on the system.
C. The Agent UI is visible on the system.
D. The Agent UI is not visible on the system.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 32
What are the three options that can be given to a user when a Query User window appears? (Choose three.)
A. allow
B. accept
C. deny
D. kill E. terminate

Correct Answer: ACE Section: (none) Explanation
Explanation/Reference:
QUESTION 33
Which view within the CSA MC allows users to see a view of event records based on filtering criteria such as time and severity?
A. Event Summary
B. Event Log
C. Event Monitor
D. Event Sets
E. Event Alerts

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 34
When a rule is cloned, which part of the rule is not cloned?
A. sets
B. rule modules
C. hosts
D. variables

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 35
What is the purpose of the network interface control rule?
A. to prevent applications from opening devices and acting as a sniffer
B. to provide protocol stack hardening rules
C. to prevent users from opening devices that can act as a sniffer
D. to provide filtering of undesired traffic at the network interface level

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 36
What action must happen before a system that has CSA can download policies configured for it?
A. The system must be rebooted.
B. The system must install Agent kits.
C. The system must be polled by the CSA MC.
D. The system must register with the CSA MC.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 37
Which rules will not be enforced if you fail to reboot a Windows system following installation of the CSA?
A. network access control rules
B. buffer overflow rules
C. COM component access control rules
D. network shield rules

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 38
Which view within the CSA MC allows users to see overall system status information, including a summary of recorded events, agent configuration, and activity?
A. Status Summary
B. Event Log
C. Event Monitor
D. Event Sets
E. Alerts

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 39
Which operating system does not allow Query User options?
A. OS2
B. Windows
C. Linux
D. Solaris
E. HPUX

Correct Answer: B Section: (none) Explanation
Explanation/Reference: QUESTION 40
For which layers of the OSI reference model does CSA enforce security?
A. Layer 1 through Layer 4
B. Layer 1 through Layer 7
C. Layer 2 through Layer 4
D. Layer 3 through Layer 7

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 41
Which view within the CSA MC allows users to see a continuously refreshed view of the most recently logged event records?
A. Event Log
B. Event Monitor
C. Event Sets
D. Event Alerts

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 42
What are the three CSA MC administrator roles? (Choose three.)
A. access
B. configure
C. deploy
D. view
E. monitor
F. administer

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 43
What can you optionally install when you choose the Quiet Install option when creating a new Windows Agent kit?
A. the Agent kit shim
B. the protocol shim
C. the network shim
D. the policy shim

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 44
When you choose the Log All Deny Actions option within a group, how are deny actions logged?
A. Deny actions are logged every 5 minutes.
B. Deny actions are logged every 10 minutes.
C. Every deny action is logged regardless of the specific rule settings.
D. Only those deny actions that are configured within specific rules are logged.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 45
For which operating system is the system API control rule available?
A. OS2
B. Windows
C. Linux
D. Solaris

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 46
How can you configure a host to poll in to the CSA MC before its scheduled polling interval using the CSA MC?
A. Click the Poll button on the Agent UI.
B. Choose the Poll Now button on the CSA MC.
C. Choose the Send Polling Hint option in the CSA MC.
D. Enter a polling interval in the appropriate box on the CSA MC.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 47
In which type of rules are file sets used?
A. COM component access control rules
B. resource access control rules
C. file version control rules
D. file access control rules

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 48
What status is shown when an Agent kit is prepared for downloading to hosts?
A. prepared
B. ready
C. needs rule generation
D. complete

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 49
Drag Drop question

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center
QUESTION 50
Which protocol is required for the administrative workstation to communicate with the CSA MC?
A. SSH
B. Telnet
C. SSL
D. IPSec

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 51
How can the Agent kit be sent out to host machines?
A. via a URL that is e-mailed to clients
B. via a TFTP server
C. via an FTP server
D. via a Telnet server

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 52
What is the purpose of the sniffer and protocol detection rule?
A. to stop sniffers from running on a network
B. to allow sniffers to run on a network
C. to cause an event to be logged when non-IP protocols and sniffer programs are detected running on systems
D. to deny non-IP protocols and sniffer programs from running on systems

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
What are three types of variables used for CSA? (Choose three.)
A. global sets
B. file sets
C. API sets
D. data sets
E. network address sets

Correct Answer: BDE Section: (none) Explanation Explanation/Reference:
QUESTION 54
What is the purpose of connection rate limit rules?
A. to limit the number of connections to an application
B. to limit the number of calls to the kernel in a specified time frame
C. to limit the number of network connections within a specified time frame
D. to limit the number of malformed connection requests to a web server

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 55
Which port is used to access the CSA MC from the administrative workstation?
A. 21
B. 23
C. 1741
D. 1802

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 56
Which two of the following file access rule criteria can you use to allow or deny the operations that the selected applications can perform on files? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications
E. the address with which a system is attempting to communicate

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 57
What action is taken on user query windows when the Agent UI is not present on a system?
A. The default action is always taken.
B. All actions are denied.
C. All actions are allowed.
D. All actions are allowed and logged.
Correct Answer: A Section: (none) Explanation

Explanation/Reference:
QUESTION 58
Which three make up the CSA architecture model? (Choose three.)
A. Cisco Trust Agent
B. Cisco Security Agent
C. Cisco Security Agent Management Center
D. Cisco Intrusion Prevention System
E. an administrative workstation
F. a syslog server

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 59
Which two of the following network access rules can you use to control access to specified network services? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:

We provide thoroughly reviewed Cisco 642-513 using the training resources which are the best for Cisco https://www.pass4itsure.com/642-513.html,and to get certified by Microsoft Windows Store apps.It is a best choice to accelerate your career as a professional in the Information Technology industry. Now we add the latest Cisco 642-513 content and to print and share content.

Continue Reading

Apple 9L0-003 Qs&As, Pass the Apple 9L0-003 Exam Materials Sale

Flydumps presents the highest quality of Apple 9L0-003 practice material which helps candidates to pass the pass4itsure.com Apple 9L0-003 exams in the first attempt.The brain dumps are the latest,authenticated by expert and covering each and every aspect of Apple 9L0-003 exam.

QUESTION 11
You have replaced the video card in a Power Macintosh G4 (FW 800). In what THREE ways should you test the repair before running the system to the customer? (Choose three)
A. Leave the computer on overnight.
B. Verify that the original symptom is resolved.
C. Verify that no new symptoms have occurred.
D. Start up the computer in Target Disk Mode to test the internal hard drive.
E. Run all Apple Service Diagnostic tests for the Power Mac G4 (FW 800).
F. Run Apple Service Diagnostic video tests for the Power Mac G4 (FW 800).

Correct Answer: BCE
QUESTION 12
An eMac has no video, but powers on with a normal startup chime, and normal startup sounds from the hard drive. Which of the following steps should you try next?
A. Update the eMac firmware.
B. Replace the eMac logic board.
C. Replace the eMac Display/Analog Assembly.
D. Connect a known-good VGA display to the eMac.

Correct Answer: D
QUESTION 13
You are troubleshooting an intermittent video issue on an eMac. Which of the following is them most appropriate way to approach this problem?
A. Do nothing. The problem may resolve itself.
B. Run looping diagnostics to verify the issue.
C. Follow component isolation steps to resolve the issue.
D. Replace the Display/Analog Assembly inside the eMac.
Correct Answer: B
QUESTION 14
Which of the following is ALMOST CERTAINLY a software-related problem?
A. No video display
B. Low disk space warning
C. Single beep at startup
D. No Internet connectivity

Correct Answer: B
QUESTION 15
You are troubleshooting a Power Mac G5 that will not boot, and emits error tones when powered on. You suspect that the customer may have installed incompatible or faulty RAM, but you are not sure. What should you do to verify the RAM requirements for this Power MAC G5?
A. Call Apple
B. Order Apple RAM
C. Check Specifications
D. Count the RAM sockets on the logic board

Correct Answer: C
QUESTION 16
You are troubleshooting a Power Mac G5 that has the following symptom: The power-on LED illuminates when the power button is pressed, fans spin, and the boot tine chimes, but there is no video displayed on the attached know-good display. Rank the following possible causes from First to Last, in the order you should check them:
1.
Crashed PMU

2.
Faulty logic board

3.
Corrupted PRAM

4.
Video card not fully seated in logic board connector

5.
Faulty video card
A. 1, 3, 4, 5, 2
B. 2, 1, 4, 3, 5
C. 3, 1, 4, 5, 2
D. 4, 3, 5, 1, 2
E. 5, 1, 2, 4, 3

Correct Answer: D
QUESTION 17
An eMac (USB 2.0) is displaying a flashing question mark at startup. When you start up the computer from a known-good bootable external FireWire hard drive the internal hard drive does not appear on the desktop. What is the recommended order in which to attempt the following troubleshooting steps on the internal hard drive?
1.
Replace the hard drive.

2.
Reinitialize the hard drive.

3.
Replace the hard drive cable.

4.
Verify the hard drive’s cable connections.

5.
Reinstall the software drivers for the hard drive.
A. 1, 3, 4, 2, 5
B. 2, 1, 3, 5, 4
C. 3, 1, 4, 5, 2
D. 4, 1, 5, 2, 3
E. 5, 4, 2, 3, 1

Correct Answer: E
QUESTION 18
A customer states that he cannot open an AppleWorks file. What is the most productive question to ask him FIRST?
A. Can you open any files?
B. Can you open other AppleWorks files?
C. What version of AppleWorks are you using?
D. In your Mac connected to a network?

Correct Answer: B
QUESTION 19
A hard dive in a Power Mac G4 (QuickSilver) is not spinning after the computer is powered on. You have verified that the drive power cable connector has no voltage by using a voltmeter. Which of the following is the most appropriate part or module to replace in this situation?
A. Hard Drive
B. Hard Drive Data Cable
C. Power Supply Assembly
D. Cable Harness Assembly

Correct Answer: C
QUESTION 20
Which THREE of the following computers uses Serial ATA hard drive technology? Select three.
A. Power Mac G4 (FW 800)
B. Power Mac G5 (Uni 1.6GHz)
C. Power Mac G5 (Dual 2.0 GHz)
D. Power Mac G4 (Mirrored Drive Doors)
E. Power Mac G5 (June 2004 Dual 2.5 GHz)

Correct Answer: BCE
QUESTION 21
A customer states that he has never been able to burn DVD’s with his eMac (USB 2.0), yet his friend has an identical-looking eMac (USB 2.0) that can burn DVD’s. You have verified that the customer’s eMac (USB 2.0) has a DVD / CD-RW Combo optical drive and is running the latest version of Mac OS X. The eMac has no other problems. What is the probable cause is this issue?
A. The eMac (USB 2.0) requires more RAM.
B. The eMac (USB 2.0) requires a firmware update.
C. The Combo drive is not capable of burning DVD’s.
D. The eMac (USB 2.O) optical drive is malfunctioning.

Correct Answer: C
QUESTION 22
You are working on an eMac that has no video on its built-in display. The fan is spinning, and there is drive activity present. You have tried resetting PRAM, booting to a known-good CD, and resetting the PMUm but the issue persists. You have also connected a known-good external VGA monitor to the eMac’s video out port, but failed to see any video on the external display. Which of the following is the most appropriate part or module to replace in this situation?
A. CRT
B. Logic Board
C. Power Supply
D. Display / Analog Assembly

Correct Answer: B
QUESTION 23
Which THREE of the following symptoms would be best resolved by performing a PMU reset as a first step? (Choose three)
A. Network / Internet connectivity issue.
B. No power / computer does not function.
C. Cursor randomly freezes on the display.
D. USB and/or FireWire port(s) do not function.
E. Computer does not sleep / wake from sleep.
Correct Answer: BCE
QUESTION 24
Which TWO of the following features are part of the Universal Motherboard Architecture in Apple desktop computers? (Choose two)
A. VGA
B. USB
C. FireWire
D. Target Disk Mode
E. Power Manager 2.0
F. Hardware DVD decoding

Correct Answer: CE
QUESTION 25
A Power Mac G5 fails to start up, and the status light on the front of the computer flashes three times.
What does this indicate?
A. Thermal failure
B. No startup disk found
C. Firmware v3.0 upgrade required
D. No RAM bank passed memory testing

Correct Answer: D
QUESTION 26
Which of the following Power Mac G5 internal fans can only be replaced by replacing the entire G5 enclosure?
A. Front inlet fan
B. Rear exhaust fan
C. Media blower / fan
D. Speaker / fan assembly
E. Power supply fan assembly

Correct Answer: C
QUESTION 27
Which TWO of the following computers can accept a 184-pin DDR333 PC2700 SDRAM DIMM? (Choose two)
A. iMac (Flat Panel)
B. eMac (USB 2.0)
C. Power Mac G5 (Uni 1.6Ghz)
D. Power Mac G5 (Dual 2.0 Ghz)
E. Power Mac G5 (June 2004 Dual 2.5 Ghz)
Correct Answer: BC
QUESTION 28
What is the function of the PMU in an Apple desktop computer?
A. The PMU controls all aspects of power flow.
B. The PMU controls the speed of the hard drive.
C. The PMU manages the amount of virtual memory used.
D. The PMU manages all communication with attached peripherals.
Correct Answer: A QUESTION 29
A Power Mac G5 sometimes becomes unresponsive and the cursor freezes on the display when running an application. You have verified the symptom, have already attempted to force the application to quit, but the computer remains unresponsive. What should you try next?
A. Hold the mouse button down for several seconds to regain cursor control.
B. Press the power button for several seconds to try shutting the computer down.
C. Disconnect and reconnect all peripherals to reset the Open Firmware Device Tree.
D. Disconnect the power cord and the backup battery for several minutes to reset the PMU.

Correct Answer: B
QUESTION 30
The fans inside a customer’s Power Mac G5 seem to constantly run at full speed after a repair involving logic board replacement. What should be done FIRST to correct this problem?
A. Replace the processor(s).
B. Run Apple Service Diagnostic.
C. Replace the fans inside the Power Mac G5.
D. Replace the Power Mac G5 logic board again.

Correct Answer: B
QUESTION 31
You are troubleshooting an eMac system that has Mac OS X. The icon of a connected external FireWire drive is not appearing on the Finder Desktop. Which of the following would be MOST useful in troubleshooting this issue?
A. Terminal
B. Network Utility
C. Process Viewer
D. System Profile
E. Apple Hardware Test

Correct Answer: D
QUESTION 32
A Macintosh can start up from Mac OS X, but not from Mac OS 9. If you select the Mac OS 9 System Folder in the Startup Disk preference pane of MAC OS X, a flashing question mark appears on the screen when you restart the computer. What is one possible cause of this condition?
A. The disk was reformatted using Disk Utility for Mac OS X, using the HFS Plus (extended) format instead of HFS format.
B. The disk was reformatted using Disk Utility for Mac OS X, and the option to install the Mac OS 9 drivers was not selected.
C. The disk was reformatted using Disk Utility for Mac OS X, using the HFS format instead of HFS Plus (extended) format.
D. This Macintosh does not support booting into Mac OS 9.

Correct Answer: B
QUESTION 33
What is the first step to take if you have an iMac (Flat Panel) that constantly ejects any CD / DVD that is inserted?
A. Replace the optical drive.
B. Replace the optical drive cable.
C. Replace the optical drive bezel.
D. Disconnect all peripheral devices, especially the mouse.

Correct Answer: D QUESTION 34
A customer needs to transfer data from her eMac for use on her Power Mac G5, but the eMac fails to start up completely due to a video issue.
Which of the following would most easily accomplish the data transfer?
A. Remove the hard drive from the eMac and install it into the Power Mac G5.
B. The eMac will need to be replaced before any data can be recovered from it.
C. Boot the eMac into Mac OS X Safe Mode and connect the eMac and Power Mac G5 with an Ethernet cable.
D. Boot the eMac into Target Disk Mode and connect the eMac and Power Mac G5 with a FireWire cable.

Correct Answer: D QUESTION 35
A Power Mac G4 (Mirrored Doors) displays a flashing question mark at startup. Which step does Apple recommend you take FIRST?
A. Reset Parameter RAM.
B. Try to start up from a bootable CD or DVD.
C. Reinitialize the hard disk and reinstall the Mac OS.
D. Replace the internal hard drive with a known-good hard drive.

Correct Answer: B QUESTION 36

All our Cisco products are up to date! When you buy any Apple 9L0-003 product from Certpaper, as “Apple 9L0-003 Questions & Answers with explanations”, you are automatically offered the Apple 9L0-003 updates for a total of 90 days from the day you bought it. If you want to renew your Apple 9L0-003 purchase during the period of these 90 days, your Apple 9L0-003 product is renewed and you are further enabled to enjoy the free Cisco updates.

Continue Reading

Apple 9A0-043 Exam Test Questions, 100% Pass Rate Apple 9A0-043 Free Dowload Is What You Need To Take

Flydumps bring you the best Apple https://www.pass4itsure.com/9a0-043.html exam preparation materials which will make you pass in the first attempt.And we also provide you all Apple 9A0-043 exam updates as Microsoft announces a change in its Apple 9A0-043 exam syllabus,we inform you about it without delay.

QUESTION 11
Which format should you use to export your Illustrator document to a vector file format that can be viewed in a Web browser?
A. GIF
B. EPS
C. SVG
D. JPEG
Correct Answer: C QUESTION 12
Which export format allows you to embed ICC profiles?
A. GIF
B. PNG
C. JPEG
D. Enhanced Metafile Correct Answer: C
QUESTION 13
What should you do to vertically dock one palette to another? Exhibit:

A. drag the Palette tab of one palette to the bottom of the other palette
B. drag the Palette tab of one palette into the Palette tab area of the other palette
C. use the Palette Options command on the Palette menu to designate the desired docked position
D. Alt-drag (Windows) or Option-drag (Mac OS) the Palette tab of one palette into the Palette tab area of the other palette

Correct Answer: A
QUESTION 14
You want to have Adobe Bridge act as a floating palette to easily drag assets into your Illustrator document. Which mode should you toggle?
A. Compact mode
B. Thumbnail mode
C. Details View mode
D. Ultra-compact mode

Correct Answer: A
QUESTION 15
You are using the Paintbrush tool to create paths with an Art brush applied to them. Every time you drag the Paintbrush tool over an existing selected path, the path shape changes. You want to be able to create a new path instead of changing an existing path. What should you do?
A. set Fidelity to zero
B. set Smoothness to zero
C. turn off Edit Selected Paths
D. turn on Fill New Brush Strokes
Correct Answer: C
QUESTION 16
You are creating artwork for animation and will export the artwork as a SWF file.
Which type of object should you use to greatly reduce the output size of the SWF file?
A. Mesh
B. Patterns
C. Symbols
D. Gradients

Correct Answer: C
QUESTION 17
When making default color management decisions, to what does a color management policy compare profiles?
A. the RGB working space
B. the CMYK working space
C. the current working space
D. the rendering intent that is currently selected
E. the color management engine that is currently selected

Correct Answer: C
QUESTION 18
You are configuring your Color Settings. You want to utilize color management but want CMYK values to be preserved when opening untagged documents. You also want to use an RGB working color space that is well suited for documents that will be converted to CMYK. Which default setting should you choose?
A. Monitor Color
B. North America Prepress 2
C. Emulate Adobe Illustrator 6.0
D. North America General Purpose 2

Correct Answer: B
QUESTION 19
You have an Illustrator document that you need to save as a legacy Illustrator document. Which is the oldest version that will preserve transparency?
A. Illustrator 8
B. Illustrator 9
C. Illustrator 10
D. Illustrator CS
Correct Answer: B
QUESTION 20
You want to add a gradient fill to your type. Which two menu options could you use? (Choose two.)
A. Type > Glyphs
B. Object > Expand
C. Type > Create Outlines
D. Object > Compound Path
E. Type > Area Type Options
Correct Answer: BC
QUESTION 21
In which palette do you find the option to align the stroke of your closed path to the outside?
A. Align palette
B. Stroke palette
C. Attributes palette
D. Appearance palette

Correct Answer: B QUESTION 22
You are saving a file to an Illustrator version earlier than 9.0. An option field within the dialog becomes active to allow you to determine what will happen to objects _____.
A. with links
B. containing type
C. containing PDF data
D. containing transparency

Correct Answer: D QUESTION 23
Refer to the exhibit.
You are using the Transform palette to scale a selected object. You notice the warning icon shown in the exhibit, at the bottom of the palette. What does this icon indicate will happen when you attempt to scale the object? Exhibit:

A. Only the object will be transformed.
B. Only the pattern of the object will be transformed.
C. Only the object and its strokes and effects will be transformed.
D. Both the object and the pattern of the object will be transformed.

Correct Answer: B
QUESTION 24
Which Web graphic format is resolution-independent?
A. PNG
B. SVG
C. JPEG
D. WBMB

Correct Answer: B
QUESTION 25
How should you display the alternate glyphs for a highlighted character?
A. select Access All Alternates in the Show list of the Glyphs palette
B. select Alternates for Current Selection in the Show list of the Glyphs palette
C. select Substituted Fonts in the Highlight area of the Document Setup dialog box
D. select Substituted Glyphs in the Highlight area of the Document Setup dialog box

Correct Answer: B
QUESTION 26
Which category of print options enables you to create color separations?
A. Setup
B. Output C. Advanced
D. Color Management

Correct Answer: B
QUESTION 27
How should you create a clipping mask by using the Layers palette?
A. arrange the objects on one layer with the clipping path on the top, select the layer and choose Make Clipping Mask from the Layers palette menu
B. arrange the objects on one layer with the clipping path on the bottom, select the layer and choose Make Clipping Mask from the Layers palette menu
C. arrange the objects on one layer with the clipping path on the top, select each separate object (not the layer) and choose Make Clipping Mask fromthe Layers palette menu
D. arrange the objects to be clipped on one layer and the clipping path on a separate layer above, select both layers and choose Make Clipping Mask from the Layers palette menu

Correct Answer: A
QUESTION 28
Refer to the exhibit.
Image A in the exhibit has no transparency applied. Which statement about Image B is true? Exhibit:

A. An opacity mask was applied.
B. Isolate blending was turned on.
C. The objects were grouped first, then transparency was applied.
D. The objects were selected individually and transparency was applied to each.

Correct Answer: C
QUESTION 29
You are printing a file with gradients, meshes, or color blends to a device that supports Postscript Language Level 2. You choose to rasterize these objects to improve print quality. To which format does Illustrator convert these objects?
A. GIF
B. EPS
C. TIFF
D. JPEG

Correct Answer: D
QUESTION 30
You are preparing an Illustrator file for color separation. Which color mode should your document be using?
A. RGB color
B. LAB color
C. HSB color
D. CMYK color

Correct Answer: D
QUESTION 31
Which icon should you click repeatedly to cycle through the views of a palette? Exhibit:

A. OPTION A
B. OPTION B
C. OPTION C
D. OPTION D

Correct Answer: B
QUESTION 32
You create an object using the Symbol Sprayer tool and change the color of several of the symbols within the object. What should you use to change a symbol back to the original color value?
A. Symbol Styler tool and the Alt (Windows) or Option (Mac OS) key
B. Symbol Shifter tool and the Alt (Windows) or Option (Mac OS) key
C. Symbol Stainer tool and the Alt (Windows) or Option (Mac OS) key
D. Symbol Screener tool and the Alt (Windows) or Option (Mac OS) key

Correct Answer: C
QUESTION 33
You want to export your Illustrator document to a raster file format that allows you to control image compression while retaining all of the color information. Which format should you choose?
A. GIF
B. EPS
C. PSD
D. JPEG
Correct Answer: D QUESTION 34
What does Adobe Bridge allow you to do?
A. browse files of all Adobe file formats
B. convert from one Adobe file format to another
C. edit metadata of any file format, Adobe or other
D. convert non-Adobe files to the most closely related Adobe file format

Correct Answer: A QUESTION 35
You are converting several vector objects to raster. Which should you select in the Rasterize dialog box so that you can control the resolution globally?
A. Screen (72 ppi)
B. High (300 ppi)
C. Anti-aliasing: None
D. Use Document Raster Effects Resolution

Correct Answer: D

Worried about Apple https://www.pass4itsure.com/9a0-043.html pass results? Adopt most reliable way of exam preparation that is Apple 9A0-043 Questions & Answers with explanations to get reliable high Apple 9A0-043 pass result.Flydumps definitely guarantees it!

Continue Reading

Apple 9A0-036 PDF, Latest Updated Apple 9A0-036 Study Guides Is Your Best Choice

Flydumps Apple 9A0-036 exam questions and answers in PDF are prepared by our expert, Moreover, they are based on the recommended syllabus covering all the Apple https://www.pass4itsure.com/9a0-036.html exam objectives.You will find them to be very helpful and precise in the subject matter since all the Apple 9A0-036 exam content is regularly updated and has been checked for accuracy by our team of Microsoft expert professionals.

QUESTION 11
You are recording an action. During its playback, you want an image’s magnification to be adjusted to fit the image on screen.
What should you do?
A. choose View > Fit on Screen
B. when you get to the point for the magnification change, choose View > Fit on Screen
C. use the Insert Menu Item command from the Action palette menu, then choose View > Actual Pixels
D. Use the Insert Menu Item command from the Action palette menu, then choose View > Fit on Screen

Correct Answer: D QUESTION 12
Exhibit.

The three images in the exhibit were scanned together. You apply the File>Automate>Crop and Straighten Photos command.
What is the result?
A. A separate layer is created for each image, excluding the white border, and each is rotated to correct for its crookedness.
B. A separate layer is created for each image, including some white border, and each is rotated to correct for its crookedness.
C. A separate document is created for each image, excluding the white border, and each is rotated to correct for its crookedness.
D. A separate document is created for each image, including some white border, and each is rotated to correct for its crookedness.

Correct Answer: C QUESTION 13
You want to modify the tonal range of an image without permanently affecting the pixels. What should you do?
A. use Variations
B. use Auto Levels
C. use a layer style
D. use an adjustment layer

Correct Answer: D QUESTION 14
What would you most likely need to do afterresamplinga 20 megabyte image to 100 kilobytes using BicubicInterpolation?
A. Blur
B. Sharpen
C. Add Noise
D. Auto Levels

Correct Answer: B QUESTION 15
Which option in the Auto Color Correction Options dialog box preserves the overall color relationship while making highlights appear lighter and shadows appear darker?
A. Snap NeutralMidtones
B. Find Dark & Light Colors
C. Enhance Per Channel Contrast
D. Enhance Monochromatic Contrast Correct Answer: D
QUESTION 16
You are trying to lighten only the darkest shadows in an image by choosing Image > Adjustments > Shadow/Highlight. You notice that lighter areas are being affected as well.
What should you do?
A. increase the Radius setting
B. decrease the Radius setting
C. increase the Tonal Width setting
D. decrease the Tonal Width setting

Correct Answer: D QUESTION 17
You are working in the Levels dialog box. The pixels in the image cover a range from 0-220. You want to increase the contrast in the highlight areas of the image.
What should you do?
A. increase the value for the black Input Level
B. decrease the value for the white Input Level
C. increase the value for the black Output Level
D. decrease the value for the white Output Level

Correct Answer: B QUESTION 18
You are using the Shadow/Highlight command to correct an underexposed image. Which value determines the scale size for corrections?
A. Radius
B. Amount
C. Tonal Width
D. MidtoneContrast

Correct Answer: A QUESTION 19
An overexposed photograph has nearly no detail in its highlights, but otherwise has acceptable tonal balance.
Which option from the Image > Adjustments menu should you use to reveal the details in the highlights?
A. Gradient Map
B. Channel Mixer
C. Shadow/Highlight
D. Brightness/Contrast

Correct Answer: C QUESTION 20
You want to crate a diagonal elliptical marquee. What should you do?
A. hold down the spacebar and rotate the marquee while dragging with the Elliptical Marquee tool
B. create a marquee with the Elliptical Marquee tool, then rotate it by choosing Edit > Free Transform
C. create a marquee with the Elliptical Marquee tool, then rotate it by choosing Select > Transform Selection
D. While dragging with the Elliptical Marquee tool, hold down Alt (Windows) or Option (Mac OS) and rotate the marquee

Correct Answer: C QUESTION 21
You have a photo of a green leaf. The leaf is in sharp focus and is against a blurred green background.
You want to make a selection that follows the contour of the leaf.
What should you do?

A. use the Find Edges filter
B. use the Magic Wand tool
C. use the Magnetic Lasso tool
D. choose Select >ColorRange

Correct Answer: C QUESTION 22
You have saved as selection as a channel. You now want to load and reuse the selection. What should you do?
A. drag the alpha channel into the image window
B. Alt (Windows) or Option (Mac OS) click on the alpha channel
C. Ctrl (Windows) or Command (Mac OS)click on the alpha channel
D. Right-click (Windows) or Control-click (Mac OS) on the channel and choose Load Channel as Selection

Correct Answer: C QUESTION 23
You have created a rough selection of an object in your image. You want to refine the selection by suing quick mask with its default settings and the Brush tool.
Which statement is true?
A. Painting with white adds to the selection
B. Painting with black adds to the selection.
C. The opacity setting of the brush is irrelevant.
D. The foreground color must be either black or white.

Correct Answer: A QUESTION 24
You have made a feathered selection. You then repeatedly fill the selected area with different colors. Which statement is true?
A. Traces of the earlier color fills remain at the feathered edges of the selection.
B. At the feathered edges of the selection only the image’s luminosityareaffected, not its hue or saturation.
C. At the feathered edges of the selection only the image’s hue and saturation area affected, not its luminosity.
D. Though fading in opacity at the feathered edges of the selection, the newer fills completely overwrite the earlier ones.

Correct Answer: A
QUESTION 25
Exhibit.

Which tool can completely eliminate the white pixels in the background of the image shown in the exhibit with a single click?
A. Eraser
B. Extract
C. Magic Eraser
D. Color Replacement

Correct Answer: C QUESTION 26
You have been editing an image. You want to restore certain small areas of the image to their condition before your last several edits.
Which tool or command should you use?
A. Eraser tool
B. Edit > Undo
C. History Brush tool
D. Edit > Step Backward

Correct Answer: C QUESTION 27
You are suing the Pattern Stamp tool to paint in your image.
Which tool option ensures that the pattern is applied continuously, rather than from the initial sampling point, regardless of how many times you stop and resume painting with the pattern?
A. Flow
B. Aligned
C. Impressionist
D. Protect Texture

Correct Answer: B QUESTION 28
Exhibit.

In the exhibit, which gradient was used to create the result to the right?
A. Angle Gradient
B. Redial Gradient
C. Diamond Gradient
D. Reflected Gradient

Correct Answer: C QUESTION 29
Which option from the Brushes palette allows you to determine the number and placement of marks in a stroke?
A. Texture
B. Scattering
C. Shape Dynamics
D. Brush Tip Shapes

Correct Answer: B QUESTION 30
Exhibit.

You want to create a shape layer by drawing in a freeform manner.
Which two buttons from the Vector Tools Options Bar should you choose? (Choose two.)

A. A
B. B
C. C
D. D
E. E
Correct Answer: AD

Apple 9A0-036 Questions & Answers with explanations is all what you surely want to have before taking Apple 9A0-036.Apple https://www.pass4itsure.com/9a0-036.html Interactive Testing Engine is ready to help you to get your Apple 9A0-036 by saving your time by preparing you quickly for the Cisco exam. If you are worried about getting your Apple 9A0-036 certification passed and are in search of some best and useful material, Apple 9A0-036 Q&A will surely serve you to enhance your Interconnecting Cisco Networking Devices Part 1 stydy.

Continue Reading