Cisco 642-811 Study Guides, Helpful Cisco 642-811 Practice Questions With Low Price

important Info: These new valid Cisco https://www.pass4itsure.com/642-811.html exam questions were updated in recent days by Cisco 642-811,please visit our website to get the full version of new Cisco 642-811 exam dumps with free version of new VCE Player, you can pass the exam easily by training it!

QUESTION 66
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge. Which switch should the administrator configure as the root bridge and which configuration command must the administrator enter to accomplish this?

A. DSW11(config)# spanning-tree vlan 1 priority 4096
B. DSW12(config)# set spanning-tree priority 4096
C. ASW13(config)# spanning-tree vlan 1 priority 4096
D. DSW11(config)# set spanning-tree priority 4096
E. DSW12(config)# spanning-tree vlan 1 priority 4096
F. ASW13(config)# set spanning-tree priority 4096

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 67
When IP multicast is enabled via PIM, which mode uses the flood and prune method?
A. PIM sparse-dense
B. Bidir-PIM
C. PIM-RP
D. PIM-DM
E. PIM-SM

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 68
Refer to the exhibit. What statement is true about the configuration on switch CAT1?

A. The configuration overrides 802.1p priorities on packets entering ports Fa0/11 and Fa0/12 with a value of 48.
B. The configuration establishes policed DSCP on ports Fa0/11 and Fa0/12 with values ranging from 8 to
56.
C. The configuration overrides the Quality of Service value in packets entering ports Fa0/11 and Fa0/12 with a value of 45.
D. Two IP phones with the MAC addresses of 0008.8595.d1a7 and 0007.8595.d2b7 are connected to CAT1 ports Fa0/11 and Fa0/12, respectively.
E. Security violation shutdown mode has been activated for ports Fa0/11 and Fa0/12.
F. Untagged Port VLAN ID (PVID) frames will carry voice traffic on VLAN 40.
Correct Answer: D Section: (none) Explanation

Explanation/Reference:
QUESTION 69
On a 3550 EMI switch, which three types of interfaces can be used to configure HSRP? (Choose three.)
A. loopback interface
B. SVI interface
C. routed port
D. access port
E. EtherChannel port channel
F. BVI interface

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 70
What are three possible router states of HSRP routers on a LAN? (Choose three.)
A. standby
B. established
C. active
D. idle
E. backup
F. init

Correct Answer: ACF Section: (none) Explanation
Explanation/Reference:
QUESTION 71
How does VTP pruning enhance network bandwidth?
A. by restricting unicast traffic to across VTP domains
B. by reducing unnecessary flooding of traffic to inactive VLANs
C. by limiting the spreading of VLAN information
D. by disabling periodic VTP updates

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 72
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? (Choose two.)

A. BPDUs will be sent out every two seconds.
B. The time spent in the listening state will be 30 seconds.
C. The time spent in the learning state will be 15 seconds.
D. The maximum length of time that the BPDU information will be saved is 30 seconds.
E. This switch is the root bridge for VLAN 200.
F. BPDUs will be sent out every 10 seconds.

Correct Answer: BF Section: (none) Explanation
Explanation/Reference:
QUESTION 73
Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?

A. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode auto
B. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode passive
C. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode desirable
D. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2Switch2(config-if)# channel-group 5 mode on

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 74
Which message type was added to IGMPv2?
A. heartbeat
B. join request
C. leave report
D. status report
E. membership report

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 75
Refer to the exhibit. On the basis of the partial configuration provided in the exhibit, what additional configuration is required to allow the router to properly participate in a PIM sparse-dense mode scenario?

A. The RP configuration needs to be added for the router to participate in dense mode network areas.
B. The RP configuration needs to be added for the router to participate in sparse mode network areas.
C. The PIM dense-mode state, refresh interval needs to be configured.
D. IGMP needs to be enabled on the router.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 76
What is the maximum Ethernet frame size on a trunk link configured using IEEE 802.1Q encapsulation?
A. 1496 Bytes
B. 1500 Bytes
C. 1518 Bytes
D. 1522 Bytes
E. 1548 Bytes

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 77
Which two statements are true about a switched virtual interface (SVI)? (Choose two.)
A. An SVI is created by entering the no switchport command in interface configuration mode.
B. An SVI is created for the default VLAN (VLAN1) to permit remote switch administration by default.
C. An SVI provides a default gateway for a VLAN.
D. Multiple SVIs can be associated with a VLAN.
E. SVI is another name for a routed port.

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 78
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?

A. All ports will be in forwarding mode.
B. All ports in VLAN 10 will be in forwarding mode.
C. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in blocking mode.
D. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in standby mode.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 79
About how long does it take for the port to change from blocking to forwarding when spanning-tree PortFast is enabled?
A. immediately
B. 15 seconds
C. 20 seconds
D. 30 seconds
E. 50 seconds

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 80
Refer to the exhibit. Which two commands would both produce the output in the exhibit? (Choose two.)

A. show standby
B. show standby group 10
C. show glbp 10
D. show glbp disabled
E. show glbp active
F. show glbp standby

Correct Answer: CE Section: (none) Explanation Explanation/Reference:
QUESTION 81
Which two statements are true concerning an Ethernet MAC address that maps to a Layer 3 multicast address? (Choose two.)
A. The first 3 bytes of the Ethernet multicast MAC address are 01:00:5E.
B. The last 3 bytes of the Ethernet multicast MAC address are 01:00:5E.
C. When assigning a Layer 3 multicast address, an Ethernet Layer 2 address is automatically generated from the hardcoded MAC address.
D. The multicast address copies the last 23 bits of the IP address into the last 23 bits of the Ethernet multicast MAC address.
E. The Ethernet multicast address assigns the last 24 bits of the MAC address to all Fs.
F. The Ethernet multicast address assigns the first 24 bits of the MAC address to all Fs.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 82
What does the following command accomplish? Switch(config-mst)#instance 10 vlan 11-12
A. enables a PVST+ instance of 10 for vlan 11 and vlan 12
B. enables vlan 11 and vlan 12 to be part of the MST region 10
C. maps vlan 11 and vlan 12 to the MST instance of 10
D. creates an Internal Spanning Tree (IST) instance of 10 for vlan 11 and vlan 12
E. creates a Common Spanning Tree (CST) instance of 10 for vlan 11 and vlan 12
F. starts two instances of MST, one instance for vlan 11 and another instance for vlan 12

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 83
Which two statements are true about Internet Group Management Protocol (IGMP) snooping? (Choose two.)
A. IGMP snooping and Cisco Group Membership Protocol (CGMP) can be used simultaneously on a switch.
B. IGMP snooping and Cisco Group Membership Protocol (CGMP) were developed to help Layer 3 switches make intelligent forwarding decisions on their own.
C. IGMP snooping examines IGMP join/leave messages so that multicast traffic is forwarded only to hosts that sent an IGMP message toward the router.
D. IGMP snooping is an IP multicast constraining mechanism for Layer 2 switches.
E. IGMP snooping is enabled with the ip multicast-routing global configuration command.

Correct Answer: CD Section: (none) Explanation
Explanation/Reference: QUESTION 84
Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value?
A. VTP
B. 802.1Q
C. DTP
D. ISL

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 85
Which three statements are true of the Port Aggregation Protocol (PAgP)? (Choose three.)
A. PAgP is a standards-based protocol defined in IEEE 802.3ad.
B. PAgP is used to connect to non-Cisco devices.
C. PAgP packets are sent with the command channel-group 1 mode desirable.
D. PAgP does not require the STP costs to be the same in order to form an EtherChannel.
E. An Etherchannel link will form if one end of the channel is configured as active and the other end as passive mode.
F. An Etherchannel link will form if one end of the channel is configured as auto and the other end as desirable mode.

Correct Answer: CDF Section: (none) Explanation
Explanation/Reference:
QUESTION 86
When authentication is required, where must 802.1x be configured in order to connect a PC to a switch?
A. client PC only
B. switch port only
C. switch port and client PC
D. switch port and local router port

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 87
Assuming that VLAN 1 and VLAN 2 traffic is enabled on the above network, what effect will the following command have when entered on port 0/2 on Switch Aspanning-tree vlan 1 port-priority 16

A. VLAN 1 traffic will be blocked on Switch B port 1/1.
B. VLAN 2 traffic will be blocked on Switch B port 1/1.
C. VLAN 2 traffic will be blocked on Switch A port 0/2.
D. VLANs 1 and 2 will be blocked on Switch A port 0/1.
E. VLANs 1 and 2 will be blocked on Switch A port 0/2.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 88
LAB
Refer to question 13.

Router name and IP address may be different.
e
A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center
QUESTION 89
What is the cause of jitter?
A. variable queue delays
B. packet drops
C. transmitting too many small packets
D. compression

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 90
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?

e A. The command will be rejected by the switch.
B. Interfaces FastEthernet0/13 and FastEthernet0/14 will no longer be bundled.
C. Dynamic Trunking Protocol will be turned off on interfaces FastEthernet0/13 and FastEthernet0/14.
D. Interfaces FastEthernet0/13 and FastEthernet0/14 will only allow traffic from the native VLAN.
E. Interfaces FastEthernet0/13 and FastEthernet0/14 will continue to pass traffic for VLANs 88,100,360.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 91
Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1. Given the output that was generated, which two security statement are true? (Choose two.)

A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.
B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.
C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict command.
D. When the number of secure IP addresses reaches 10, the interface will immediately shut down.
E. When the number of secure MAC addresses reaches 10, the interface will immediately shut down and an SNMP trap notification will be sent.

Correct Answer: BE Section: (none) Explanation Explanation/Reference:
QUESTION 92
Which three statements are true about the Internet Group Management Protocol (IGMP)? (Choose three.)
A. IGMP is a multicast routing protocol that makes packet-forwarding decisions independent of other routing protocols such as EIGRP.
B. IGMP is used to register individual hosts with a multicast group.
C. IGMP messages are IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1.
D. IGMP snooping runs on Layer 3 routers.
E. IGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic from.
F. There are three IGMP modes: dense mode, sparse mode, and sparse-dense mode.

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 93
Observe the above diagram. Spanning tree is enabled on all devices. Currently either Switch B or C can serve as the root should Switch A fail. A client recently connected Device D, a PC running switching application software, to Switch C port P3/3. The administrator would like to configure Root Guard to ensure that Device D does not assume the role of root. All other parameters must stay the same. On which interface(s) must Root Guard be enabled?

A. P1/2
B. P2/2
C. P3/3
D. P1/1 and P1/2
E. P1/2 and P2/2
F. P1/2, P2/2 and P3/3

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 94
Refer to the exhibit. Given the partial output, which statement is true?

A. The console port will require authentication through TACACS+.
B. The console port will not require any authentication.
C. Users logging in through the network ports will have authentication verified through TACACS+.
D. PPP authentication will be authenticated through the TACACS+ server first.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 95
A network administrator assigns a multicast address of 239.255.8.5 to an application running on a device with an Ethernet MAC address of 01.b2.7d.05.f1.80. Which Layer 2 multicast address will this device use?
A. 01.00.5e.7F.08.05
B. 01.b2.7d.05.f1.80
C. 01.b2.7d.0a.08.05
D. 01.00.5e.05.f1.80
E. ff.ff.ff.ff.ff.ff

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 96
Which statement is true if the spanning tree enhancement Root Guard is enabled?
A. If BPDUs are not received on a nondesignated port, the port is moved into the STP loop-inconsistent blocked state.
B. If BPDUs are received on a PortFast enabled port, the port is disabled.
C. If superior BPDUs are received on a designated port, the interface is placed into the root-inconsistent blocked state.
D. If inferior BPDUs are received on a root port, all blocked ports become alternate paths to the root bridge.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 97
The network operations center has received a call stating that users in VLAN 107 are unable to access resources through Router 1. From the information contained in the graphic, what is the cause of this problem?
A. VLAN 107 does not exist on switch A.
B. VTP is pruning VLAN 107
C. VLAN 107 is not configured on the trunk
D. spanning tree is not enabled on VLAN 107

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 98
Refer to the exhibit. The GigabitEthernet 0/1 interfaces of Switch1 and Switch2 have been properly configured to support trunking. On the basis of the VTP configuration commands that have been issued on Switch1, which command set is required to properly configure VTP on Switch2?

A. Switch2# conf t Switch2(config)# vtp mode serverSwitch2(config)# version 2Switch2(config)# vtp domain eng_groupSwitch2(config)# vtp password switch1
B. Switch2# conf t Switch2(config)# vtp mode serverSwitch2(config)# vtp domain eng_groupSwitch2 (config)# vtp password switch1
C. Switch2# conf t Switch2(config)# vtp mode clientSwitch2(config)# version 2Switch2(config)# vtp domain eng_groupSwitch2(config)# vtp password switch2
D. Switch2# conf t Switch2(config)# vtp mode clientSwitch2(config)# version 2Switch2(config)# vtp domain eng_groupSwitch2(config)# vtp password switch1

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 99
Which type of IGMP message is sent when a network client wants to join a multicast group?
A. host membership query
B. host membership report
C. host membership status
D. host membership notification

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 100
Refer to the exhibit. A network engineer is trying to connect to the console port of Sw2. What authentication process will the switch go through?

A. Authentication will fail because SmartPort has not been enabled.
B. Authentication will fail because an IP address has not been specified for the SmartPort database.
C. The switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the local database.
D. The switch will attempt to authenticate using the enable secret password. If this fails, the switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the password goaway.
E. The switch will contact the SmartPort database. If the SmartPort database is unreachable, the switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the local database.
F. The switch will contact the SmartPort database. If the SmartPort database is unreachable, the switch will contact the TACACS+ server. If the TACACS+ server is unreachable, the switch will use the enable secret password.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 101
Which three conditions need to be present for UplinkFast to trigger a fast reconfiguration? (Choose three.)
A. The switch must have at least one unblocked port.
B. The switch must have UplinkFast enabled.
C. The switch must be configured for one VLAN.
D. The switch must have at least one blocked port.
E. The failure must be on the root port.
F. The switch must be enabled on a VLAN with switch priority configured.

Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
QUESTION 102
Refer to the exhibit. Based on the configuration provided, how will the user be authenticated?

A. Authentication for all ports will be enforced according to the local database policy.
B. Authentication for all ports will be enforced according to the CON list.
C. The CON list will be used only if the default local authentication failed.
D. No authentication will be required for the console port.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 103
Which router redundancy protocol cannot be configured for interface tracking?
A. HSRP
B. GLBP
C. VRRP
D. SLB
E. RPR
F. RPR+

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 104
Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we conclude about interfaces Fa0/13 and Fa0/14?

A. that interfaces Fa0/13 and Fa0/14 are in VLAN 1
B. that interfaces Fa0/13 and Fa0/14 are down
C. that interfaces Fa0/13 and Fa0/14 are trunk interfaces
D. that interfaces Fa0/13 and Fa0/14 have a domain mismatch with another switch
E. that interfaces Fa0/13 and Fa0/14 have a duplex mismatch with another switch

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 105
Which well-defined routing protocol would a network administrator configure on multicast routers when member routers are widely dispersed?
A. Distance Vector Multicast Routing Protocol (DVMRP)
B. Protocol Independent Multicast Dense Mode (PIM-DM)
C. Multicast Open Shortest Path First (MOSPF)
D. Protocol Independent Multicast Sparse Mode (PIM-SM)
E. Core-Based Trees (CBT)

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 106
What are three functional areas of the Enterprise Composite Network Model? (Choose three.)
A. Enterprise Campus
B. Enterprise Edge
C. Service Provider Edge
D. Building Access
E. Server Farm
F. Campus Backbone
Correct Answer: ABC Section: (none) Explanation

Explanation/Reference:
QUESTION 107
Refer to the exhibit. Why is the line protocol down on interface FastEthernet 0/13 on switch CAT1?

A. Switch CAT1 and switch CAT2 must use ISL encapsulation for these configurations to work.
B. The interfaces on switch CAT1 and switch CAT2 must be in access mode for these configurations to work.
C. Interface FastEthernet 0/13 on switch CAT1 and interface FastEthernet 0/13 on switch CAT2 are in different native VLANs.
D. Interface FastEthernet 0/13 on switch CAT1 and interface Port-channel1 on switch CAT1 are in different native VLANs.
E. Dynamic Trunking Protocol is turned off on interface FastEthernet 0/13 on switch CAT1.
F. Dynamic Trunking Protocol is turned off on interface FastEthernet 0/13 on switch CAT2.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 108
Refer to the exhibit. All switches must be part of a common MST region. On the basis of the information presented in the exhibit, which statement is true?
A. The configuration must be implemented on the MST root switch only.
B. The configuration is optional on the MST root switch.
C. The configuration is mandatory on all MST switches in the MST region.
D. The configuration is optional on all MST switches in the MST region.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 109
What does the Catalyst switch interface configuration command switchport trunk native vlan 7 accomplish?
A. configures the interface to be a trunking port and causes traffic on VLAN 7 to be 802.1q tagged
B. causes the interface to apply ISL framing for traffic on VLAN 7
C. configures the trunking interface to send traffic from VLAN 7 untagged
D. configures the trunking interface to forward traffic from VLAN 7

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 110
Which statement is true about the STP Path Cost on a particular port?
A. It is known only to the local switch where the port resides.
B. It can be modified to help determine Root Bridge selection.
C. Modifying it can cause TCN BPDU to be sent to the Root Bridge.
D. When increased, it can provide higher bandwidth to a connecting port.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 111
Which process plays a major role in the creation of the CEF adjacency table?
A. Address Resolution Protocol (ARP)
B. PDU header rewrite
C. NetFlow switching
D. hello packet exchange

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 112
Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Choose two.)
A. VTP mode
B. STP root status
C. negotiation status
D. management domain
E. configuration revision number

Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
QUESTION 113
Examine the router output above. Which two items are correct? (Choose two.)

A. Router A will assume the active state if its priority is the highest.
B. If Ethernet 0/2 goes down, the standby router will take over.
C. When Ethernet 0/3 of RouterA comes back up, the priority will become 105.
D. The local IP address of Router A is 10.1.0.6.
E. The local IP address of Router A is 10.1.0.20.

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 114
Refer to the exhibit. VLAN 1 and VLAN 2 are configured on the trunked links between Switch A and Switch
B. Port Fa 0/2 on Switch B is currently in a blocking state for both VLANs. What should be done to load balance VLAN traffic between Switch A and Switch B?

A. Lower the port priority for VLAN 1 on port 0/1 for Switch A.
B. Lower the port priority for VLAN 1 on port 0/2 for Switch A.
C. Make the bridge ID of Switch B lower than the ID of Switch A.
D. Enable HSRP on the access ports.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 115
What two pieces of information will the show vlan id 5 command display? (Choose two.)
A. VLAN information on port 0/5
B. ports in VLAN 5
C. MTU and type
D. utilization
E. filters

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 116
In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Choose three.)
A. STP
B. CDP
C. EAP MD5
D. TACACS+
E. EAP-over-LAN
F. protocols not filtered by an ACL

Correct Answer: ABE Section: (none) Explanation
Explanation/Reference:
QUESTION 117
Based on the network diagram and routing table output in the exhibit, which of these statements is true?

A. InterVLAN routing has been configured properly, and the workstations have connectivity to each other.
B. InterVLAN routing will not occur since no routing protocol has been configured.
C. Although interVLAN routing is not enabled, both workstations will have connectivity to each other.
D. Although interVLAN routing is enabled, the workstations will not have connectivity to each other.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 118
A new workstation has consistently been unable to obtain an IP address from the DHCP server when the workstation boots. Older workstations function normally, and the new workstation obtains an address when manually forced to renew its address. What should be configured on the switch to allow the workstation to obtain an IP address at boot?
A. UplinkFast on the switch port connected to the server
B. BackboneFast on the switch port connected to the server
C. PortFast on the switch port connected to the workstation
D. trunking on the switch

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 119
In a static VLAN environment, how does a host join a VLAN?
A. It must be assigned to a VLAN dynamically by the VLAN Server.
B. It automatically assumes the VLAN of the port.
C. It will be assigned to a VLAN based on the username.
D. It will automatically be assigned a VLAN based on its MAC address.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 120
A brand new stand alone Catalyst 3550 switch is being installed. Multiple VLANs will be configured on the switch. What needs to be configured before adding any VLAN to the VLAN database if VTP is in server mode?
A. VTP pruning
B. VTP domain name
C. VTP version number
D. ISL or IEEE 802.1Q trunking

Correct Answer: B Section: (none) Explanation
Explanation/Reference:

Cisco 642-811 Questions and Answers Products basically comprise of the simulated Cisco https://www.pass4itsure.com/642-811.html exam questions AND their most correct answers,accompanied with a methodical elucidation of the Cisco 642-811 answers and the probable wrong answers.The extent to which Cisco 642-811 Questions and Answers Products cover their Cisco subject is so thorough,that once you are done with a Cisco product,passing the Cisco 642-811 exam in first attempt should be a piece of cake.

Continue Reading

Cisco 642-812 Flydumps, New Release Cisco 642-812 Dumps PDF For Download

100% Valid And Pass With latest Cisco 642-812 exam dumps, you will never fail your Cisco 642-812 exam.All the questions and answers are updated and added to the new version timely by our experts.Also now Flydumps is offering free Cisco https://www.pass4itsure.com/642-812.html exam VCE player and PDF files for free on their website.

QUESTION 60
What would happen to a frame if a VLAN port configured as a trunk on the Catalyst switch CK1 were to receive an untagged frame?
A. The frame will cause an error message to be sent.
B. The frame will be dropped.
C. The frame will be processed as a native VLAN frame.
D. The frame will be tagged, and then processed as a native VLAN frame.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
On an IEEE 802.1Q trunk port, all transmitted and received frames are tagged except for those on the
VLAN configured as the native VLAN for the port. Frames on the native VLAN are always transmitted
untagged and are normally received untagged. The default native VLAN is VLAN 1.
Reference:
http://www.cisco.com/en/US/products/hw/optical/ps2006/
products_module_configuration_guide_chapter09186
a

QUESTION 61
Switch CK1 has a trunk link configured with IEEE 802.1Q encapsulation. What is the maximum Ethernet frame size on this trunk port?
A. 1496 Bytes
B. 1500 Bytes
C. 1518 Bytes
D. 1522 Bytes
E. 1548 Bytes

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
The 802.1q tag is 4 bytes; hence the resulting ethernet frame can be as large as 1522 bytes (1518 for the
maximum Ethernet frame size plus the 4 byte 802.1Q tag). The minimum size of the Ethernet frame with
802.1q tagging is 68 bytes.
Reference:
http://www.cisco.com/en/US/tech/ CK3 89/ CK3 90/technologies_tech_note09186a0080094665.shtml

QUESTION 62
The original frame is encapsulated and an additional header is added before the frame is carried over a trunk link. At the receive end, the header is removed and the frame is forwarded to the assigned VLAN.
This describes which technology?
A. DISL
B. DTP
C. IEEE802.1Q
D. ISL
E. MPLS

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 63
Assuming you have an IOS based switch; which command would you execute if you
wanted to specify IEEE 802.1Q encapsulation on a trunked port?
A. Switch(config-if)#switchport trunk encapsulation dot1q
B. Switch(config-if)#switchport encapsulation dot1q
C. Switch(config-if)#switchport trunk encapsulation isl
D. Switch(config)#switchport 0/1 trunk encapsulation isl
E. None of the above

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
Ethernet Trunk Encapsulation Types:

1.
switchport trunk encapsulation isl – Specifies ISL encapsulation on the trunk link.

2.
switchport trunk encapsulation dot1q – Specifies 802.1Q encapsulation on the trunk link.

3.
switchport trunk encapsulation negotiate – Specifies that the interface negotiate with the neighboring interface to become an ISL (preferred) or 802.1Q trunk, depending on the configuration and capabilities of the neighboring interface. The trunking mode, the trunk encapsulation type, and the hardware capabilities of the two connected interfaces determine whether a link becomes an ISL or 802.1Q trunk. Reference: http://www.cisco.com/en/US/products/hw/switches/ps700/ products_configuration_guide_chapter09186a008007 f
QUESTION 64
Two Certkiller switches are connected as shown below:
Which statements are true regarding the configuration of the above pair of switches? (Select two)
A. The trunk is currently using the ISL trunking protocol.
B. The trunk is currently using the 802.1q trunking protocol.
C. By default, all VLANs will be transmitted across this trunk.
D. By default, Switch CK1 and Switch CK2 ‘s Fast Ethernet 0/1 port will not generate DTP messages.
E. By default, the trunk can only support one VLAN, and only that single VLAN is transmitted across the trunk.

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
Explanation:
The second line in each configuration (#switchport trunk encapsulation dot1q) proves that B is correct, as
dot1q is Cisco IOS for 802.1q trunking.

A trunk allows inter-VLAN traffic to flow between directly connected switches. By default, a trunk port is a
member of all VLANs, so traffic for any and all VLANs can travel across this trunk. That includes broadcast
traffic! Reference:
http://www.mcmcse.com/cisco/guides/trunking_and_trunking_protocols.shtml

QUESTION 65
Switches Certkiller 1 and Certkiller 2 are connected as shown in the diagram below:
Use the following output taken from each port Certkiller 1: show config: interface GigabitEthernet0/1 switchport trunk encapsulation dot1q switchport mode dynamic auto no ip address show interface gig0/1 switchport: Name: Gi0/1 Switchport: Enabled Administrative Mode: dynamic auto Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Certkiller 2: show interface gig0/1 switchport: Name: Gi0/1 Switchport Enabled Administrative Mode: dynamic auto Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) In accordance with the above exhibit: what’s preventing the two switches from trunking on the link between them?
A. There is no IP address denied.
B. no shutdown needs to be entered on the interfaces.
C. Both sides are in auto negotiation mode.
D. ISL should be used instead of 802.1q.
E. Access mode VLAN must be different from native mode VLAN.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
In the switchport mode command, you can set the trunking mode to any of the following:

1.
trunk-This setting places the port in permanent trunking mode. The corresponding

switch port at the other end of the trunk should be similarly configured because negotiation is not allowed. You should also manually configure the encapsulation mode.

2.
dynamic desirable (the default)-The port actively attempts to convert the link into
trunking mode. If the far-end switch port is configured to trunk, dynamic desirable, or dynamic auto mode,
trunking is successfully negotiated.
3.
dynamic auto-The port converts the link into trunking mode. If the far-end
switch port is configured to trunk or dynamic desirable, trunking is negotiated.
Because of the passive negotiation behavior, the link never becomes a trunk if both ends of the link are left
to the dynamic auto default.

QUESTION 66
You have just configured an ISL trunk line over Ethernet media between two Cisco Switches, each switch having identical modules, software revisions, and VLAN configurations. Which of the following variables are NOT necessary for the ISL trunk to operate properly? (Select all that apply)
A. Identical trunk negotiation parameters at each end of the link
B. Identical duplex at each end of the link
C. Identical speed at each end of the link
D. Identical native VLAN parameters at each end of the link

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
Explanation: In order for a trunk connection to function properly, it is not necessary for the trunking negotiation parameters to be identical. For example, one end could be configured as “on” and the other could be configured for “auto-negotiate” and the trunk would be operational. Similarly, it is not necessary for the native VLAN parameters to be the same at each end. Incorrect Answers: B, C: One of the requirements for trunking to work is to have both sides of the trunk agree on the speed and duplex settings. Both sides must be configured with identical speed and duplex settings.
QUESTION 67
An ISL trunk connects switches CK1 and CK2 . What is the numerical range of user-configurable ISL VLANs on these switches?
A. 1-1001
B. 0-4095
C. there is no range
D. 0 – 1000
E. None of the above

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: The valid range of user-configurable ISL VLANs is 1-1001. The valid range of VLANs specified in the IEEE 802.1Q standard is 0-4095. In a network environment with non-Cisco devices connected to Cisco switches through 802.1Q trunks, you must map 802.1Q VLAN numbers greater than 1000 to ISL VLAN numbers. 802.1Q VLANs in the range 1-1000 are automatically mapped to the corresponding ISL VLAN. 802.1Q VLAN numbers greater than 1000 must be mapped to an ISL VLAN in order to be recognized and forwarded by Cisco switches.
QUESTION 68
An ISL trunk connects switches CK1 and CK2 . What is true about the Inter-Switch Link (ISL) protocol? (Select two)
A. ISL can be used between Cisco and non-Cisco switch devices.
B. ISL calculates a new CRC field on top of the existing CRC field.
C. ISL adds 4 bytes of protocol-specific information to the original Ethernet frame.
D. ISL adds 30 bytes of protocol-specific information to the original Ethernet frame.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation:
B: A second frame check sequence (FCS) field lies at the end of the frame.
D: ISL is an external tagging process: new 26-byte ISL header is added to the original Ethernet frame. A second 4-byte frame check sequence (FCS) field is added at the end of the frame so 30 bytes of total overhead is added. Incorrect Answers:
A: Cisco’s propriety version of frame tagging is ISL. ISL can only be used between Cisco routers.
C: 30 bytes are added to the Ethernet frame, not 4 bytes. 4 bytes are added using 802.1Q encapsulation.
QUESTION 69
Which of the commands below enables a trunking protocol that appends a four byte CRC to the packet when applied to the Certkiller switch?
A. Switch(config-if)#switchport trunk encapsulation dot1q
B. Switch(config-if)#switchport trunk encapsulation ietf
C. Switch(config-if)#switchport trunk encapsulation fddi
D. Switch(config-if)#switchport trunk encapsulation isl
E. None of the above

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation: ISL is made up of three major components: a header, the original Ethernet frame, and a frame check sequence (FCS) at the end. With ISL, an Ethernet frame is encapsulated with a header that transports VLAN IDs between switches and routers. The 26-byte header containing a 10-bit VLAN ID is added to each frame. In addition, a 4-byte tail is added to the frame to perform a cyclic redundancy check (CRC). This CRC is in addition to any frame checking that the Ethernet frame performs. Reference: Building Cisco Multilayer Switched Networks (Cisco Press) page 99
QUESTION 70
Which statement is true regarding the configuration of ISL trunks?
A. All catalyst switches support ISL trunking.
B. A Catalyst switch will report giants if one side is configured for ISL while the other side is not.
C. ISL trunking requires that native VLANs match.
D. A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.
E. None of the above

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
The 802.1q tag is 4 bytes; hence the resulting ethernet frame can be as large as 1522 bytes. The minimum

size of the Ethernet frame with 802.1q tagging is 68 bytes. ISL frames are the standard MTU used in Ethernet frames, which is 1518 bytes. If one end of the trunk is configured for ISL frames of up to 1518 bytes will be expected on it, while the other end will be sending frames up to 1522 bytes in length. On the ISL configured end, these incoming frames will be considered as giants. This is just one of the reasons why ISL and 802.1Q are incompatible. Incorrect Answers:
A: Not every Cisco switch model supports ISL.
C: In ISL, it is not necessary for the native VLANs to match.
D: Although it is true that each end of a trunk should be configured using the same encapsulation types, it is possible for a switch to have an ISL trunk configured on one port and an 802.1Q trunk on another port.
QUESTION 71
Two Certkiller switches are connected via a trunk using VTP. Which VTP information does a Catalyst switch advertise on its trunk ports when using VTP? (Select two)
A. STP root status
B. VTP mode
C. Negotiation status
D. Management domain
E. Configuration revision number

Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
Explanation:
The role of the VLAN Trunking Protocol (VTP) is to maintain VLAN configuration consistency across the
entire network. VTP is a messaging protocol that uses Layer 2 trunk frames to manage the addition,
deletion, and renaming of VLANs on a network-wide basis from a centralized switch that is in the VTP
server mode. VTP is responsible for synchronizing VLAN information within a VTP domain. This reduces
the need to configure the same VLAN information on each switch.
Using VTP, each Catalyst Family Switch advertises the following on its trunk ports:

1.
Management domain

2.
Configuration revision number

3.
Known VLANs and their specific parameters
QUESTION 72
You need to investigate a VTP problem between two Certkiller switches. The lack of which two prevents VTP information from propagating between switches? (Select two)
A. A root VTP server
B. A trunk port
C. VTP priority
D. VLAN 1
E. None of the above

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation: In Switch tow types of links are available, access and trunk. The interface is in access mode can carry the information of only one VLAN and trunk can carry the information of more than one VLAN. VTP carry the information of more than one vlan so Switch port should be in trunk mode. VLAN1 is the default VLAN on Cisco Switch, by default all interface belongs to VLAN 1.
QUESTION 73
CK1 and CK2 are switches that communicate via VTP. What is the default VTP advertisement intervals in Catalyst switches that are in server or client mode?
A. 30 seconds
B. 5 minutes
C. 1 minute
D. 10 seconds
E. 5 seconds
F. None of the above

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
Periodic ( default is 5 minutes) VTP advertisements are sent out each trunk port with the multicast
destination MAC address 01-00-0C-CC-CC-CC. VTP advertisements contain the following configuration
information:

1.
VLAN IDs (ISL and 802.1Q)

2.
Emulated LAN names (ATM LANE)

3.
802.10 SAID values (FDDI)

4.
VTP domain name

5.
VTP configuration revision number

6.
VLAN configuration, including the maximum transmission unit (MTU) size for each VLAN

7.
Frame format
QUESTION 74
On the network shown below, VTP has been enabled on the trunk links between all switches within the TEST domain. An administrator has recently enabled VTP pruning. Port 1 on Switch Certkiller 1 and port 2 on Switch Certkiller 4 are assigned to VLAN 2. A broadcast is sent from the host connected to Switch Certkiller 1.
Where will the broadcast propagate?
A. Switches Certkiller 1, Certkiller 2 , and Certkiller 4 will receive the broadcast, but only Switch Certkiller 4 will forward it out port 2.
B. Only Switch Certkiller 4 will receive the broadcast and will forward it out port 2.
C. Every switch in the network receives the broadcast and will forward it out all ports.
D. Every switch in the network receives the broadcast, but only Switch Certkiller 4 will forward it out port 2.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
The default behavior of a switch is to propagate broadcast and unknown packets across the network. This
behavior results in a large amount of unnecessary traffic crossing the network.

VTP pruning increases bandwidth efficiency by reducing unnecessary flooding of traffic, such as
broadcast, multicast, unknown, and flooded unicast packets. VTP pruning increases available bandwidth
by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network
devices. By default, VTP pruning is disabled.
Enabling VTP pruning on a VTP server enables pruning for the entire management domain. VTP pruning
takes effect several seconds after it is enabled. By default, VLANs 2 through 1000 or 2 through 1001 are
pruning eligible, depending upon the platform.
VTP pruning does not prune traffic from VLANs that are pruning ineligible. VLAN 1 is always pruning
ineligible and VLAN 1 cannot be removed from a trunk. However, the “VLAN 1 disable on trunk” feature
available on Catalyst 4000, 5000, and 6000 family switches enables the pruning of user traffic, but not
protocol traffic such as CDP and VTP, for VLAN 1 from a trunk. Use the vtp pruning command to make

VLANs pruning eligible on a Cisco IOS-based switch. Switch(vlan)#vtp pruning Once pruning is enabled, use the switchport trunk pruning command to make a specific VLAN pruning ineligible. Switch(config)#interface fastethernet 0/3 Switch(config-if)#switchport trunk pruning vlan remove vlan 5
QUESTION 75
You want to configure switch CK1 to propagate VLAN information across the Certkiller network using VTP. What must be configured on a Cisco switch in order to advertise VLAN information?
A. VTP mode
B. VTP password
C. VTP revision number
D. VTP pruning
E. VTP domain name
F. None of the above

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation: If the switch being installed is the first switch in the network, the management domain will need to be created. However, if the network has other switches running VTP, then the new switch will join an existing management domain. Verify the name of the management domain. If the management domain has been secured, verify and configure the password for the domain. To create a management domain or to add a switch to a management domain, use the vtp domain command in the global configuration mode or VLAN configuration mode. Switch(config)#vtp domain name Switch(vlan)#vtp domain
QUESTION 76
The Certkiller switches have all been upgraded to use VTP version 2. What are two benefits provided in VTP Version 2 that are not available in VTP Version 1? (Select two)
A. VTP version 2 supports Token Ring VLANs
B. VTP version 2 allows VLAN consistency checks
C. VTP version 2 allows active redundant links when used with spanning tree
D. VTP version 2 reduces the amount of configuration necessary
E. VTP version 2 saves VLAN configuration memory

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation: Understanding VTP Version 2 If you use VTP in your network, you must decide whether to use VTP version1 or version2. Note: If you are using VTP in a Token Ring environment, you must use version2. VTP version 2 supports the following features not supported in version1: Token Ring support-VTP version2 supports Token Ring LAN switching and VLANs (Token Ring Bridge Relay Function [TrBRF] and Token Ring Concentrator Relay Function [TrCRF]). Unrecognized Type-Length-Value (TLV) Support-A VTP server or client propagates configuration changes to its other trunks, even for TLVs it is not able to parse. The unrecognized TLV is saved in NVRAM. Version-Dependent Transparent Mode-In VTP version1, a VTP transparent network device inspects VTP messages for the domain name and version, and forwards a message only if the version and domain name match. Because only one domain is supported in the supervisor engine software, VTP version 2 forwards VTP messages in transparent mode without checking the version. Consistency Checks-In VTP version 2, VLAN consistency checks (such as VLAN names and values) are performed only when you enter new information through the CLI or SNMP. Consistency checks are not performed when new information is obtained from a VTP message, or when information is read from NVRAM. If the digest on a received VTP message is correct, its information is accepted without consistency checks. Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2ZY/configuration/guide/ vtp.html#wp1020
QUESTION 77
The Certkiller network administrator needs to enable VTP pruning within the Certkiller network. What action should a network administrator take to enable VTP pruning on an entire management domain?
A. Enable VTP pruning on any switch in the management domain
B. Enable VTP pruning on any client switch in the domain
C. Enable VTP pruning on a VTP server in the management domain
D. Enable VTP pruning on every switch in the domain
E. None of the above

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: The default behavior of a switch is to propagate broadcast and unknown packets across the network. This behavior results in a large amount of unnecessary traffic crossing the network. VTP pruning increases bandwidth efficiency by reducing unnecessary flooding of traffic, such as broadcast, multicast, unknown, and flooded unicast packets. VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. By default, VTP pruning is disabled. Enabling VTP pruning on a VTP server enables pruning for the entire management domain. VTP pruning takes effect several seconds after it is enabled. By default, VLANs 2 through 1000 or 2 through 1001 are pruning eligible, depending upon the platform. VTP pruning does not prune traffic from VLANs that are pruning ineligible. VLAN 1 is always pruning ineligible and VLAN 1 cannot be removed from a trunk. However, the “VLAN 1 disable on trunk” feature available on Catalyst 4000, 5000, and 6000 family switches enables the pruning of user traffic, but not protocol traffic such as CDP and VTP, for VLAN 1 from a trunk. Use the vtp pruning command to make VLANs pruning eligible on a Cisco IOS-based switch. Switch(vlan)#vtp pruning Once pruning is enabled, use the switchport trunk pruning command to make a specific VLAN pruning ineligible. Switch(config)#interface fastethernet 0/3 Switch(config-if)#switchport trunk pruning vlan remove vlan 5
QUESTION 78
VTP is configured on switch CK1 . Which of the following features were added in VTP version 2 that were not previously supported in VTP version 1? (Select two)
A. Supports Token Ring VLANs.
B. Allows VLAN consistency checks.
C. Saves VLAN configuration memory.
D. Reduces the amount of configuration necessary.
E. Allows active redundant links when used with spanning tree.

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation:
VTP Version 2 includes the following improvements: Token Ring VLAN support, TLV support, transparent
mode, and Consistency checks.

Incorrect
Answers:
C, D: These were not improvements added to VTP Version 2.

E: STP detects and prevents loops by logically disabling the redundant path ports so there are no active redundant links.
QUESTION 79
The Certkiller switches are configured to use VTP. What’s true about the VLAN trunking protocol (VTP)? (Select two)
A. VTP messages will not be forwarded over nontrunk links.
B. VTP domain names need to be identical. However, case doesn’t matter.
C. A VTP enabled device which receives multiple advertisements will ignore advertisements with higher configuration revision numbers.
D. A device in “transparent” VTP v.1 mode will not forward VTP messages.
E. VTP pruning allows switches to prune VLANs that do not have any active ports associated with them.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
Explanation:
VTP messages are only transmitted across trunk links.
If the receiving switch is in transparent mode, the configuration is not changed. Switches in transparent
mode do not participate in VTP. If you make VTP or VLAN configuration changes on a switch in
transparent mode, the changes are not propagated to the other switches in the network.
Incorrect
Answers:

B: The VTP domain name is case sensitive and it must be identical with the domain name configured on the VTP server.
C: This is incorrect because if a VTP client receives an advertisement with a higher revision number, it won’t ignore it. In fact, the advertisement with a higher revision level takes precedence when the switch is configured in client mode.
E: VTP pruning enhances network bandwidth use by reducing unnecessary flooded traffic, such as broadcast, multicast, unknown, and flooded unicast packets. VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. It does not prune the individual VLANs.
QUESTION 80
Switch CK1 and CK2 both belong to the Certkiller VTP domain. What’s true about the switch operation in VTP domains? (Select all that apply)
A. A switch can only reside in one management domain
B. A switch is listening to VTP advertisements from their own domain only
C. A switch is listening to VTP advertisements from multi domains
D. A switch can reside in one or more domains
E. VTP is no longer supported on Catalyst switches

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation:
A VTP domain is made up of one or more interconnected devices that share the same VTP domain name.
A switch can be configured to be in only one VTP domain, and each VLAN has a name that is unique

within a management domain.
Typically, you use a VTP domain to ease administrative control of your network or to account for physical
boundaries within your network. However, you can set up as many or as few VTP domains as are
appropriate for your administrative needs. Consider that VTP is transmitted on all trunk connections,
including ISL, IEEE 802.1Q, 802.10, and LANE.
Switches can only belong to one management domain with common VLAN requirements, and they only
care about the neighbors in their own domains.
Reference: CCNP Switching Exam Certification Guide: David Hucaby & Tim Boyles, Cisco Press 2001,
ISBN 1-58720 000-7 page 114

Cisco https://www.pass4itsure.com/642-812.html Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques.“Do I Know This Already?”quizzes open each chapter and allow you to decide how much time you need to spend on each section.Cisco 642-812 lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it.Challenging Cisco 642-812 review questions help you assess your knowledge and reinforce key concepts. Cisco 642-812 exercises help you think about exam objectives in real-world situations,thus increasing recall during exam time.

Continue Reading

Cisco 642-801 Preparation Materials, Up To Date Cisco 642-801 Exam Tests Online Sale

Passed Cisco https://www.pass4itsure.com/642-801.html yesterday on first attempt only using the Exampass premium vce and one corrected answers.Thanks a lot for your valuable update reagding premium dump.It will definitely help me for preparing for the exam before to write.

QUESTION 16
How many update packets would a RIPv2 router send to advertise 77 routes?
A. one update package
B. two update package
C. three update package
D. four update package
E. five update package
F. six update package
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
RIP 2 Packet Format:
The RIP 2 specification (described in RFC 1723) allows more information to be included in RIP packets
and provides a simple authentication mechanism that is not supported by RIP. Figure 47-2 shows the IP
RIP 2
packet format.
The following descriptions summarize the IP RIP 2 packet format fields illustrated in Figure 47-2:
1.
Command-Indicates whether the packet is a request or a response. The request asks that a router send all or a part of its routing table. The response can be an unsolicited regular routing update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are used to convey information from large routing tables.

2.
Version-Specifies the RIP version used. In a RIP packet implementing any of the RIP 2 fields or using authentication, this value is set to 2.

3.
Unused-Has a value set to zero.

4.
Address-family identifier (AFI)-Specifies the address family used. RIPv2’s AFI field functions identically to RFC 1058 RIP’s AFI field, with one exception: If the AFI for the first entry in the message is 0xFFFF, the remainder of the entry contains authentication information. Currently, the only authentication type is simple password.

5.
Route tag-Provides a method for distinguishing between internal routes (learned by RIP) and external routes (learned from other protocols).

6.
IP address-Specifies the IP address for the entry.

7.
Subnet mask-Contains the subnet mask for the entry. If this field is zero, no subnet mask has been specified for the entry.

8.
Next hop-Indicates the IP address of the next hop to which packets for the entry should be forwarded.

9.
Metric-Indicates how many internetwork hops (routers) have been traversed in the trip to the destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route. NoteUp to 25 occurrences of the AFI, Address, and Metric fields are permitted in a single IP RIP packet. That is, up to 25 routing table entries can be listed in a single RIP packet. If the AFI specifies an authenticated message, only 24 routing table entries can be specified. Given that individual table entries aren’t fragmented into multiple packets, RIP does not need a mechanism to resequence datagrams bearing routing table updates from neighboring routers. Since a single update packet can contain at most 25 route entries, 4 packets will be needed to advertise 77 routes.
QUESTION 17
What are three disadvantages of a router-on-stick configuration for InterVLAN routing? (Choose three)
A. InterVLAN routing cannot be filtered by the router.
B. The router becomes a single point of failure for the network.
C. Routers will not route STP BPDUs.
D. There is a possibility of inadequate bandwidth for each VLAN.
E. Additional overhead on the router can occur.
F. NetFlow Switching is required for InterVLAN accounting.
Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
Explanation:
When a single interface is used to route between subnets or networks, this is know as a router-on-a-stick.
To assign multiple IP addresses to the same interface, secondary addresses or subinterfaces are used.
The Advantage is that it is useful when there are limited Ethernet interfaces on the router.
The Disadvantages to this design are:
subnets. resources that will be consumed on the router can become an issue.

QUESTION 18
What are three characteristics of RIPv2? (Choose three)
A. Supports variable-length subnet mask by default.
B. Does not support variable-length subnet mask by default.
C. Supports discontiguous networks by default.
D. Multicast updates to 224.0.0.9.
E. Broadcast updates.
Correct Answer: ACD Section: (none) Explanation Explanation/Reference:
Explanation: Features of RIP v2 To help today’s IP internetworks minimize broadcast traffic, use variable length subnetting to conserve IP addresses, and secure their routing environment from misconfigured or malicious routers, several key features were added to RIP v2. Multicasted RIP Announcements Rather than broadcasting RIP announcements, RIP v2 supports sending RIP announcements to the IP multicast address of 224.0.0.9. Non-RIP nodes are not disturbed by RIP router announcement traffic. Subnet Masks RIP v2 announcements send the subnet mask (also known as a network mask) along with the network ID. RIP v2 can be used in subnetted, supernetted, and variable-length subnet mask environments. Subnets of a network ID do not have to be contiguous (they can be disjointed subnets).
QUESTION 19
The Bellman-Ford algorithm is used by the grand majority of distance vector routing protocols in DUAL (diffusing update algorithm). Which of the following routing protocols is it?
A. IGRP
B. OSPF
C. EIGRP
D. RIP v.2
E. RIP v.1
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: DUAL is used by EIGRP. The Diffusing Update Algorithm (DUAL) is the algorithm used to obtain loop-freedom at every instant throughout a route computation. This allows all routers involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in the recomputation. The DUAL finite state machine embodies the decision process for all route computations. It tracks all routes advertised by all neighbors. The distance information, known as a metric, is used by DUAL to select efficient loop free paths. DUAL selects routes to be inserted into a routing table based on feasible successors. A successor is a neighboring router used for packet forwarding that has a least cost path to a destination that is guaranteed not to be part of a routing loop. When there are no feasible successors but there are neighbors advertising the destination, a recomputation must occur.
QUESTION 20
The Certkiller EIGRP network is displayed in the following topology diagram:

You work as a network technician at Certkiller .com. Study the exhibits carefully. If the command “variance 3” was added to the EIGRP configuration of Certkiller 5, which path or paths would be chosen to route traffic from Certkiller 5 to network X?
A. Certkiller 5- Certkiller 2- Certkiller 1
B. Certkiller 5- Certkiller 2- Certkiller 1 and Certkiller 5- Certkiller 3- Certkiller 1.
C. Certkiller 5- Certkiller 3- Certkiller A and Certkiller 5- Certkiller 4- Certkiller 1.
D. Certkiller 5- Certkiller 2- Certkiller 1, Certkiller 5- Certkiller 3- Certkiller 1, and Certkiller 5- Certkiller 4-Certkiller 1.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: Every routing protocol supports equal cost path load balancing. In addition to that, IGRP and EIGRP also support unequal cost path load balancing. Use the variance command to instruct the router to include routes with a metric less than n times the minimum metric route for that destination, where n is the number specified by the variance command. The variable n can take a value between 1 and 128, with the default being 1, which means equal cost load balancing. Traffic is also distributed among the links with unequal costs, proportionately, with respect to the metric. Reference: http://www.cisco.com/en/US/tech/ CK3 65/technologies_tech_note09186a008009437d.shtml
QUESTION 21
What is the purpose of the “eigrp stub” configuration command?
A. To increase scalability by limiting the EIGRP query range.
B. To reduce the size of the routing table by blocking the D EX (External EIGRP) routes in the EIGRP stub router.
C. To reduce the convergence time by enabling the EIGRP stub router to propagate the EIGRP queries from the EIGRP hub router.
D. To reduce the convergence time by enabling the EIGRP stub router to also perform query requests to the EIGRP hub router.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: Complex, redundant EIGRP networks can cause scalability problems. The best solution to this is to provide a means within the context of the EIGRP protocol itself to control traffic flows and limit query depth. TheEIGRP Stub Router functionality in Cisco IOS Software Release 12.0(7)T can achieve this solution. The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing feature improves network stability, reduces resource utilization, and simplifies stub router configuration. Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network, one or more end (stub) networks are connected to a remote router (the spoke) that is connected to one or more distribution routers (the hub). The remote router is adjacent only to one or more distribution routers. The only route for IP traffic to follow into the remote router is through a distribution router. This type of configuration is commonly used in WAN topologies where the distribution router is directly connected to a WAN. The distribution router can be connected to many more remote routers. Often, the distribution router will be connected to 100 or more remote routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a distribution router, so it becomes unnecessary for the remote router to hold a complete routing table. Generally, the distribution router need not send anything more than a default route to the remote router. When using the EIGRP Stub Routing feature, you need to configure the distribution and remote routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are propagated from the remote (stub) router. The router responds to queries for summaries, connected routes, redistributed static routes, external routes, and internal routes with the message “inaccessible.” A router that is configured as a stub will send a special peer information packet to all neighboring routers to report its status as a stub router. Any neighbor that receives a packet informing it of the stub status will not query the stub router for any routes, and a router that has a stub peer will not query that peer. The stub router will depend on the distribution router to send the proper updates to all peers.
QUESTION 22
The Certkiller OSPF network is displayed below: Refer to the exhibit. All routers have converged and neighbor relationships have been established. Which state is Certkiller 4 in?

A. 2WAY/DROTHER
B. 2WAY/BDR
C. 2WAY/DR
D. FULL/DROTHER
E. FULL/BDR
F. FULL/DR

Correct Answer: F Section: (none) Explanation
Explanation/Reference:
Explanation: The router with the highest OSPF priority on a segment will become the DR for that segment. The same process is repeated for the BDR. In case of a tie, the router with the highest RID will win. The default for the interface OSPF priority is one. Based on the output above, the dead timer shows that the neighbor relationships have already been established, so the state will be Full for all neighbors, and since the OSPF priorities are all set to 1, the router with the highest router ID will be the DR.
QUESTION 23
The Certkiller backbone OSPF network is shown below:

Refer to the exhibit. All routers have been simultaneously rebooted, and neighbor relationships have been established. Which two statements are true? (Choose two.)
A. The Certkiller 1 RID is 1.1.1.1.
B. The Certkiller 1 RID is 10.1.1.1.
C. The Certkiller 1 RID is 192.168.1.1.
D. The Certkiller 2 RID is 10.1.1.2.
E. The Certkiller 2 RID is 192.168.1.2.
F. The Certkiller 2 RID is 192.168.2.1.
Correct Answer: BD Section: (none) Explanation Explanation/Reference:
Explanation: Remember that the RID is the highest IP address on the box or the loopback interface, calculated at boot time or whenever the OSPF process is restarted. Although the other interfaces on routers Certkiller 1 and Certkiller 2 are higher, the loopback interface is always used as the router ID. If more than one loopback interface is configured, the loopback interface with the highest IP address is chosen as the Router ID.
QUESTION 24

Which type of Link State Announcement will Certkiller E use to announce changes in network 22 to Area 1?
A. Type 1 LSA
B. Type 2 LSA
C. Type 3 LSA
D. Type 4 LSA
E. Type 5 LSA

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation: The external link LSA is originated by AS boundary routers and is flooded throughout the AS. Each external advertisement describes a router to a destination in another autonomous system. Default routes for the AS can also be described by AS external advertisements. This is identified as a Type 5 LSA.
QUESTION 25
What is the OSPF cost for the 100 Mbps Ethernet media type?
A. 1
B. 2
C. 6
D. 10
E. 100
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
By default, OSPF uses the formula of 100,000,000 (100M) divided by bandwidth, or 100,000,000/BW. For
a
100M fast Ethernet connection, the formula is 100M/100M = 1.

QUESTION 26
As a Certkiller .com network technician you are required to drag the appropriate IS-IS routing item to its correct definition.

A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
QUESTION 27
Given the NSAP 39.0100.0102.0001.0c00.1211.00, which portion is interpreted by IS-IS as the area?
B. 39.0100
C. 39.0100.0102
D. 0001
E. 0001.0c00
F. 0001.0c00.1211
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: A NET is a NSAP where the last byte is always zero. On a router running IS-IS, a NET can be 8 to 20 B in length. The last byte is always the n-selector and must be zero. The n-selector indicates which transport entity the packet is sent to. An n-selector of zero indicates no transport entity, and means that the packet is for the routing software of the system. The six bytes directly preceding the n-selector are the system ID. The system ID length is a fixed size and cannot be changed. The system ID must be unique throughout each area (Level 1) and throughout the backbone (Level 2). All bytes preceding the system ID are the area ID. The area ID field is the portion of the NSAP preceding the system ID. The following example shows a router with area ID 47.0004.004d.0001 and system ID 0001.0c11.1110: 47.0004.004d.0001.0001.0c11.1110.00 In our example, the six bytes preceding the N selector is 0001.0c00.1211 which is the system ID. The portion preceding this, 39.0100.0102, is the area ID.
QUESTION 28
Which two commands can be used to verify that RIPv2 authentication is working properly to ensure that RIP neighbors form adjacencies properly? (Choose two.)
A. show interface
B. show ip route
C. show ip protocols
D. debug ip rip
E. debug ip rip authentication
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation: Verifying Plain Text Authentication RIP version 2 routers can use either plain text or MD5 authentication. By configuring the routers using RIPv2 authentication, all routing update exchanges will be authenticated before being accepted. This can be verified by observing the output obtained from thedebugip rip and show ip route commands. RB#debug ip rip RIP protocol debugging is on *Mar 3
02:11:39.207: RIP: received packet with text authentication 234 *Mar 3 02:11:39.211: RIP: received v2 update from 141.108.0.10 on Serial0 *Mar 3 02:11:39.211: RIP: 70.0.0.0/8 via 0.0.0.0 in 1 hops RB#show ip route R 70.0.0.0/8 [120/1] via 141.108.0.10, 00:00:25, Serial0 80.0.0.0/24 is subnetted, 1 subnets C
80.80.80.0 is directly connected, Loopback0 141.108.0.0/30 is subnetted, 1 subnets C 141.108.0.8 is directly connected, Serial0 Using plain text authentication improves the network design by preventing the addition of routing updates originated by routers not meant to take part in the local routing exchange process. However, this type of authentication is not secure. The password (234 in this example) is exchanged in plain text. It can be captured easily and thus exploited. As mentioned before, MD5 authentication must be preferred over plain text authentication when security is an issue. Verifying MD5 Authentication By configuring the RA and RB routers as shown above, all routing update exchanges will be authenticated before being accepted. This can be verified by observing the output obtained from the debug ip rip and show ip route commands. RB#debug ip rip RIP protocol debugging is on *Mar 3 20:48:37.046: RIP: received packet with MD5 authentication *Mar 3 20:48:37.046: RIP: received v2 update from
141.108.0.10 on Serial0 *Mar 3 20:48:37.050: 70.0.0.0/8 via 0.0.0.0 in 1 hops RB#show ip route R 70.0.0.0/8 [120/1] via 141.108.0.10, 00:00:03, Serial0 80.0.0.0/24 is subnetted, 1 subnets C 80.80.80.0 is directly connected, Loopback0 141.108.0.0/30 is subnetted, 1 subnets C 141.108.0.8 is directly connected, Serial0 MD5 authentication uses the one-way, MD5 hash algorithm, acknowledged to be a strong hashing algorithm. In this mode of authentication, the routing update does not carry the password for the purpose of authentication. Rather, a 128-bit message, generated by running the MD5 algorithm on the password, and the message are sent along for authentication. Thus, it is recommended to use MD5 authentication over plain text authentication since it is more secure. Reference: http://www.cisco.com/en/US/tech/ CK3 65/technologies_configuration_example09186a0080093f1c.shtml#veri
QUESTION 29

1.
all routers are using BGP

2.
synchronization is OFF in AS 647000
A. Router CK6
B. Routers CK2 and CK6
C. Routers CK2 , CK4 , and CK6
D. Routers CK2 , CK3 , CK4 , and CK6
E. Routers CK1 , CK2 , CK3 , CK4 , and CK6
F. Routers CK1 , CK2 , CK3 , CK4 , CK5 , and CK6
G. It will not be propagated to any other router

Correct Answer: FEACDGB Section: (none) Explanation
QUESTION 30

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
QUESTION 31
Which attribute must exist in the BGP update packet?
A. LOCAL_PREF
B. AGGREGATOR
C. AS_Path
D. Weight
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
The AS PATH is a well known mandatory attribute. Mandatory means that it is required by all routers.
These
attributes are required and are therefore recognized by all BGP implementations.

QUESTION 32
BGP contains two paths to a destination. Assuming both routes were originated locally and have an equal weight, what will be the next determining factor in choosing the best path?
A. lowest MED
B. highest local preference
C. lowest neighbor IP address
D. lowest origin code
E. shortest AS-path
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
How the Best Path Algorithm Works:
BGP assigns the first valid path as the current best path. It then compares the best path with the next path
in list, until it reaches the end of the list of valid paths. The following is a list of rules used to determine the
best path.

1.
Prefer the path with the highest WEIGHT. Note: WEIGHT is a Cisco-specific parameter, local to the router on which it’s configured.

2.
Prefer the path with the highest LOCAL_PREF.

3.
Prefer the path that was locally originated via a network or aggregate BGP subcommand, or through redistribution from an IGP. Local paths sourced by network or redistribute commands are preferred over local aggregates sourced by the aggregate-address command.

4.
Prefer the path with the shortest AS_PATH. Note the following:

5.
Prefer the path with the lowest origin type: IGP is lower than EGP, and EGP is lower than INCOMPLETE.

6.
Prefer the path with the lowest multi-exit discriminator (MED). Note the following:

7.
Prefer external (eBGP) over internal (iBGP) paths. If bestpath is selected, go to Step 9 (multipath).

8.
Prefer the path with the lowest IGP metric to the BGP next hop. Continue, even if bestpath is already selected.

9.
Check if multiple paths need to be installed in the routing table for BGP Multipath. Continue, if bestpath is not selected yet.

10.
When both paths are external, prefer the path that was received first (the oldest one). This step minimizes route-flap, since a newer path will not displace an older one, even if it would be the preferred route based on the next decision criteria (Steps 11, 12, and 13).

11.
Prefer the route coming from the BGP router with the lowest router ID. The router ID is the highest IP address on the router, with preference given to loopback addresses. It can also be set manually using the bgp router-id command.

12.
If the originator or router ID is the same for multiple paths, prefer the path with the minimum cluster list length. This will only be present in BGP route-reflector environments. It allows clients to peer with RRs or clients in other clusters. In this scenario, the client must be aware of the RR-specific BGP attribute.

13.
Prefer the path coming from the lowest neighbor address. This is the IP address used in the BGP neighbor configuration, and corresponds to the remote peer used in the TCP connection with the local router.
QUESTION 33
The Certkiller WAN is displayed below:

You work as an administrator at Certkiller .com. Study the exhibits carefully.
BGP is configured on all routers, synchronization is turned off, and one of the default attributes have
been changed except the MED attribute on Certkiller 5.
Which path is preferred by Certkiller 2 to reach the network 200.200.200.0/24?

A. Certkiller 2- Certkiller 1 because it is the shortest path.
B. Certkiller 2- Certkiller 1 because it has a higher metric.
C. Certkiller 3- Certkiller 4- Certkiller 5 because it has a lower administrative distance.
D. Certkiller 3- Certkiller 4- Certkiller 5 because it has a lower metric.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
In BGP, the lowest MED metric is preferred over a higher metric. By default, the value of the metric is 0, so
for AS 200, the path via Certkiller 5 will have a metric of 0, and the path via Certkiller 1 will have a metric of
150, so the path from Certkiller 5 will be preferred.

QUESTION 34
Which BGP path attribute is Cisco proprietary?
A. weight
B. MED
C. local preference
D. origin
E. next-hop
F. AS-path
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: The WEIGHT attribute is a Cisco proprietary feature used to measure a route’s preference. The WEIGHT inbound route maps. Use the WEIGHT attribute to influence routes from multiple service providers to a central location. Like LOCAL_PREF, assigning a higher weight to a route makes that route more preferred. The WEIGHT attribute also has the highest precedence of any BGP attribute. Reference: CCIE Practical Studies: Configuring Route-Maps and Policy-based Routing, Karl Solie, Cisco Press.

The Cisco contains more than 400 practice questions for the Cisco 642-801 exams,including simulation-based questions.Also contains hands-on exercises and a customized copy of the Cisco https://www.pass4itsure.com/642-801.html exams network simulation software.

Continue Reading

Cisco 642-801 Real Exam Questions And Answers, Discount Cisco 642-801 Test Software On Sale

Hi,I just took CCNA Cisco https://www.pass4itsure.com/642-801.html test and passed with a great score.All examcollection and securitytut dump are no longer valid anymore.I recommend studying Exampass Premium VCE.I can confirm that all Cisco 642-801 new questions appear on my test. Keep up the good work and good luck!

QUESTION 40
Your OSPF router has one serial interface, and one Ethernet LAN interface. The subinterface is configured in the following manner: interface serial 0.122 point-to-point ip address 192.168.1.1 255.255.255.0 encapsulation frame-relay frame-relay interface-dlci 122 Your want to allow hosts on your LAN to send and receive data, but you don’t want routing traffic to go through that interface. Which of the following commands should you use to complete your configuration?
A. interface serial 0.122 point-to-point passive-interface ethernet 0
B. interface ethernet 0 ip address 192.168.12.1 255.255.255.0 passive-interface
C. router ospf 172 area 1 nssa network 192.168.1.0 0.0.0.255 area 0 network 192.168.12.0 0.0.0.255 area 1
D. router ospf 172 passive-interface ethernet 0 network 192.168.1.0 0.0.0.255 area 0 network
192.168.12.0 0.0.0.255 area 1

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
We use the passive-interface command to configure the ethernet interface to be passive. The passive-
interface router configuration command is used to disable sending routing updates on an interface.
Incorrect Answers:

A: We are not configuring the serial interface. Furthermore, the passive-interface command is a router configuration command, not an interface configuration command.
B: We cannot use the passive-interface command like this.
C: We should configure the Ethernet interface as passive, not the area as a not-so-stubby area (NSSA).
QUESTION 41
You have a named Router CertK running EIGRP that has already been configured with the following: Router CertK (config)#access-list 30 deny any Router CertK (config)#access-list 40 permit ip any Router CertK (config)#router eigrp 1 To complete your configuration you want to configure the serial 0/0 interface to prevent routing updates from going out that interface while still allowing the formation and upkeep of neighbor adjacencies on that interface. Drag the correct command phrase from the bottom and place it in

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
We use distribute list 30, which stops IP traffic, on outward traffic on the serial 0/0 interface.
RouterTK continues receiving routing updates from its neighbor, but the distribute-list prevents routes from
being advertised out of serial 0. Furthermore, neighbor adjacencies are allowed to be formed between
RouterTK and its neighbor on serial 0/0.
Incorrect Answers:
passive interface serial 0/0:

On EIGRP, passive interface causes the router to stop sending and receiving hello packets. This will
prevent the interface from maintaining neighbor adjacencies.
distribute-list 40 out serial 0/0:
We must stop outgoing traffic, not allow it.
distribute-list 30 in serial 0-0:
We must stop outgoing traffic, not incoming traffic.
Reference: How Does the Passive Interface Feature Work in EIGRP?
http://www.cisco.com/warp/public/103/16.html

QUESTION 42
he Certkiller network is displayed below:
You need to configure a static route so that users on the corporate network can reach the 172.27.6.0/24
LAN. Based on the diagram above, which of the following is the correct way to do this?

A. Certkiller 1(config)#ip route 172.27.6.0 255.255.255.0 172.17.8.2
B. Certkiller 2(config)#ip route 172.27.6.0 255.255.0.0 172.17.8.2
C. Certkiller 2(config)#ip route 172.27.6.0 255.255.255.0 172.17.8.2
D. Certkiller 1(config)#ip route 172.27.6.0 255.255.0.0 172.17.8.1
E. Certkiller 2(config)#ip route 172.27.6.0 255.255.255.0 172.17.8.1

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation:
Only choice E provides the correct network subnet mask and next hop IP address.
IP route prefix mask {address|Interface} [distance] [tag tag] [permanent]
Prefix 172.27.6.0 mask 255.255.255.0 address 172.17.8.2
Address – The IP address of the next hop router that can be used to reach that network.
Reference: Building Scalable Cisco Networks (Cisco Press) page 464

QUESTION 43
The Certkiller network consists of a main office and a single remote office. You need to configure the
remote office in using the following guidelines:
The main office must learn all of its routes from the regional office.
The regional office must not learn routes from the main office.
The most scalable solution should be used.
Which of the following answer choices best describe what should be done to satisfy these
requirements?

A. Configure static routes pointing to the network behind the central office router
B. Configure a default route pointing to the networks behind the central office router
C. Make the interface that is connected to the central office a passive interface to block incoming updates
D. Enable route update filtering on the interface that is connected to the central office to block incoming updates
E. None of the above will work

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
The only viable solution here is to enable the main office to dynamically learn about all of the regional
office routes, while still not receiving any routes is by enabling incoming route filters.

Incorrect Answers:
A, B: Configuring static routes or default routes on the regional office will not enable the main office to
learn about any of the regional office routes.

C: A passive interface would prevent all route updates to the main office. Passive interfaces do not filter incoming routing updates, so the regional office could still learn routes from the main office. Note: Configuring the main office using a passive interface would satisfy the conditions here, but this Qasks us how to configure the regional office, not the main office.
QUESTION 44
You wish to permit all BGP prefixes between /10 and /18 for the 207.0.0.0 network. How should a BGP prefix list be configured to do this?
A. ip prefix-list 207.0.0.0/8 ge 10 le 18
B. ip prefix-list 207.0.0.0/8 ge 18 le 10
C. ip prefix-list 207.0.0.0/24 ge 10 le 18
D. ip prefix-list 207.0.0.0/24 ge 18 le 10
E. None of the above

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: With prefix lists, the “ge” means “greater than or equal to” while the le means “less than or equal to.” Here, we want to specify all prefixes greater than or equal to 10 and less than or equal to 18 as specified in choice
A. In addition, we must specify an 8 bit network mask, not a 24 bit network mask.
QUESTION 45
Routers CK1 and CK2 are configured for BGP as shown below: RTR CK1 router bgp 200 neighbor
183.215.22.1 remote-as 200 neighbor 183.215.22.1 update-source loopback 1 RTR CK2 router bgp 200 neighbor 147.229.1.1 remote-as 200 These two routers currently have an active BGP peering session between them and they are able to pass routes to each other. Based on these configuration files, which of the following are true? (Select three)
A. RTR CK1 and RTR CK2 are running IBGP inside AS 200
B. The IP address of RTR CK1 ‘s Loopback 1 interface is 147.229.1.1.
C. The IP address of RTR CK1 ‘s Loopback 1 interface is 183.215.22.1.
D. RTR CK1 and RTR CK2 are running EBGP between the autonomous systems.
E. RTR CK1 has forced BGP to use the loopback IP address as the source in the TCP neighbor connection.

Correct Answer: ABE Section: (none) Explanation Explanation/Reference:
Explanation:
A: The two statements that define a remote AS (autonomous) use the same AS number. Both routers must belong to the same AS and there IBGP is used.
B: The IP address of the CK1 loopback address is 147.229.1.1 as specified in the neighbor statement of the CK2 router: neighbor 147.229.1.1 remote-as 200
E: The “neighbor 183.215.22.1 update-source loopback 1” command issued at CK1 makes CK1 use this loopback for the BGP connection to CK2 . See Note 2 below. Note 1: Syntax of neighbor command: Router(config-router)#neighbor {ip-address | peer-group-name} remote-as as-number This command specifies a BGP neighbor. Note 2: For iBGP, you might want to allow your BGP connections to stay up regardless of which interface is used to reach a neighbor. To enable this configuration, you first configure a loopback interface and assign it an IP address (neighbor 183.215.22.1 update-source loopback 1). Next, configure the BGP update source to be the loopback interface (we have to assume this step – it is not indicated by the exhibit). Finally, configure your neighbor to use the address on the loopback interface (neighbor 147.229.1.1 remote-as 200). Incorrect Answers:
C: 183.215.22.1 is the IP address of CK2 , not CK1 .
D: There is only one AS and the routers belong to that AS. Within an AS IBGP is used, not EBGP.
QUESTION 46
The Certkiller BGP router is configured as shown below: router bgp 64000 neighbor 172.16.1.1 remote-as 64000 neighbor 10.1.1.2 remote-as 64550 network 200.52.1.192 mask 255.255.255.224 no synchronization aggregate-address 200.52.1.0 255.255.255.0 The BGP peers 172.16.1.1 and 10.1.1.2 in the above configuration are active, as well as the interface with IP address 200.52.1.192. Based on this information, which statement below is true about your configuration?
A. Router CertK has an IBGP connection with neighbor 10.1.1.2.
B. Router CertK has an EBGP connection with the neighbor 172.16.1.1.
C. Router CertK advertises only a route 200.52.1.0 255.255.255.0 in BGP.
D. Router CertK advertises only a route 200.52.1.192 255.255.255.224 in BGP.
E. Router CertK advertises both the routes to 200.52.1.0 255.255.255.0 and 200.52.1.192
255.255.255.224 in BGP.

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation:
The aggregate route, 200.52.1.0 255.255.255.0, and the more specific route, 200.52.1.192
255.255.255.224, will both be advertised. To only advertise the aggregate route the summaryonly option of
the aggregate-address command must be used.
Note: The aggregate-address command is used to create an aggregate, or summary, entry in the BGP
table.
Incorrect Answers:

A: The neighbor 10.1.1.2 belongs to another autonomous system and is a EBGP neighbor, not an IBGP
neighbor.

B: Router A and neighbor 172.16.1.1 belong to the same autonomous system and is an IBGP neighbor,
not an EBGP neighbor.

C: The summary-only option of the aggregate-address command is used to only advertise the summary
and not the specific routes.

D:
The aggregate route, 200.52.1.0 255.255.255.0, will be advertised as well.
Q304 The Certkiller network consists of two separate autonomous systems as shown below:
You need to configure Router CK2 as a BGP route reflector and Router CK1 as the client. Assuming that
Router CK3 isn’t running BGP, which two of the commands below would you enter on CK2 to satisfy your
goals? (Select two)
A.
neighbor 165.50.12.1 remote-as 65100
B.
neighbor 165.50.12.2 remote-as 64000
C.
neighbor 165.50.12.1 route-reflector-client
D.
neighbor 165.50.12.2 route reflector-client
Answer: B, D
Explanation:

B: Router CK2 (config-router)# neighbor 165.50.12.2 remote-as 64000 We configure router CK1
(165.50.12.2) as a neighbor in AS 64000.
D: Router CK2 (config-router)# neighbor 165.50.12.2 route-reflector-client Configures the router CK2 as a BGP route reflector and configures the specified neighbor CK1 (165.50.12.2) as its client. Incorrect Answers:
A: We must specify router CK1 as neighbor, not CK2 itself (165.50.12.1). Furthermore, we should use the local AS (64000), not the remote AS 65100.
C: We must specify router CK1 as route reflector client, not CK2 itself (165.50.12.1).
QUESTION 47
The Certkiller network consists of a series of routers that are all configured for IBGP. Which one of the following IBGP characteristics is true?
A. The IBGP routers must always be fully meshed.
B. The IBGP routers can be in a different AS.
C. The IBGP routers must be directly connected.
D. The IBGP routers do not need to be directly connected.
E. None of the above are true.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation: The IBGP routers do not have to be directly connected. The remote IBGP peers need only be reachable via a TCP connection. For example, if the network is also running an interior routing protocol such as EIGRP or OSPF, the remote IBGP router could be many hops away, as long as it is reachable via the IGP that is being used. Incorrect Answers:
A: Using route reflectors or confederations a full mesh topology is not necessary.
B: The IBGP routers must be placed in the same AS. Peers that are in different autonomous systems are using EBGP, not IBGP.
C: The IBGP routers do not have to be directly connected.
QUESTION 48
Which of the following statements regarding BGP peer groups are true? (Select two)
A. Peer members inherit all options of the peer group.
B. Peer groups can be used to simplify BGP configurations.
C. Peer groups are optional non-transitive attributes for BGP.
D. A peer group allows options that affect outbound updates to be overridden.
E. A common name should be used on all routers because this information is passed between neighbors.

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation:
A BGP peer group is a group of BGP neighbors with the same update policies.

A: By default members of the peer group inherit all of the configuration options of the peer group. Note: Members can also be configured to override these options
B: Peer groups are normally used to simplify router configurations when many neighbors have the same policy.
Note: BGP neighbors who share the same outbound policies can be grouped together in what is called a BGP peer group. Instead of configuring each neighbor with the same policy individually, Peer group allows to group the policies which can be applied to individual peer thus making efficient update calculation along with simplified configuration.
Incorrect Answers:
C: The only Optional non-transitive attribute in BGP is MED.
D: Does not apply.
E: Using a common router name provides no BGP benefits at all.
Reference: BGP Peer Groups, http://www.cisco.com/warp/public/459/29.html

QUESTION 49
A BGP router is configured as shown below: interface ethernet 0 ip address 10.10.10.1 255.255.0.0 ! int serial 0 ip address 172.16.1.1 255.255.255.252 ! router bgp 65001 neighbor 192.168.1.1 remote-as 65002 Based on the above configuration, which of the following BGP statements would inject the 10.10.0.0/16 prefix into the BGP routing table?
A. network 10.0.0.0
B. network 10.10.0.0 mask 255.255.0.0
C. network 10.10.10.1 mask 255.255.255.255
D. network 10.10.10.0 mask 255.255.255.0
E. network 10.0.0.0 mask 255.255.0.0

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation: The /16 mask is equal to 255.255.0.0, so answer choice B matches the address and the mask. To specify the route as classless, the mask keyword should be included or the network will be summarized at the network boundary.
QUESTION 50
Why would a systems administrator enter in the network command when configuring BGP?
A. Local routes matching the network command are filtered from the BGP routing table.
B. Local routes matching the network command can be installed into the BGP routing table.
C. Routes matching the network command will be filtered from BGP routing updates.
D. External routes matching the network command will be installed into the BGP routing table.
E. None of the above.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
Use the network router configuration command to permit BGP to advertise a network if it is
present in the IP routing table.
Reference: Building Scalable Cisco Networks (Cisco Press) page 342

QUESTION 51
The Certkiller network is depicted in the following diagram: Which of the following command sets would you use if you want Certkiller 1 and Certkiller 2 to exchange BGP routing information? (Select two)

A. Certkiller 2(config)#router bgp 200 Certkiller 2(config-router)#neighbor 10.1.1.1 remote-as 100
B. Certkiller 1(config)#router bgp 100 Certkiller 1(config-router)#exit Certkiller 1(config)#interface S0
Certkiller 1(config-if)#neighbor 10.1.1.2 remote-as 200
C. Certkiller 1(config)#router bgp 100 Certkiller 1(config-router)#neighbor 10.1.1.2 remote-as 200
D. Certkiller 2(config)#router bgp 100 Certkiller 2(config-router)exit Certkiller 2(config)#interface S0
Certkiller 2(config-if)#neighbor remote-as 100
E. Certkiller 1(config)#router bgp 100 Certkiller 1(config-router)#network 10.0.0.0 Certkiller 1(config-router)#neighbor 10.1.1.2 remote-as 100
F. Certkiller 2(config)#router bgp 200 Certkiller 2(config-router)#network 10.0.0.0 Certkiller 2(config-router)#network 10.1.1.1 remote-as 200

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
Explanation:
Choices A and C give the correct syntax for configuring EBGP peering sessions.
Incorrect Answers:
B, D: The BGP peering configurations are placed under the BGP routing process, not in
interface configuration mode.
E, F: The network 10.0.0.0 command is not required here, since this is an EBGP peering session using the
directly connected interface. Since each neighbor shares the 10.0.0.0 network they each already know
how to reach this network.

QUESTION 52
Router TK-1 is configured for BGP routing as shown below: router bgp 65300 network 27.0.0.0 neighbor
192.23.1.1 remote-as 65300 From the perspective of router TK-1, what kind of router is the router with IP address 192.23.1.1?
A. A peer router running IBGP
B. A peer router running EBGP
C. A community member running IBGP
D. A peer group member running IBGP E. A peer group member running EBGP

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation:
Both the local and remote router is configured with the same autonomous system number so they are peer
routers running IBGP.

QUESTION 53
When you’re configuring BGP on a Cisco router, what is true of the command “network”?
A. Local routes matching the network command are filtered from the BGP routing table.
B. Local routes matching the network command can be installed into the BGP routing table.
C. Sending and receiving BGP updates is controlled by using a number of different filtering methods.
D. The route to a neighbor autonomous system must have the correct MED applied to be installed into BGP routing table.
E. None of the above.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation: The network command allows BGP to advertise an IGP route if it is already in the IP table. A matching route must exist in the routing table before the network is announced. The network command is used to permit BGP to advertise a network if it is present in the IP routing table.
QUESTION 54
Router CK1 needs to be configured to advertise a specific network. Which of the following commands would you use if you wanted to advertise the subnet 154.2.1.0 255.255.255.0 to the EBGP neighbors on your subnet?
A. Router (config-router)#network 154.2.1.0
B. Router (config-router)#network 164.2.1.0
C. Router (config-router)#network-advertise 154.2.1.0
D. Router (config-router)#network 154.2.1.0 mask 255.255.255.0
E. None of the above

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
The network command is used to specify the networks to be advertised by the Border Gateway Protocol
(BGP) and multiprotocol BGP routing processes.
Syntax: network network-number [mask network-mask] [route-map map-name]
Mask and route-map are optional. If the mask keyword is configured, then an exact match must exist in the
routing table.
Incorrect Answers:

A: If we do not specify the subnet mask then additional networks are allowed to be advertised. The classful subnet mask of 154.2.1.0 is 255.255.0.0 – a Class B network.
B: This is using the incorrect IP address, as well as a missing subnet mask.
C: The network-advertise is an invalid command.
QUESTION 55
You are the administrator of a company with BGP connections to multiple ISP’s. How could you configure BGP to make it favor one particular ISP for outbound traffic?
A. Configure weight
B. Enable route reflector
C. Create a distribute list
D. Enable the Longer Autonomous System path option.
E. All of the above.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: If the router learns about more than one route to the same destination, the route with the highest weight will be preferred. Weight is a Cisco BGP parameter that is local to the router. When terminating multiple ISP connections into the same router, weight can be used to affect which path is chosen for outbound traffic. Incorrect Answers:
B: A route reflector cannot be used to influence outbound traffic. A route reflector modifies the BGP split horizon rule by allowing the router configured as the route reflector to propagate routes learned by IBGP to other IBGP peers. This saves on the number of BGP TCP sessions that must be maintained, and also reduces the BGP routing traffic.
C: Distribute lists restrict the routing information that the router learns or advertises. By itself a distribute list cannot make routes from one ISP be preferred to routers from another ISP.
D: This choice describes ASD path pre-pending, which would be used to influence the path that incoming traffic takes, not outgoing.
QUESTION 56
What are two solutions to overcome the full mesh requirement with iBGP? (Choose two)
A. BGP groups
B. BGP local preference
C. Route reflector
D. Confederation
E. Aggregate-address

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
Explanation: In general, all IBGP peers must be configured to be fully meshed. If they are not, then all of the IBGP routers will not have the updated information from the external BGP routers. There are two ways to overcome the scalability issues of a full IBGP mesh: route reflectors and confederations. With route reflectors, internal BGP routers peer only with the route reflector. With confederations, the AS is broken up into smaller, more manageable sub autonomous systems.
QUESTION 57
An ISP is running a large IBPG network with 25 routers. The full mesh topology that is currently in place is inefficiently using up bandwidth from all of the BGP traffic. What can the administrator configure to reduce the number of BGP neighbor relationships within the AS?
A. Route reflectors
B. Route maps
C. Route redistribution
D. Peer groups
E. Aggregate addresses
Correct Answer: A Section: (none) Explanation

Explanation/Reference:
Explanation: In general, all IBGP peers must be configured to be fully meshed. If they are not, then all of the IBGP routers will not have the updated information from the external BGP routers. There are two ways to overcome the scalability issues of a full IBGP mesh: route reflectors and confederations. With route reflectors, internal BGP routers peer only with the route reflector, and then the route reflectors connect with each other. This can considerably reduce the number of IBGP sessions. Another solution to the scalability problem of IBGP is the use of confederations. With confederations, the AS is broken up into smaller, more manageable sub autonomous systems.
QUESTION 58
Arrange the BGP attributes on the left in order or priority.

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:

Explanation:
How the Best Path Algorithm Works:
BGP assigns the first valid path as the current best path. It then compares the best path with the next path
in list, until it reaches the end of the list of valid paths. The following is a list of rules used to determine the
best path.

1.
Prefer the path with the highest WEIGHT. Note: WEIGHT is a Cisco-specific parameter, local to the router on which it’s configured.

2.
Prefer the path with the highest LOCAL_PREF. Note the following:

Path without LOCAL_PREF is considered as having the value set with the bgp default local-preference command, or 100 by default.

3.
Prefer the path that was locally originated via a network or aggregate BGP subcommand, or through redistribution from an IGP. Local paths sourced by network or redistribute commands are preferred over local aggregates sourced by the aggregate-address command.

4.
Prefer the path with the shortest AS_PATH. Note the following:

The AS_CONFED_SEQUENCE and AS_CONFED_SET are not included in the AS_PATH length.

5.
Prefer the path with the lowest origin type: IGP is lower than EGP, and EGP is lower than INCOMPLETE.

6.
Prefer the path with the lowest multi-exit discriminator (MED). Note the following:
This comparison is only done if the first (neighboring) AS is the same in the two paths; any confederation sub-ASs are ignored. In other words, MEDs are compared only if the first AS in the AS_SEQUENCE is the same for multiple paths. Any preceding AS_CONFED_SEQUENCE is ignored. If bgp always-compare-med is enabled, MEDs are compared for all paths. This option needs to be enabled over the entire AS, otherwise routing loops can occur.
If bgp bestpath med-confed is enabled, MEDs are compared for all paths that consist only of AS_CONFED_SEQUENCE (paths originated within the local confederation).
Paths received from a neighbor with a MED of 4,294,967,295 will have the MED changed to 4,294,967,294 before insertion into the BGP table.
Paths received with no MED are assigned a MED of 0, unless bgp bestpath missing-as-worst is enabled, in which case they are assigned a MED of 4,294,967,294.
The bgp deterministic med command can also influence this step as demonstrated in the How BGP Routers Use the Multi-Exit Discriminator for Best Path Selection.
7.
Prefer external (eBGP) over internal (iBGP) paths. If bestpath is selected, go to Step 9 (multipath).

Note: Paths containing AS_CONFED_SEQUENCE and AS_CONFED_SET are local to the confederation,
and therefore treated as internal paths. There is no distinction between
Confederation External and Confederation Internal.
8.
Prefer the path with the lowest IGP metric to the BGP next hop. Continue, even if
bestpath is already selected.
9.
Check if multiple paths need to be installed in the routing table for BGP Multipath.
Continue, if bestpath is not selected yet.
10.
When both paths are external, prefer the path that was received first (the oldest one). This step
minimizes route-flap, since a newer path will not displace an older one, even if it
would be the preferred route based on the next decision criteria (Steps 11, 12, and 13).
Skip this step if any of the following is true:

o The bgp best path compare-routerid command is enabled.
Note: This command was introduced in Cisco IOS(r) Software Releases 12.0.11S, 12.0.11SC,
12.0.11S3, 12.1.3, 12.1.3AA, 12.1.3.T, and 12.1.3.E.

o The router ID is the same for multiple paths, since the routes were received from the same router.

o There is no current best path. An example of losing the current best path occurs when the neighbor offering the path goes down.
11.
Prefer the route coming from the BGP router with the lowest router ID. The router ID is the highest IP address on the router, with preference given to loopback addresses. It can also be set manually using the bgp router-id command. Note: If a path contains route-reflector (RR) attributes, the originator ID is substituted for the router ID in the path selection process.

12.
If the originator or router ID is the same for multiple paths, prefer the path with the minimum cluster list length. This will only be present in BGP route-reflector environments. It allows clients to peer with RRs or clients in other clusters. In this scenario, the client must be aware of the RR-specific BGP attribute.

13.
Prefer the path coming from the lowest neighbor address. This is the IP address used in the BGP neighbor configuration, and corresponds to the remote peer used in the TCP connection with the local router.
QUESTION 59
The Certkiller BGP routing table consists of the following network routes:

What is the correct command to summarize these prefixes into a single summary prefix of 192.168.12.0/22 while also allowing for the advertisement of the more specific prefixes?
A. network 192.168.12.0 mask 255.255.252.0
B. network 192.168.12.0 mask 0.0.3.255
C. network 192.168.12.0
D. aggregate-address 192.168.12.0 255.255.252.0
E. aggregate-address 192.168.12.0 255.255.252.0 summary-only
F. aggregate-address 192.168.12.0 255.255.252.0 as-set

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
To summarize BGP prefixes into one aggregated route, use the “aggregate-address” command.
When used alone, this will advertise the aggregate route, along with the individual specific
routing entries. To advertise only the aggregated route, use the “summary-only” keyword, as specified in
choice E.

QUESTION 60
The Certkiller BGP network is displayed below: Certkiller 3 is the hub router and Certkiller 1 and Certkiller 2 are the spokes. There are no virtual circuits between the spoke locations. Each router is in a separate AS. What is needed to successfully route traffic to the 11.11.11.0/24 network from Certkiller 1?

A. The neighbor 10.10.10.1 next-hop-self command on Certkiller 1.
B. The neighbor 10.10.10.1 next-hop-self command on Certkiller 2.
C. The neighbor 10.10.10.1 next-hop-self command on Certkiller 3.
D. Nothing is required. This is the default behavior on this topology

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation:
The following example illustrates the issue:
BGP Next Hop (NBMA)
If the common media as you see in the shaded area above is a frame relay or any NBMA cloud then the exact behavior will occur as if we were connected via Ethernet. RTC will advertise 180.20.0.0 to RTA with a next hop of 170.10.20.3. The problem is that RTA does not have a direct PVC to RTD, and cannot reach the next hop. In this case routing will fail. In order to remedy this situation a command called next-hop-self is created. The next-hop-self Command Because of certain situations with the next hop as we saw in the previous example, a command called next-hop-self is created. The syntax is: neighbor {ip-address|peer-group-name} next-hop-self The next-hop-self command allows us to force BGP to use a specified IP address as the next hop rather than letting the protocol choose the next hop. In the previous example, the following configuration solves our problem: RTC# router bgp 300 neighbor 170.10.20.1 remote-as 100 neighbor 170.10.20.1 next-hop-self RTC advertises 180.20.0.0 with a next hop = 170.10.20.2 Reference: http://www.cisco.com/warp/public/459/bgp-toc.html#bgpnexthop
QUESTION 61
Exhibit Based on the show ip bgp summary output in the exhibit, which two statements are true? Select two?

A. The BGP session to the 10.1.1.1 neighbor is established.
B. The BGP session to the 10.2.2.2 neighbor is established.
C. The BGP session to the 10.3.3.3 neighbor is established.
D. The router is attempting is attempting to establish a BGP peering to the 10.1.1.1 neighbor.
E. The BGP session to the 10.3.3.3 neighbor is established, but the router has not received any BGP routing updates from the 10.3.3.3 neighbor.
F. The router is attempting to establish BGP peering with the 10.2.2.2 neighbor.

Correct Answer: AFCEBD Section: (none) Explanation
QUESTION 62
we want to hide some of your internal IP subnets from outside networks. By what means can you conceal the details of your IP addressing scheme to the outside world?
A. Subnetting
B. Supernetting
C. Challenge Handshake Protocol
D. Usernames and passwords

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation: In large internetworks, hundreds or even thousands of networks can exist. In these environments, it is often not desirable for routers to maintain all these routes in their routing table. Route summarization (also called route aggregation or supernetting) can reduce the number of routes that a router must maintain because is it a method of representing a series of network numbers in a single summary address. By advertising only one large supernet to the outise world, the details of your IP network scheme can remain hidden.
QUESTION 63
The Certkiller network will be using a new ISP for their Internet connection. The new Internet provider will be allocating a new registered class C IP address subnet to use. In order to not have to change out the entire internal IP addressing scheme on your network, you plan to use NAT to translate all of the internal IP address to the new IP addresses that are being assigned to Certkiller . You have been assigned the task of making changes so that the following requirements are met: Maintain the current IP addressing scheme Configure Certkiller ‘s router for network address translation (NAT) so all the internal computers use the same external IP address Configure a static translation so Certkiller employees can access their email from the internet. Privileged mode password: Certkiller The IP Addresses are shown below: Name: Certkiller NAT SO 192.168.15.1/24 E0 10.100.5.1/24 E-mail Server’s External Address 192.168.15.5/24 E-mail Server’s Internal Address 10.100.5.5/24 To configure the router click on a host icon that is connected to a router by a serial console cable.

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Certkiller NAT(config-if)#exit Certkiller NAT(config)#exit Certkiller NAT#copy run start Q322

You have been assigned the task of configuring the routers to meet the following requirements:
In the unlikely event that a link goes down, you have to ensure a backup link exists
The proper metrics must be distributed through the IGRP portion of the network Based on this information,
which of the following should you do? (Select two)

A. Apply the distance command to Main
B. Apply the distance command to CK2
C. Apply the distribute-list command to Main
D. Apply the distribute-list command to CK2
Answer: B, C Explanation:
B: Most routing protocols, including IGRP and RIP, use the distance command to modify the administrative distance. We need to change the metric of the RIP routes learned by CK2 .
C: To control the advertising and processing of routes in routing updates the distribute-list
command is used.
Incorrect Answers:

A: We change the administrative distance of RIP routes on CK2 .

D: We should apply the distribute-list command to Main, not to CK2 .

QUESTION 64
Network topology exhibit

Certkiller .com is changing ISPs. As a result, they will need to install an Email server and utilize network address translation (NAT) for the internal network. Certkiller .com does not want to change the IP Addresses on all of the internal routers and servers. The new ISP, Foo Services, will allocate a registered class C address for Certkiller to use. The internal IP Address scheme will remain the same. Configure the router to provide NAT so that all internal Certkiller PCs will use the single external IP Address assigned to the router interface. Configure a static translation so that Certkiller .com’s Email server will be accessible from the Internet. Name: Certkiller NAT S0: 192.168.17.1/24 E0: 10.0.216.1/24 Secret Password: Certkiller
A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
192.168.212.5/24 Web Server’s Internal Address 10.0.243.5/24
QUESTION 65
One of the virtues of a Link-State routing protocol is its hierarchical design. What advantages does this equate to in network design? (Select two)
A. It allows link-state protocols to support VLSM.
B. It allows them to support address summarization.
C. It reduces the need to flood LSAs to all devices in the internetwork.
D. Routers are no longer required to keep track of the topology of the entire autonomous system.

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
Explanation: Hierarchical design can limit the requirement to notify all devices. The use of areas restricts the flooding to the logical boundary of the area rather than to all devices in the OSPF domain. Another advantage of hierarchical network design is that the entire network is divided into multiple smaller sections, so that much of the routing information is kept within a small area. In a non-hierarchical network, each router is required to maintain routing information for all other routers within the entire network. Incorrect Answers:
A: Although link state protocols do indeed support VLSM, it is not due to a hierarchical network design. For example, RIP version 2 supports VLSM, but it is not hierarchical.
B: Although address summarization can indeed be configured on routers configured in a hierarchical design, it is an independent function and is not related to the fact that a tiered network design is being used.
QUESTION 66
In regards to the three layered hierarchical network design, which of the following are responsibilities of the distribution layer? (Choose 2)
A. Reliable transport structure
B. Route redistribution
C. Optimized transport structure
D. Address aggregation
E. Unauthorized entry access control lists

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
Explanation: The distribution layer is responsible for what enters and exits a network, including the
consolidation of traffic from multiple subnets into a core connection. Route redistribution and address
aggregation happen at this layer.
Incorrect Answers:
A, C: This is a function of the core layer.

E. This is a function of the access layer.
QUESTION 67
Which of the following are advantages of implementing a hierarchical IP addressing scheme when designing a large network? (Select two)
A. Smaller routing tables
B. Efficient address allocation
C. Translation of private addresses
D. Support for link-state routing protocols

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
Explanation: Hierarchical IP addressing uses the addresses more conservatively, by planning for the correct use of subnet masks and route summarization. A hierarchical network design facilitates the use of IP routing summarization, which will reduce the size of the routing tables.
QUESTION 68
The Certkiller frame relay network is shown in the diagram below: Based on the information given in this diagram, which of the following are true??

A. The network is using a two-layer full-mesh hierarchical design.
B. The network is using a two-layer hub-and-spoke hierarchical design.
C. To improve scalability, route summarization at Routers CK1 , CK2 , CK3 , CK4 , CK5 , and CK6 should be performed.
D. Routers A and B are the distribution layer routers.
E. Routers CK1 , CK2 , CK3 , CK4 , CK5 and CK6 are the access layer routers.
F. To improve security, packet filtering that uses ACLs at Routers A and B must be implemented.

Correct Answer: CEADB Section: (none) Explanation
Explanation/Reference:
A: The network shown here is using a 3 level tiered approach: Core, Distribution, and Access.
B: Three layers are used, not two.
D: Routers A and B are the Core routers here.
E: These routers make up the Distribution layer.
QUESTION 69
You are trying to determine the best routing protocol to use for the large Certkiller network. Which routing protocols should you avoid when deploying a large network? (Select two)
A. IGRP
B. OSPF
C. EIGRP
D. RIP v.2
E. RIP v.1

Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
Explanation: Both RIP version 1 and version 2 should only be used in relatively small networks. A large network would be congested by RIP broadcasts. These frequent broadcasts contain the entire routing table, and could saturate links.
QUESTION 70
What are some of the features that are important for designing large, scalable networks? (Select three)
A. A tiered network design model.
B. Sufficient memory on the router.
C. Multiple EIGRP autonomous systems.
D. Good address space allocation scheme.

Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
Explanation:
A: A tiered network design model such as Core, Distribution, and Access is also needed for
large networks.

B: Sufficient capacity of the routers, in particular the memory, is required for large networks.

D: Good allocation of address space is required- Each region should have a unique address
space so route summarization is possible.
Incorrect Answers:

C: Configuring multiple EIGRP autonomous systems can add extra overhead and it provides no
additional benefits.

QUESTION 71
Two of the following routing protocols require a tiered, hierarchical topology. Which ones are they? (Select two)
A. IS-IS
B. IGRP
C. OSPF
D. EIGRP
E. RIP v2

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
Explanation:
IS-IS and OSPF both require a hierarchical topology. The use of multiple areas and a core
backbone area means that they are hierarchical by nature.

QUESTION 72
What has become the leading Interior Routing Protocol (IGP) in use by Internet service providers?
A. IS-IS
B. OSPF
C. EIGRP
D. RIPv2
E. BGP4

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
Explanation: In recent years, the IS-IS routing protocol has become increasingly popular, with widespread use among Service Providers. It is a link state protocol, which enables very fast convergence with large scalability. It is also a very flexible protocol and has been extended to incorporate leading edge features such as MPLS Traffic Engineering. It is also chosen because it is an IETF standard based protocol, rather than a proprietary protocol such as IGRP or EIGRP. Reference: http://www.cisco.com/en/US/tech/ CK3 65/ CK3 81/technologies_white_paper09186a00800a3e6f.sht ml
QUESTION 73
Two of the following routing protocols support load balancing over unequal cost links.Which ones are they? (Select two)
A. IGRP
B. OSPF
C. EIGRP
D. RIP v2
E. RIP v1

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
Explanation:
IGRP and EIGRP support unequal cost path load balancing, which is known as variance. OSPF,
RIP v1 and RIP v2 do not support this.
Reference: http://www.cisco.com/warp/public/103/19.html

QUESTION 74
You are required to choose a routing protocol that supports variable length subnet masks (VLSM) for your network. Which of the following would meet this requirement? (Choose three)
A. IS-IS
B. IGRP
C. OSPF
D. EIGRP
E. RIP v1

Correct Answer: ACD Section: (none) Explanation
Explanation/Reference:
Explanation:
IS-IS, EIGRP, OSPF, RIP V2 and static routes all support VLSM.
Incorrect Answers:

B: IGRP is the predecessor to EIGRP and does not support VLSM.
E: RIP version 1 is a distance vector routing protocol that does not support VLSM.
QUESTION 75
Cisco routers automatically perform route summarization for various protocols. Which three of the following routing protocols are they? (Select three)
A. IS-IS
B. IGRP
C. OSPF
D. EIGRP
E. RIP v.1

Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
Explanation:
Sending route summaries – Routing information advertised out an interface is automatically summarized at

major (classful) network address boundaries by RIP, IGRP, and EIGRP. Specifically, this autonomous summarization occurs for those routes whose classful network address differs from the major network address of the interface to which the advertisement is being sent. Reference: Building Scalable Cisco Networks (Cisco Press) page 79

CCNA Exam Certification Guide is a best-of-breed Cisco https://www.pass4itsure.com/642-801.html exam study guide that has been completely updated to focus specifically on the objectives.Senior instructor and best-selling author Wendell Odom shares preparation hints and Cisco 642-801 tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge.Cisco 642-801 Material is presented in a concise manner,focusing on increasing your understanding and retention of exam topics.

Continue Reading

Cisco 642-591 Certification Exam, Up To Date Cisco 642-591 Study Material Online

Completed the Cisco 642-591 test and passed with high scores.New Cisco 642-591 test have been changed with many questions last month ago,and now new exam questions and answers have been added on Cisco https://www.pass4itsure.com/642-591.html,which is realiable according to my real test.

QUESTION 30
Which two of the following are Cisco Unity Connection components that, when changed, will not affect the settings of existing users? (Choose two.)
A. Contact Templates
B. Users Templates
C. Enterprise Parameters
D. Service Parameters
E. Call Handlers

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 31
Which of the following applications collects, distributes, and aggregates user attributes and capabilities?
A. Cisco Unity Connection
B. Cisco Unified Presence
C. Cisco Unified Communications Manager
D. Cisco Unified Personal Communicator

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 32
When using Cisco Unity Connection, which call handler type offers different call actions based on the digits that are selected?
A. digit analysis
B. system
C. directory
D. interview
E. call management

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 33
Which five of the following commands will integrate a Cisco Unity Express module with a Cisco Unified Communications Manager Express router. (Choose five.)
Exhibit:

A. ip route 10.1.131.2 255.255.255.255 interface Service-Engine 1/0
B. service-module ip address 10.1.130.2 255.255.255.0
C. ip unnumbered Loopback0
D. service-module ip address 10.1.131.2 255.255.255.0
E. service-module ip default-gateway 10.1.131.1
F. ip unnumbered vlan130
G. service-module ip default-gateway 10.1.30.1.1
H. interface lntegrated-Service-Engine1/0

Correct Answer: ACDEH Section: (none) Explanation
Explanation/Reference:
QUESTION 34
Drag and Drop
Select and Place:

Correct Answer:
Section: (none) Explanation
Explanation/Reference:

The actual Cisco https://www.pass4itsure.com/642-591.html exam questions and answers will sharpen your skills and expand your knowledge to obtain a definite success.save your money and time on your preparation for your Cisco 642-591 certification exam. You will find we are a trustful partner if you choose us as your assistance on your Cisco 642-591 certification exam. Now we add the latest Cisco 642-591 content and to print and share content.

Continue Reading

Cisco 642-587 Exam Questions, Buy Discount Cisco 642-587 Exam Q&As Are Based On The Real Exam

Passed with high score today for Cisco https://www.pass4itsure.com/642-587.html Exam. Windows 8.1 new questions will be added so I’m lucky to pass today.Almost all questions were the same includes the new question, DirectAccess, EFS, AD CS..Only used Flydumps premium vce file.

QUESTION 40
A Cisco WCS version 4.0 has been installed on a server with a dual Pentium
3.0 GHz processor, 4 GB RAM, and an 80 GB hard drive. A location appliance has been incorporated into the network and is being monitored by the Cisco WCS. There are 3000 devices to be tracked but not all of them are being tracked on the Cisco WCS. What can be done to correct the problem?
A. Add 4 GB of RAM to the Cisco WCS.
B. Add a 120 GB hard drive to the Cisco WCS.
C. Add a new location appliance.
D. Add a new Cisco WCS server dedicated to the location appliance.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 41
When optimizing a standalone point-to-multipoint bridge installation with eight non-root bridges, which of the following RTS threshold and CWmin settings would be correct for the non-root bridges?
A. RTS threshold=4000, CWmin=3
B. RTS threshold=1, CWmin=4
C. RTS threshold=4000, CWmin=5
D. RTS threshold=1, CWmin=5

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 42
Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However, employees there have been experiencing problems when tracking objects using active RFID tags. You use an access point scan to determine if the Location Appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?
A. allow for the automatic containment of rogue access points
B. ensure each area is covered by a minimum of three access points
C. ensure channels are deployed such that they do not overlap
D. ensure a minimum RSSI value of -50
Correct Answer: B Section: (none) Explanation

Explanation/Reference:
QUESTION 43
Which of the following parameter sets must be configured on the Cisco Wireless Location Appliance?
A. location views
B. object definitions
C. access points
D. network connections

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 44
What is the correct order of steps for upgrading a Cisco WCS?
A. back up the database, stop the WCS, upgrade the WCS, restore the database, start the WCS
B. stop the WCS, back up the database, upgrade the WCS, restore the database, start the WCS
C. back up the database, stop the WCS, upgrade the WCS, start the WCS, restore the database
D. stop the WCS, back up the database, upgrade the WCS, start the WCS, restore the database

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 45
Which protocol does the RADIUS server use inside the secure tunnel of EAP-FAST to authenticate the client when one-time passwords are in use?
A. MS-CHAP v2
B. PAP
C. GTC
D. MD5

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 46
When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones, which two general control settings should you select? (Choose two.)
A. Aggressive Load Balancing on
B. Aggressive Load Balancing off
C. Multicast on
D. Multicast off
E. AP Fallback on
F. AP Fallback off

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 47
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side, which of the following actions should you perform on the wired infrastructure?
A. Take no action, you have achieved your goal.
B. Implement a Cisco Secure IPS sensor.
C. Implement a protected port on the access switches.
D. Implement 802.1X on the switch ports.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 48
EAP-FAST provides a secure tunnel during Phase One to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?
A. generic token card
B. x.509 certificate
C. preshared key
D. Protected Access Credential

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 49
You are troubleshooting a problem with a Cisco 7920 wireless IP phone that is causing the phone to drop calls. The problem appears to be a roaming bandwidth issue. In order to verify what kind of issue it is, you decide to increase the bandwidth reserved for roaming on the WLAN controller to the maximum. What level do you set the bandwidth to?
A. 5 percent
B. 15 percent
C. 25 percent
D. 35 percent

Correct Answer: C Section: (none) Explanation Explanation/Reference:
QUESTION 50
Using the WLSE, you are trying to push out a configuration job to a standalone access point, but the job does not start. Which of the following would cause this failure?
A. invalid parameter in the template
B. pop-up blocker enabled in the browser
C. incorrect SNMP communities on the access point
D. unsupported version of IOS firmware in the access point

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 51
You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS? (Choose two.)
A. 064 Tunnel-Type
B. 066 Tunnel-Client-Endpoint
C. 067 Tunnel-Server-Endpoint
D. 081 Tunnel-Private-Group-ID
E. 082 Tunnel-Assignment-ID
F. 083 Tunnel-Preference

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 52
In a deployment using standalone access points, clients set up to authenticate with EAP-PEAP or EAP-Cisco Wireless (Cisco-LEAP) cannot authenticate. When you inspect the Failed Attempts report on the Cisco Secure ACS, you find this error: “Unknown network access server NAS.” Which problem may have caused this failure?
A. misconfigured EAP type on the access point
B. misconfigured EAP type on the AAA server
C. misconfigured IP address of the access point on the AAA server
D. misconfigured IP address of the AAA server on the access point

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
What is the maximum number of hexadecimal characters allowed when configuring the WPA or WPA2 passphrase in Cisco ADU?
A. 16
B. 32
C. 64
D. 128

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 54
A client roams from H-REAP AP1 to H-REAP AP2. The client is unable to associate to H-REAP AP2. H-REAP AP2 has six other clients associated to it, which continue to pass traffic. What has caused this problem?
A. H-REAP AP1 lost its connection to the controller.
B. H-REAP AP2 lost its connection to the controller.
C. H-REAP AP1 has reached its client limit.
D. H-REAP AP2 has reached its client limit.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 55
You are configuring a wireless LAN controller for QoS. Which 802.11e user priority tag should you apply to voice applications?
A. 1
B. 3
C. 4
D. 6

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 56
You are using ADU and are authenticated and associated to an access point.
However, you are unable to obtain an IP address. Which of these has caused this problem?
A. invalid SSID
B. invalid 802.1X authentication type
C. invalid encryption type
D. invalid WEP key

Correct Answer: D Section: (none) Explanation Explanation/Reference:
QUESTION 57
Which parameter, when enabled on a standalone access point, gives the highest priority to a voice packet even when QoS is not enabled?
A. QoS Element for Wireless Phones
B. IGMP Snooping
C. WMM
D. AVVID Priority Mapping

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 58
You review the Failed Attempts logs on an AAA server and find: “unknown network access server error.” Which failure could produce this error?
A. failure of the wireless client and AAA server handshake
B. supplicant authentication failure
C. AAA client and AAA server handshake failure
D. wrong password used by the supplicant

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 59
If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on a network when you select which of the following modes from the AP Mode drop-down menu on the controller?
A. Monitor
B. Rogue Detector
C. Sniffer
D. Mirror

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 60
On a WLAN controller, what is the default limit on the number of entries in the database that will be used for local authentication?
A. 50
B. 128
C. 512 D. 1024

Correct Answer: C Section: (none) Explanation
Explanation/Reference:

We help you do exactly that with our high quality Cisco 642-587 Certification using the above training materials.Regardless of whichever computer you have, you just need to download one of the many Cisco https://www.pass4itsure.com/642-587.html PDF readers that are available for free.

Continue Reading

Cisco 642-513 Actual Questions, High Pass Rate Cisco 642-513 Real Exam Questions And Answers Covers All Key Points

GOOD NEWS:Flydumps has published the new version with all the new added questions and answers.By training the Cisco https://www.pass4itsure.com/642-513.html VCE dumps, you can pass the exam easily and quickly.

QUESTION 31
What happens if the Agent UI control rule is not present in any active rule modules?
A. The Agent UI becomes present on the system.
B. The Agent UI is not present on the system.
C. The Agent UI is visible on the system.
D. The Agent UI is not visible on the system.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 32
What are the three options that can be given to a user when a Query User window appears? (Choose three.)
A. allow
B. accept
C. deny
D. kill E. terminate

Correct Answer: ACE Section: (none) Explanation
Explanation/Reference:
QUESTION 33
Which view within the CSA MC allows users to see a view of event records based on filtering criteria such as time and severity?
A. Event Summary
B. Event Log
C. Event Monitor
D. Event Sets
E. Event Alerts

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 34
When a rule is cloned, which part of the rule is not cloned?
A. sets
B. rule modules
C. hosts
D. variables

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 35
What is the purpose of the network interface control rule?
A. to prevent applications from opening devices and acting as a sniffer
B. to provide protocol stack hardening rules
C. to prevent users from opening devices that can act as a sniffer
D. to provide filtering of undesired traffic at the network interface level

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 36
What action must happen before a system that has CSA can download policies configured for it?
A. The system must be rebooted.
B. The system must install Agent kits.
C. The system must be polled by the CSA MC.
D. The system must register with the CSA MC.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 37
Which rules will not be enforced if you fail to reboot a Windows system following installation of the CSA?
A. network access control rules
B. buffer overflow rules
C. COM component access control rules
D. network shield rules

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 38
Which view within the CSA MC allows users to see overall system status information, including a summary of recorded events, agent configuration, and activity?
A. Status Summary
B. Event Log
C. Event Monitor
D. Event Sets
E. Alerts

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 39
Which operating system does not allow Query User options?
A. OS2
B. Windows
C. Linux
D. Solaris
E. HPUX

Correct Answer: B Section: (none) Explanation
Explanation/Reference: QUESTION 40
For which layers of the OSI reference model does CSA enforce security?
A. Layer 1 through Layer 4
B. Layer 1 through Layer 7
C. Layer 2 through Layer 4
D. Layer 3 through Layer 7

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 41
Which view within the CSA MC allows users to see a continuously refreshed view of the most recently logged event records?
A. Event Log
B. Event Monitor
C. Event Sets
D. Event Alerts

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 42
What are the three CSA MC administrator roles? (Choose three.)
A. access
B. configure
C. deploy
D. view
E. monitor
F. administer

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 43
What can you optionally install when you choose the Quiet Install option when creating a new Windows Agent kit?
A. the Agent kit shim
B. the protocol shim
C. the network shim
D. the policy shim

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 44
When you choose the Log All Deny Actions option within a group, how are deny actions logged?
A. Deny actions are logged every 5 minutes.
B. Deny actions are logged every 10 minutes.
C. Every deny action is logged regardless of the specific rule settings.
D. Only those deny actions that are configured within specific rules are logged.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 45
For which operating system is the system API control rule available?
A. OS2
B. Windows
C. Linux
D. Solaris

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 46
How can you configure a host to poll in to the CSA MC before its scheduled polling interval using the CSA MC?
A. Click the Poll button on the Agent UI.
B. Choose the Poll Now button on the CSA MC.
C. Choose the Send Polling Hint option in the CSA MC.
D. Enter a polling interval in the appropriate box on the CSA MC.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 47
In which type of rules are file sets used?
A. COM component access control rules
B. resource access control rules
C. file version control rules
D. file access control rules

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 48
What status is shown when an Agent kit is prepared for downloading to hosts?
A. prepared
B. ready
C. needs rule generation
D. complete

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 49
Drag Drop question

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center
QUESTION 50
Which protocol is required for the administrative workstation to communicate with the CSA MC?
A. SSH
B. Telnet
C. SSL
D. IPSec

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 51
How can the Agent kit be sent out to host machines?
A. via a URL that is e-mailed to clients
B. via a TFTP server
C. via an FTP server
D. via a Telnet server

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 52
What is the purpose of the sniffer and protocol detection rule?
A. to stop sniffers from running on a network
B. to allow sniffers to run on a network
C. to cause an event to be logged when non-IP protocols and sniffer programs are detected running on systems
D. to deny non-IP protocols and sniffer programs from running on systems

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
What are three types of variables used for CSA? (Choose three.)
A. global sets
B. file sets
C. API sets
D. data sets
E. network address sets

Correct Answer: BDE Section: (none) Explanation Explanation/Reference:
QUESTION 54
What is the purpose of connection rate limit rules?
A. to limit the number of connections to an application
B. to limit the number of calls to the kernel in a specified time frame
C. to limit the number of network connections within a specified time frame
D. to limit the number of malformed connection requests to a web server

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 55
Which port is used to access the CSA MC from the administrative workstation?
A. 21
B. 23
C. 1741
D. 1802

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 56
Which two of the following file access rule criteria can you use to allow or deny the operations that the selected applications can perform on files? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications
E. the address with which a system is attempting to communicate

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 57
What action is taken on user query windows when the Agent UI is not present on a system?
A. The default action is always taken.
B. All actions are denied.
C. All actions are allowed.
D. All actions are allowed and logged.
Correct Answer: A Section: (none) Explanation

Explanation/Reference:
QUESTION 58
Which three make up the CSA architecture model? (Choose three.)
A. Cisco Trust Agent
B. Cisco Security Agent
C. Cisco Security Agent Management Center
D. Cisco Intrusion Prevention System
E. an administrative workstation
F. a syslog server

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 59
Which two of the following network access rules can you use to control access to specified network services? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications

Correct Answer: AC Section: (none) Explanation
Explanation/Reference:

We provide thoroughly reviewed Cisco 642-513 using the training resources which are the best for Cisco https://www.pass4itsure.com/642-513.html,and to get certified by Microsoft Windows Store apps.It is a best choice to accelerate your career as a professional in the Information Technology industry. Now we add the latest Cisco 642-513 content and to print and share content.

Continue Reading

Cisco 642-504 Vce & PDF, Sale Latest Cisco 642-504 Certificate Latest Version PDF&VCE

New VCE and PDF– You can prepare Cisco https://www.pass4itsure.com/642-504.html exam in an easy way with Flydumps Cisco 642-504 questions and answers.By training our vce dumps with all Cisco 642-504 the latest questions,you can pass the exam in the first attempt.

QUESTION 45
The Company network is using an 802.IX implementation, in an 802.lx implementation the supplicant directly connects to, and obtains network access permission through which device?
A. Host
B. Authenticator
C. PC
D. Authentication server

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 46
The Easy VPN Server feature allows Cisco IOS routers, Cisco Adaptive Security Appliances (ASA), and Cisco PIX Security Appliances to act as head-end devices in site-to-site or remote- access VPNs The feature pushes security policies defined at the central site to the remote device during which of these phases?
A. IKE Phase 1 first message exchange
B. IKE Phase 2 first message exchange
C. IKE Phase 2 last message exchange
D. IKE mode configuration

Correct Answer: D Section: (none) Explanation
QUESTION 47
You are in charge of Securing Networks Cisco Routers and Switches in your company please point out two benefits of using an IPsec GRE tunnel. (Choose two,)
A. It requires a more restrictive crypto ACL to provide finer security control
B. It has less overhead than runningIPsec in tunnel mode.
C. It allows IP multicast traffic. ActualTests.com
D. It allows dynamic routing protocol to run over the tunnel interface.

Correct Answer: CD Section: (none) Explanation
QUESTION 48
Which two capabilities are of the Cisco IOS Firewall Feature Set? (Choose two,)
A. protects against worms, malicious users, and denial of service
B. provides for secure connectivity between branch offices
C. provides intrusion protection capabilities
D. interoperates with Network Address Translation to conserve and simplify network address use “Pass Any Exam. Any Time.” – www.actualtests.com 31 Cisco 642-504: Practice Exam

Correct Answer: AD Section: (none) Explanation
QUESTION 49
Which two are typical Layer 2 attacks? (Choose two.)
A. MAC spoofing
B. CAM table overflow
C. Route poisoning
D. DHCP Starvation

Correct Answer: AB Section: (none) Explanation
QUESTION 50
You are the Cisco Configuration Assistant in your company.Which two commands would you use to only allow SSH traffic to the router EthO interface and deny other management traffic (BEEP, FTP, HTTP, HTTPS, SNMP, Telnet, TFTP) to the router interfaces? (Choose two.)
A. control-plane host
B. interfaceethO
C. policy-map type port-filter policy-name
D. management-interfaceethO allow ssh

Correct Answer: AD Section: (none) Explanation
QUESTION 51
You want to increase the security levels at layer 2 within the Company switched LAN. Which three are typical Layer 2 attack mitigation techniques? (Select three)
A. 802.lx authentication
B. Port security
C. ARP snooping
D. DHCP snooping

Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
QUESTION 52
Which alerting protocol is used by Cisco IOS IPS with a pull mechanism for getting IPS alerts to the network management application?
A. SNMP
B. syslog
C. SDEE
D. POP3

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
You are the Cisco Configuration Assistant in your company.When you enter the switch(config)£aaa authentication dotlx default group radius command on a Cisco Catalyst switch, You get the error message “invalid input detected”, What is the most likely reason?
A. Enable 802.lx.first
B. Define the RADIUS server IP address first, using theswitch(config)# radius-server host ip- address command.
C. Method-list name is missing
D. Enter theaaa new-model command first,

Correct Answer: D Section: (none) Explanation
QUESTION 54
When configuring FPM, which is the next step after loading the PHDFs?
A. Define a stack of protocol headers. ActualTests.com
B. Define a class map of type “access-control” for classifying packets,
C. Reload the router.
D. Save the PHDFs to startup-config,

Correct Answer: A Section: (none) Explanation
QUESTION 55
The Company security administrator is in charge of creating a security policy for the company. Which two statements about the creation of a security policy are true? (Choose two)
A. It helps Chief Information Officers determine the return on investment of network security at Company Inc.
B. It defines how to track down and prosecute policy offenders at Company Inc.
C. It provides a process to audit existing network security at Company Inc.
D. It defines which behavior is and is not allowed at Company Inc.

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 56
Which secure group keying mechanism is used by GET VPN?
A. public and private keys
B. Diffle-Hellman
C. Group Domain of Interpretation
D. group key agreement

Correct Answer: C Section: (none) Explanation
QUESTION 57
You are the network consultant from your company. Cisco IOS Zone-Based Firewall uses which of the following to identify a service or application from traffic flowing through the firewall?
A. Network Based Application Recognition
B. extended access list
C. deep packet inspection
D. PAM table ActualTests.com

Correct Answer: D Section: (none) Explanation
QUESTION 58
Which best practice is recommended while configuring the Auto Update feature for Cisco IOS IPS?
A. Synchronize the router’s clock to the PC before configuring Auto Update,
B. Download the realm-cisco.pub.key file and update the public key stored on the router.
C. Clear the router’s flash of unused signature files.
D. Enable anonymous TFTP downloads from Cisco.com and specify the download frequency. “Pass Any Exam. Any Time.” – www.actualtests.com 34 Cisco 642-504: Practice Exam

Correct Answer: A Section: (none) Explanation
QUESTION 59
Router CK1 is configured with the IOS firewall feature set to prevent TCP based attacks. How many incomplete connections must this router have by default before TCP Intercept will start dropping incomplete connections?
A. 500
B. 1100
C. 700
D. 900

Correct Answer: B Section: (none) Explanation
QUESTION 60
Which statement is correct about the GRE tunnel endpoints while configuring GRE over IPsec?
A. For high availability, the GRE tunnel interface should be configured with aprimaty and a backup tunnel destination IP address.
B. A mirror image of theIPsec crypto ACL needs to be configured to permit the interesting end- user traffic between the GRE endpoints.
C. The tunnel interface of both endpoints needs to be in the same IP subnet,
D. The tunnel interface of both endpoints should be configured to use the outside IP address of the router as the unnumbered IP address.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 61
Which of the following represents the behavior of the CBAC aggressive mode in a Cisco IOS firewall?
A. Delete all half-open session
B. Re-initiate half open session
C. Complete all half open sessions make the full open session
D. Delete half-open session as needed to accommodate new connection requests

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 35 Cisco 642-504: Practice Exam
QUESTION 62
You are in charge of Securing Networks Cisco Routers and Switches in your company Given that the faO/1 interface is the trusted interface, what could be a reason for users on the trusted inside networks not to be able to successfully establish outbound HTTP connections based on the following configuration?

A. access-list on the faO/1intetface is not set.
B. The RVRULE inspection policy is not inspecting HTTP traffic.
C. access-list 104 is denying the outbound HTTP traffic.
D. The outgoing inspection rule on the fa0/1 interface is not set, ActualTests.com

Correct Answer: C Section: (none) Explanation
QUESTION 63
The Dynamic Multipoint VPN (DMVPN) feature allows users to better scale large and small IP Security (IPsec) Virtual Private Networks (VPNs) by combining generic routing encapsulation (GRE) tunnels, IPsec encryption, and Next Hop Resolution Protocol (NHRP).Referring to a DMVPN hub router tunnel interface configuration, what will fail if the ip nhrp map multicast dynamic command is missing on the tunnel interface?
A. The NHRP request and response. “Pass Any Exam. Any Time.” – www.actualtests.com 36 Cisco 642-504: Practice Exam
B. The GRE tunnel
C. The IPsec peering
D. The dynamic routing protocol.

Correct Answer: D Section: (none) Explanation
QUESTION 64
What is the objective of the Cisco SDM IPS migration tool?
A. to migrate from promiscuous mode IPS to inline IPS
B. to migrate from Cisco IOS IPS version 4.0 to Cisco IOS IPS version 5.0
C. to migrate from Cisco IOS IPS to the Cisco AIM-IPS
D. to migrate from the Cisco NM-CIDS to the Cisco AIM-IPS

Correct Answer: B Section: (none) Explanation
QUESTION 65
What OSI layers can CBAC filter on? Select all that apply.
A. Layer 4
B. Layer 3
C. Layer 2
D. Layer 7

Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 66
Which description is true about the Cisco IOS IPS configuration output shown in the following exhibit?
“Pass Any Exam. Any Time.” – www.actualtests.com 37 Cisco 642-504: Practice Exam

A. The SDF will be loaded from the IPS directory in flash.
B. The built-in signatures will be used.
C. The router is using the advanced IPS signature set.
D. The SMEs are stored in the IPS directory in flash.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 67
Router CK1 has been upgraded with the Cisco firewall IOS. Which of the following cannot be configured on a router unless the IOS Firewall feature set is installed? (Select all that apply)
A. PAM
B. Authentication Proxy
C. IDS
D. CBAC “Pass Any Exam. Any Time.” – www.actualtests.com 38 Cisco 642-504: Practice Exam

Correct Answer: ABCD Section: (none) Explanation
QUESTION 68
For the following Cisco IOS Firewall features, which one allows the firewall to function as a Layer 2 bridge on the network?
A. firewall ACL bypass
B. zone-based firewall
C. CBAC
D. transparent firewall

Correct Answer: D Section: (none) Explanation
QUESTION 69
While logged into a Company router, which of the following commands specifies that the IOS Firewall IDS engine drops packets and resets TCP connections for information signatures?
A. ip audit name auditi info attack drop reset
B. ip audit name auditi info action drop reset
C. ip audit name auditi info sig action drop reset
D. ip audit name auditi sig info drop reset

Correct Answer: D Section: (none) Explanation
QUESTION 70
Which statement best describes Cisco IOS Firewall URL-filtering services on Cisco IOS Release 12,4(15)T and later?
A. Enabling “allow mode” is required when using an external URL-filtering server.
B. Multiple URL lists and URL filter server lists can be configured on the router.
C. URL filtering with zone-based firewalls is configured using the type “inspect” parameter-map.
D. The services support Secure Computing server orWebsense server and the local URL list.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 71
You are the Cisco Configuration Assistant in your company. Which command will would you use totrigger the router to request certificates from the CA for the router RSA key pair?
A. cryptopki enroll CA-Name
B. enrollmenturl http://CA-Name:SO
C. cryptopki trustpoint CA-Name
D. cryptopki authenticate CA-Name

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 72
Which tow statements are correct according to the CLI configuration displayed in the exhibit? (Choose tow.)

A. SerialO/0/0 is the outside NAT interface.
B. access-list 1 defines the list of inside global IP addresses.
C. The overload option enables static PAT,
D. All HTTP connections to the SerialO/0/0 interface IP address will be translated to the 172.16.1.2 IP address port 8080,

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 73
The Company network is concerned about SPAM and wants to use IDS tools to prevent SPAM attacks. By default, how many message recipients must an email have for the IOS Firewall to consider it a spam attack?
A. 250
B. 500
C. 100
D. 25

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 40 Cisco 642-504: Practice Exam
QUESTION 74
Cisco Easy VPN greatly simplifies virtual private network (VPN) deployment for remote offices and teleworkers. While using Cisco Easy VPN, which three options are for entering the XAUTH username and password for establishing the VPN connection from the Cisco Easy VPN remote router? (Choose three.)
A. using an external AAA server
B. saving the XAUTH credentials to this router
C. entering the information from the router console or SDM
D. entering the information from the PC browser when browsing

Correct Answer: BCD Section: (none) Explanation
QUESTION 75
You are the Cisco Configuration Assistant in your company. You are configuring ACS 4.0 Network Access Profiles, which three things can be used to determine how an access request is classified and mapped to a profile? (Choose three)
A. Network Access Filters
B. RADIUS Authorization Components
C. the protocol types
D. advance filtering

Correct Answer: ACD Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 76
For the following Cisco IOS IPS risk rating components, which one uses a law value of 75, a medium value of 100, a high value of 150, and a mission-critical value of 200?
A. Attack Relevancy Rating
B. Promiscuous Delta
C. Target Value Rating
D. Watch List Rating

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 41 Cisco 642-504: Practice Exam
QUESTION 77
The security administrator at Company is seeing a large number of half opened TCP sessions, what are half open TCP sessions?
A. Sessions that were denied,
B. Sessions that have not reached the established state.
C. Sessions where the three-way handshake has been completed.
D. Sessions where the firewall detected return traffic.

Correct Answer: B Section: (none) Explanation
QUESTION 78
Which item is true about the zone-based firewall policy while configuring the zone-based firewall feature on a Cisco router?
A. The policy is appliedunidirectionally between two security zones.
B. Traffic between an interface belonging to a zone and the “self zone is denied by default unless it is explicitly allowed by a used-defined policy.
C. Interfaces in the same zone require that a bidirectional traffic policy be applied to permit traffic flow,
D. Traffic between an interface belonging to a zone and an interface that is not a zone member is allowed to pass without the policy being applied to the traffic,

Correct Answer: A Section: (none) Explanation
QUESTION 79
You are the Cisco Configuration Assistant in your company, what additional configuration is required for the Cisco IOS Firewall to reset the TCP connection if any peer-to-peer, tunneling, or instant messaging traffic is detected over HTTP based on the following configuration?
appfw policy-name my policy application http strict-http action reset alarm content-length maximum 1 action reset alarm content-type-verification match-req-rsp action reset alarm max-header-length request 1 response 1 action reset alarm max-url-length 1 laction reset alarm request-method rfc put action reset alarm transfer-encoding type default reset alarm !
ip inspect name firewall appfw mypolicy ip inspect name firewall http ! Interface FastEthernetO/0 ip inspect firewall in
A. class-map configuration
B. the PAM configuration
C. theip inspect name firewall im, ip inspect name firewall p2p, and ip inspect name firewall tunnel commands
D. the port-misuse default action reset alarm command in the HTTP application firewall policy configuration

Correct Answer: D Section: (none) Explanation Explanation/Reference:
QUESTION 80
While adding NADs as AAA clients in the ACS, which three parameters are configured for each AAA client? (Choose three,)
A. the NAD IP address
B. theEAPtype
C. the shared secret key
D. the AAA protocol to use for communication with the NADs

Correct Answer: ACD Section: (none) Explanation
QUESTION 81
What command configures the amount of time CBAC will wait for a TCP session to become ActualTests.com established before dropping the connection in the state table?
A. ip inspect global syn-establish (seconds)
B. ip inspect tcp global syn-time (seconds)
C. ip inspect global tcp syn (seconds)
D. ip inspect tcp synwait-time (seconds)

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 82
Which one of the following Cisco IOS VPN features simplifies IPsec VPN configuration and design by use of on-demand virtual access interfaces cloned from a virtual template configuration?
A. DMVPN
B. dynamic VTI
C. GRE tunnels
D. GRE overIPsec tunnels

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 83
You are the Cisco Configuration Assistant in your company. What can you determine based on the following configuration? Crypto ipsec transform-set MINE esp-des ! Crypto map MYMAP 10 ipsec-isakmp Set peer 172.30.5.2 Set transform-set MINE Match address 101
A. The authentication method used between theIPsec peers is pre-shared key.
B. ESP tunnel mode will not be used.
C. This is a dynamic crypto map.
D. ESP tunnel mode will be used.

Correct Answer: D Section: (none) Explanation
QUESTION 84
Which option is correct about the output of the Cisco IOS IPS configuration displayed in the ActualTests.com following exhibit?

A. Inline IPS is applied in the outbound direction on the interfaces.
B. The router will drop all packets if the IPS engine is unable to scan data,
C. The basic signatures set has been disabled,
D. The signature delta file is stored in the IPS directory in flash.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 85
You have been tasked with setting up a new router with CBAC. How do you configure the CBAC global UDP idle session timeout?
A. ip inspect udp-session-timeout (seconds)
B. ip inspect udp-idle (seconds)
C. ip inspect udp-timeout (seconds)
D. ip inspect udp idle-time (seconds)

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 45 Cisco 642-504: Practice Exam
QUESTION 86
While deploying S02.1X authentication on Cisco Catalyst switches, which traffic can be passed between the client PC and the Cisco Catalyst switch over the uncontrolled port?
A. DHCP
B. TACACS+
C. HTTP
D. EAPoLAN

Correct Answer: D Section: (none) Explanation
QUESTION 87
You have been tasked with setting up a new Company router with CBAC. How do you set the threshold of half-open sessions CBAC will allow per minute before deleting them?
A. ip inspect one-minute incomplete (number)
B. ip inspect one-minute (number)
C. ip inspect one-minute high (number)
D. ip inspect one-minute high incomplete (number)

Correct Answer: C Section: (none) Explanation
QUESTION 88
According to the partial configuration displayed in the following exhibit, which additional ActualTests.com configuration parameter is required under the GET VPN group member GDOI configuration?

A. key server IP address
B. mapping of theIPsec transform set to the GDOI group
C. mapping of theIPsec profile to the IPsec SA
D. local priority

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 89
You are the Cisco Configuration Assistant in your company. Which TCP port would you use to access the Cisco ACS web interface?
A. 22
B. SO
C. 127
D. 2002

Correct Answer: D Section: (none) Explanation
QUESTION 90
Which action can be enabled by the interface configuration command switchport protected?
A. allows traffic on protected ports to be forwarded at Layer 2
B. configures the interface for the PVLAN edge
C. groups ports into an isolated community when configured on multiplepotts
D. provides isolation between two protected ports located on different switches

Correct Answer: B Section: (none) Explanation
Explanation/Reference:

Flydumps.com

The actual Cisco https://www.pass4itsure.com/642-504.html exam questions and answers will sharpen your skills and expand your knowledge to obtain a definite success.save your money and time on your preparation for your Cisco 642-504 certification exam. You will find we are a trustful partner if you choose us as your assistance on your Cisco 642-504 certification exam. Now we add the latest Cisco 642-504 content and to print and share content.

Continue Reading

Cisco 642-504 Exam Download, Sale Discount Cisco 642-504 Flydumps For Download

Flydumps just published the newest Cisco 642-504 brain dumps with all the new updated exam questions and answers. We provide the latest version of Cisco https://www.pass4itsure.com/642-504.html PDF and VCE files with up-to-date questions and answers to ensure your exam 100% pass,on our website you will get the Cisco 642-504 free new version VCE Player along with your VCE dumps

QUESTION 55
The Company security administrator is in charge of creating a security policy for the company. Which two statements about the creation of a security policy are true? (Choose two)
A. It helps Chief Information Officers determine the return on investment of network security at Company Inc.
B. It defines how to track down and prosecute policy offenders at Company Inc.
C. It provides a process to audit existing network security at Company Inc.
D. It defines which behavior is and is not allowed at Company Inc.

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 56
Which secure group keying mechanism is used by GET VPN?
A. public and private keys
B. Diffle-Hellman
C. Group Domain of Interpretation
D. group key agreement

Correct Answer: C Section: (none) Explanation
QUESTION 57
You are the network consultant from your company. Cisco IOS Zone-Based Firewall uses which of the following to identify a service or application from traffic flowing through the firewall?
A. Network Based Application Recognition
B. extended access list
C. deep packet inspection
D. PAM table ActualTests.com

Correct Answer: D Section: (none) Explanation
QUESTION 58
Which best practice is recommended while configuring the Auto Update feature for Cisco IOS IPS?
A. Synchronize the router’s clock to the PC before configuring Auto Update,
B. Download the realm-cisco.pub.key file and update the public key stored on the router.
C. Clear the router’s flash of unused signature files.
D. Enable anonymous TFTP downloads from Cisco.com and specify the download frequency. “Pass Any Exam. Any Time.” – www.actualtests.com 34 Cisco 642-504: Practice Exam

Correct Answer: A Section: (none) Explanation
QUESTION 59
Router CK1 is configured with the IOS firewall feature set to prevent TCP based attacks. How many incomplete connections must this router have by default before TCP Intercept will start dropping incomplete connections?
A. 500
B. 1100
C. 700
D. 900

Correct Answer: B Section: (none) Explanation
QUESTION 60
Which statement is correct about the GRE tunnel endpoints while configuring GRE over IPsec?
A. For high availability, the GRE tunnel interface should be configured with aprimaty and a backup tunnel destination IP address.
B. A mirror image of theIPsec crypto ACL needs to be configured to permit the interesting end- user traffic between the GRE endpoints.
C. The tunnel interface of both endpoints needs to be in the same IP subnet,
D. The tunnel interface of both endpoints should be configured to use the outside IP address of the router as the unnumbered IP address.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 61
Which of the following represents the behavior of the CBAC aggressive mode in a Cisco IOS firewall?
A. Delete all half-open session
B. Re-initiate half open session
C. Complete all half open sessions make the full open session
D. Delete half-open session as needed to accommodate new connection requests

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 35 Cisco 642-504: Practice Exam
QUESTION 62
You are in charge of Securing Networks Cisco Routers and Switches in your company Given that the faO/1 interface is the trusted interface, what could be a reason for users on the trusted inside networks not to be able to successfully establish outbound HTTP connections based on the following configuration?

A. access-list on the faO/1intetface is not set.
B. The RVRULE inspection policy is not inspecting HTTP traffic.
C. access-list 104 is denying the outbound HTTP traffic.
D. The outgoing inspection rule on the fa0/1 interface is not set, ActualTests.com

Correct Answer: C Section: (none) Explanation
QUESTION 63
The Dynamic Multipoint VPN (DMVPN) feature allows users to better scale large and small IP Security (IPsec) Virtual Private Networks (VPNs) by combining generic routing encapsulation (GRE) tunnels, IPsec encryption, and Next Hop Resolution Protocol (NHRP).Referring to a DMVPN hub router tunnel interface configuration, what will fail if the ip nhrp map multicast dynamic command is missing on the tunnel interface?
A. The NHRP request and response. “Pass Any Exam. Any Time.” – www.actualtests.com 36 Cisco 642-504: Practice Exam
B. The GRE tunnel
C. The IPsec peering
D. The dynamic routing protocol.

Correct Answer: D Section: (none) Explanation
QUESTION 64
What is the objective of the Cisco SDM IPS migration tool?
A. to migrate from promiscuous mode IPS to inline IPS
B. to migrate from Cisco IOS IPS version 4.0 to Cisco IOS IPS version 5.0
C. to migrate from Cisco IOS IPS to the Cisco AIM-IPS
D. to migrate from the Cisco NM-CIDS to the Cisco AIM-IPS

Correct Answer: B Section: (none) Explanation
QUESTION 65
What OSI layers can CBAC filter on? Select all that apply.
A. Layer 4
B. Layer 3
C. Layer 2
D. Layer 7

Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 66
Which description is true about the Cisco IOS IPS configuration output shown in the following exhibit?
“Pass Any Exam. Any Time.” – www.actualtests.com 37 Cisco 642-504: Practice Exam

A. The SDF will be loaded from the IPS directory in flash.
B. The built-in signatures will be used.
C. The router is using the advanced IPS signature set.
D. The SMEs are stored in the IPS directory in flash.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 67
Router CK1 has been upgraded with the Cisco firewall IOS. Which of the following cannot be configured on a router unless the IOS Firewall feature set is installed? (Select all that apply)
A. PAM
B. Authentication Proxy
C. IDS
D. CBAC “Pass Any Exam. Any Time.” – www.actualtests.com 38 Cisco 642-504: Practice Exam

Correct Answer: ABCD Section: (none) Explanation
QUESTION 68
For the following Cisco IOS Firewall features, which one allows the firewall to function as a Layer 2 bridge on the network?
A. firewall ACL bypass
B. zone-based firewall
C. CBAC
D. transparent firewall

Correct Answer: D Section: (none) Explanation
QUESTION 69
While logged into a Company router, which of the following commands specifies that the IOS Firewall IDS engine drops packets and resets TCP connections for information signatures?
A. ip audit name auditi info attack drop reset
B. ip audit name auditi info action drop reset
C. ip audit name auditi info sig action drop reset
D. ip audit name auditi sig info drop reset

Correct Answer: D Section: (none) Explanation
QUESTION 70
Which statement best describes Cisco IOS Firewall URL-filtering services on Cisco IOS Release 12,4(15)T and later?
A. Enabling “allow mode” is required when using an external URL-filtering server.
B. Multiple URL lists and URL filter server lists can be configured on the router.
C. URL filtering with zone-based firewalls is configured using the type “inspect” parameter-map.
D. The services support Secure Computing server orWebsense server and the local URL list.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 71
You are the Cisco Configuration Assistant in your company. Which command will would you use totrigger the router to request certificates from the CA for the router RSA key pair?
A. cryptopki enroll CA-Name
B. enrollmenturl http://CA-Name:SO
C. cryptopki trustpoint CA-Name
D. cryptopki authenticate CA-Name

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 72
Which tow statements are correct according to the CLI configuration displayed in the exhibit? (Choose tow.)

A. SerialO/0/0 is the outside NAT interface.
B. access-list 1 defines the list of inside global IP addresses.
C. The overload option enables static PAT,
D. All HTTP connections to the SerialO/0/0 interface IP address will be translated to the 172.16.1.2 IP address port 8080,

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 73
The Company network is concerned about SPAM and wants to use IDS tools to prevent SPAM attacks. By default, how many message recipients must an email have for the IOS Firewall to consider it a spam attack?
A. 250
B. 500
C. 100
D. 25

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 40 Cisco 642-504: Practice Exam
QUESTION 74
Cisco Easy VPN greatly simplifies virtual private network (VPN) deployment for remote offices and teleworkers. While using Cisco Easy VPN, which three options are for entering the XAUTH username and password for establishing the VPN connection from the Cisco Easy VPN remote router? (Choose three.)
A. using an external AAA server
B. saving the XAUTH credentials to this router
C. entering the information from the router console or SDM
D. entering the information from the PC browser when browsing

Correct Answer: BCD Section: (none) Explanation
QUESTION 75
You are the Cisco Configuration Assistant in your company. You are configuring ACS 4.0 Network Access Profiles, which three things can be used to determine how an access request is classified and mapped to a profile? (Choose three)
A. Network Access Filters
B. RADIUS Authorization Components
C. the protocol types
D. advance filtering

Correct Answer: ACD Section: (none) Explanation
Explanation/Reference:
ActualTests.com
QUESTION 76
For the following Cisco IOS IPS risk rating components, which one uses a law value of 75, a medium value of 100, a high value of 150, and a mission-critical value of 200?
A. Attack Relevancy Rating
B. Promiscuous Delta
C. Target Value Rating
D. Watch List Rating

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
“Pass Any Exam. Any Time.” – www.actualtests.com 41 Cisco 642-504: Practice Exam
QUESTION 77
The security administrator at Company is seeing a large number of half opened TCP sessions, what are half open TCP sessions?
A. Sessions that were denied,
B. Sessions that have not reached the established state.
C. Sessions where the three-way handshake has been completed.
D. Sessions where the firewall detected return traffic.

Correct Answer: B Section: (none) Explanation
QUESTION 78
Which item is true about the zone-based firewall policy while configuring the zone-based firewall feature on a Cisco router?
A. The policy is appliedunidirectionally between two security zones.
B. Traffic between an interface belonging to a zone and the “self zone is denied by default unless it is explicitly allowed by a used-defined policy.
C. Interfaces in the same zone require that a bidirectional traffic policy be applied to permit traffic flow,
D. Traffic between an interface belonging to a zone and an interface that is not a zone member is allowed to pass without the policy being applied to the traffic,

Correct Answer: A Section: (none) Explanation
QUESTION 79
You are the Cisco Configuration Assistant in your company, what additional configuration is required for the Cisco IOS Firewall to reset the TCP connection if any peer-to-peer, tunneling, or instant messaging traffic is detected over HTTP based on the following configuration?
appfw policy-name my policy application http strict-http action reset alarm content-length maximum 1 action reset alarm content-type-verification match-req-rsp action reset alarm max-header-length request 1 response 1 action reset alarm max-url-length 1 laction reset alarm request-method rfc put action reset alarm transfer-encoding type default reset alarm !
ip inspect name firewall appfw mypolicy ip inspect name firewall http ! Interface FastEthernetO/0 ip inspect firewall in
A. class-map configuration
B. the PAM configuration
C. theip inspect name firewall im, ip inspect name firewall p2p, and ip inspect name firewall tunnel commands
D. the port-misuse default action reset alarm command in the HTTP application firewall policy configuration

Correct Answer: D Section: (none) Explanation Explanation/Reference:
QUESTION 80
While adding NADs as AAA clients in the ACS, which three parameters are configured for each AAA client? (Choose three,)
A. the NAD IP address
B. theEAPtype
C. the shared secret key
D. the AAA protocol to use for communication with the NADs

Correct Answer: ACD Section: (none) Explanation

We help you do exactly that with our high quality Cisco 642-504 Certification using the above training materials.Regardless of whichever computer you have, you just need to download one of the many Cisco https://www.pass4itsure.com/642-504.html PDF readers that are available for free.

Continue Reading

Cisco 642-504 Exam Demo,Free Download Real Cisco 642-504 Preparation Materials Are The Best Materials

The Newest VCE and PDF! As we know,only valid and newest Cisco 642-504 Flydumps vce can help you a lot in passing the exam. Just try Flydumps Cisco 642-504 latest vce and pdf, which are authenticated by expert and covering every aspect of Cisco https://www.pass4itsure.com/642-504.html exam.100% money back guarantee!

QUESTION 40
Which action does the interface configuration command switchport protected enable?
A. groups ports into an isolated community when configured on multiple ports
B. configures the interface for the PVLAN edge
C. provides isolation between two protected ports located on different switches PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-504
D. allows traffic on protected ports to be forwarded at Layer 2

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 41
What configuration task must you perform prior to configuring private VLANs?
A. enable port security on the interface
B. associate all isolated ports to the primary VLAN
C. set the VTP mode to transparent
D. configure PVLAN trunking

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 42
When deploying 802.1X authentication on Cisco Catalyst switches, what are two possible options for authenticating the clients that do not have an 802.1X supplicant? (Choose two.)
A. MAC Authentication Bypass
B. Active Directory Single Sign-On
C. authentication proxy
D. web authentication
E. Protected EAP

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 43
When implementing EIGRP dynamic routing over DMVPN, what are three configuration tasks required at the hub router tunnel interface? (Choose three.)
A. disabling EIGRP ip next-hop-self
B. disabling EIGRP ip split-horizon
C. disabling EIGRP auto-summary
D. disabling EIGRP stub
E. enabling multipoint GRE
F. configuring the NHRP next-hop server IP address

Correct Answer: ABE Section: (none) Explanation
Explanation/Reference:
QUESTION 44
Refer to the exhibit.
What is wrong with the GRE over IPsec configuration shown?

PassGuide.com-Make You Succeed To Pass IT Exams
PassGuide 642-504
A. The crypto map is not correctly configured.
B. The crypto ACL is not correctly configured.
C. The network 172.16.0.0 command is missing under router eigrp 1 .
D. ESP transport mode should be configured instead of using the default tunnel mode.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 45
When you configure Cisco IOS WebVPN, you can use the port-forward command to enable which function?
A. web-enabled applications
B. Cisco Secure Desktop
C. full-tunnel client
D. thin client
E. CIFS
F. OWA

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 46
Which three of these statements are correct regarding DMVPN configuration? (Choose three.)
PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-504
A. If running EIGRP over DMVPN, the hub router tunnel interface must have “next hop self” enabled: ip next-hop-self eigrp AS-Number
B. If running EIGRP over DMVPN, the hub router tunnel interface must have split horizon disabled: no ip split-horizon eigrp AS-Number
C. The spoke routers must be configured as the NHRP servers: ip nhrp nhs spoke-tunnel-ip-address
D. At the spoke routers, static NHRP mapping to the hub router is required: ip nhrp map hub-tunnel-ip-address hub-physical-ip-address
E. The GRE tunnel mode must be set to point-to-point mode: tunnel mode gre point-to-point
F. The GRE tunnel must be associated with an IPsec profile: tunnel protection ipsec profile profile-name

Correct Answer: BDF Section: (none) Explanation
Explanation/Reference:
QUESTION 47
Refer to the exhibit.
What is wrong with the partial IPsec VPN high-availability configuration shown here?
A. A static crypto map should be used instead of a dynamic crypto map.
B. The crypto map CM interface configuration statement is missing the stateful option.
C. The crypto map interface configuration statement should reference the dynamic crypto map DM.
D. IPsec is not synchronized with HSRP.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 48
You are an administrator configuring a Cisco router to enroll with a certificate authority. What is a recommended best practice to perform prior to configuring enrollment parameters?
A. Contact the registration authority to obtain the enrollment URL.
B. Manually verify the PKCS #10 certificate prior to enrollment.
C. Configure the certificate revocation list to ensure that you do not receive revoked CA certificates.
D. Configure Network Time Protocol.
E. If using SCEP, ensure that TCP port 22 traffic is permitted to the router.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-504
QUESTION 49
DMVPN configuration uses which tunnel mode type on the tunnel interface?
A. DVMRP
B. IPsec IPv4
C. NHRP
D. GRE multipoint

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 50
Refer to the exhibit.
What is true regarding the IKE security association?
A. The IPsec connection is in an idle state.
B. The IKE association is in the process of being set up.
C. The IKE status is authenticated.
D. The ISAKMP state is waiting for quick mode status to authenticate before IPsec parameters are passed between peers.

Correct Answer: C Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
When configuring a Cisco Easy VPN server, what must be configured prior to entering VPN configuration parameters?
A. AAA
B. ISAKMP peer authentication method
C. XAuth
D. SSH
E. crypto ACL
F. NTP

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 52
Which parameter is configured under the router(config-isakmp)# configuration mode?
A. use of digital certificates for authentication
B. the IPsec transform set
C. the reference to the crypto ACL PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-504
D. the IPsec peer IP address
E. the pre-shared key value

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 53
Which two statements are correct regarding Network Address Translation and IPsec interoperability? (Choose two.)
A. ESP does not work with NAT.
B. AH does not work with NAT.
C. ESP does not work with PAT.
D. NAT-T uses TCP port 4500.
E. NAT-T sends NAT discovery packets after IKE Phase 2 establishment.

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 54
If the show crypto isakmp sa output shows a state of “QM_IDLE” with the “Active” status, what does that most likely indicate?
A. IKE Phase 1 quick mode negotiation has failed.
B. The security association is waiting for the timeout to expire before retrying the ISAKMP SA establishment.
C. An ISAKMP SA exists.
D. Peer authentication has failed during IKE Phase 1.
E. IKE Phase 1 is in the negotiation state.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 55
Which Cisco IOS IPS risk rating component uses a low value of 75, a medium value of 100, a high value of 150, and a mission-critical value of 200?
A. Signature Fidelity Rating
B. Attack Severity Rating
C. Target Value Rating
D. Attack Relevancy Rating
E. Promiscuous Delta
F. Watch List Rating

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 56
In DMVPN, the NHRP process allows which requirement to be met?
A. dynamic physical interface IP address at the spoke routers
B. high-availability DMVPN designs PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-504
C. dynamic spoke-to-spoke on-demand tunnels
D. dynamic routing over the DMVPN
E. dual DMVPN hub designs

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 57
When deploying 802.1X authentication on Cisco Catalyst switches, which traffic can be passed between the client PC and the Cisco Catalyst switch over the uncontrolled port?
A. RADIUS
B. TACACS+
C. HTTP
D. DHCP
E. EAPoLAN
F. CDP

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 58
Refer to the exhibit.
Which two configuration commands are used to apply an inspect policy map for traffic traversing from the
E0 or E1 interface to the S3 interface? (Choose two.)
A. zone-pair security test source Z1 destination Z2
B. interface E0
C. policy-map myfwpolicy class class-default inspect
D. ip inspect myfwpolicy out
E. ip inspect myfwpolicy in
F. service-policy type inspect myfwpolicy

Correct Answer: AF Section: (none) Explanation
Explanation/Reference:
QUESTION 59
Cisco IOS SSL VPN thin-client mode has which two characteristics? (Choose two.)
A. uses a Java applet
B. supports TCP and UDP applications that use static port(s) PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-504
C. provides full tunnel access like the IPsec VPN software client
D. requires the use of browser plug-ins
E. provides TCP port forwarding capabilities

Correct Answer: AE Section: (none) Explanation
Explanation/Reference: QUESTION 60
Refer to the exhibit.
Which optional AAA or RADIUS configuration command is used to support 802.1X guest VLAN
functionality?
A. aaa authentication dot1x default group radius
B. aaa authorization network default group radius
C. aaa accounting dot1x default start-stop group radius
D. aaa accounting system default start-stop group radius
E. radius-server host 10.1.1.1 auth-port 1812 acct-port 1813

Correct Answer: B Section: (none) Explanation
Explanation/Reference:

We provide thoroughly reviewed Cisco 642-504 using the training resources which are the best for Cisco https://www.pass4itsure.com/642-504.html,and to get certified by Microsoft Windows Store apps.It is a best choice to accelerate your career as a professional in the Information Technology industry. Now we add the latest Cisco 642-504 content and to print and share content.

Continue Reading