From now on, you can quickly and easily pass the Cisco 642-871 Certification exam by FLYDUMPS while retaining the how-to and know-how involved in learning the skills covered in the Cisco 642-871 practice exam. Passing Cisco 642-871 exam will clear the path to future Riverbed exam success and instantly enhance your career. FLYDUMPS Cisco 642-871 exam sample questions ensure your success in high score. FLYDUMPS has played a key role in shaping my career. Doing upgrade from unlimited access package towards the Cisco 642-871 practice exam was a good step.
QUESTION 124
Which type of classification mechanism does the Cisco IP phone use?
A. ISL
B. Q.931
C. G.729a
D. 802.1p/Q
E. Spanning Tree
Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
Streaming video applications, such as IPTV video on demand (VoD) programs, are relatively high bandwidth applications with a high tolerance for loss, delay, and delay variation. As such, significant QoS tools are not required to meet the needs of these applications. However, in most enterprise environments, these types of applications are considered more important than regular background applications (such as e-mail and web browsing) and should be given preferential treatment. A Layer 2 classification of CoS 1 in 8021.Q/802.1p environments should be used for these applications.
Reference: Arch student guide p.7-48
QUESTION 125
What problem does WFQ introduce when used in networks that have delay sensitive traffic like voice and video?
A. WFQ weights by giving preference to TCP-based flows whereas voice and video is UDP/RTP-based.
B. WFW weights by giving preference to UDP-based flows whereas voice and video is TCP/RTP-based.
C. WFQ becomes too fair in the presence of many flows so that an individual flow might not get enough bandwidth.
D. WFQ provides configuration settings that only permit data traffic, which is the root cause of WFQ’s inability to provide good service to voice and video traffic.
Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
WFQ is to fair.
WFQ classifies traffic into different flows based on such characteristics as source and destination address,
protocol, and port and socket of the session. WFQ is a default queueing discipline on links at and below
2.048 Mbps.
QUESTION 126
What is one of the reasons that custom QoS ACLs are recommended over automatic QoS when configuring ports on a Catalyst 6500 for use with IP phones?
A. 79xx IP phones do not automatically mark voice packets with non-zero DSCP values.
B. 79xx IP phones do not mark protocol packets such as DHCP, DNS or TFP with non-zero DSCP values.
C. 79xx IP phones do not mark voice packets with optimal DSCP values.
D. 79xx IP phones use a custom protocol to communicate CDP information to the switch.
Correct Answer: C Section: (none) Explanation
QUESTION 127
When working in a Cisco environment, which of the following models would be utilized when you connect to a PBX system that uses non-standard signaling?
A. Translate model
B. Cross over model
C. Interprete model
D. Transport model
E. Trans-cross model
Correct Answer: A Section: (none) Explanation
QUESTION 128
Both incoming and outgoing calls for a voice system are governed by rules. Which set of rules governs the handling of voice system calls?
A. Voice plan
B. Route plan
C. Route pattern
D. Dial pattern
E. Call handler
F. Dial plan
Correct Answer: F Section: (none) Explanation
QUESTION 129
You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know in which of the following Frame Relay PVC configurations that are able to carry both voice and data, is the potential voice load better understood and partially isolated from the data load.
What would your reply be?
A. Simplex PVCs
B. Separate PVCs
C. Half Duplex PVCs
D. Duplex PVCs
E. Combined PVCs
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 130
Your newly appointed Certkiller trainee wants to know which codec you would recommend for higher quality voice over a data network. What would your reply be?
A. G.711
B. G.714
C. G.723
D. G.726
E. Q.728
F. G.729
Correct Answer: A Section: (none) Explanation
QUESTION 131
What is the default setting that the Cisco IP phone employs to set the CoS/ToS value for voice packets?
A. 1
B. 3
C. 5
D. 7
E. None of the above.
Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
Ports that are in the data VLAN have a default class of service (CoS) of zero. Ports that are a member of the voice VLAN have a default CoS of 5
Reference: Arch student guide p.11-49
QUESTION 132
Bandwidth used by active calls can be delimited by which of the following types of Call Admission in the Control Manager?
A. Departments
B. Regions
C. Partitions
D. Locations
E. Device Pools
F. All of the above
Correct Answer: D Section: (none) Explanation
QUESTION 133
In a voice system, what set of rules governs the handling of incoming and outgoing calls?
A. A dial plan
B. The route table
C. The dial pattern
D. A call handler
E. A route pattern
Correct Answer: E Section: (none) Explanation
QUESTION 134
With regard to voice calls, which tool is used to reduce IP header size?
A. cRTP
B. RTCP
C. Transcoder
D. Coded (compression / decompression)
E. A and D
Correct Answer: A Section: (none) Explanation
Explanation/Reference: Explanation:
Header Compression – Compresses a header at various layers of the Open System Interconnection (OSI) reference model. Examples include Transmission Control Protocol (TCP) header compression, compressed RTP (cRTP), and compressed Internet Protocol/User Datagram Protocol (IP/UDP).
QUESTION 135
What type of protocol is SIP?
A. Peer-client
B. Server-peer
C. Peer-to-peer
D. Client-server
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
SIP stands for Session Initiation Protocol. SIP was published as a proposed standard by the Internet Engineering Task Force (IETF) in 1999. It is a signaling protocol for multimedia session control. This includes signaling for voice, data, and video sessions between just two parties or for multiparty conferencing sessions. SIP end-points negotiate the media parameters using Session Description Protocol (SDP). SDP allows the SIP terminal or application to negotiate media type (audio, video or data), transport protocol (RTP), and media encoding method. Unlike the switched circuit network of today, IP networks developed using SIP will easily support the concepts of presence, availability, and mobility since it is part of the SIP standard.
The IETF defines standard behavior for key SIP Server elements such as registration, redirect and proxy servers. SIP registration servers allow users to register with the SIP network using a SIP address that is similar to a URL or Web site location. Once a user registers, the local SIP proxy server routes messages on behalf of the user to the proper destination address. The SIP redirect server is a special server that returns a new or changed address for the destination party that may have temporarily changed locations (from work to home for example). Each of these servers have a particular behavior defined in the IETF standard and maintain session state information in a standard manner, leading to interoperability.
SIP’s main advantages over H.323 are its extensibility and flexibility for adding new features. H.323 is a more complex architecture and uses binary encoding of message parameters. The simplicity of SIP makes it easier to develop and debug applications leading to lower product costs for equipment providers.
The SIP client-server and header format design is based on proven Internet standards such as Hyper Text Transfer Protocol (used on commercial web servers) and Simple Mail Transfer Protocol (used for internet e-mail services). The Client-Server design means that each SIP request will result in a well-defined set of SIP responses. This modular design makes it easy to extend SIP to support new operations by simply adding a new request (or SIP Method) and its corresponding response message. Because SIP is text based, it is easy to parse the various SIP commands.
QUESTION 136
When enabling traffic shaping on a Frame Relay interface supporting voice and data, which three parameters should be configured to protect voice traffic? (Choose three)
A. Bt
B. Bc
C. Be
D. CIR
E. LMI
F. DLCI
Correct Answer: BCD Section: (none) Explanation
QUESTION 137
Your boss at Certkiller.com is curios as to which type of applications benefit from IP Multicast.
What should you tell her? (Select three).
A. Low bandwidth streaming applications with many simultaneous users
B. High bandwidth web serving applications
C. Video-on-demand served from the Internet
D. Scheduled classes delivered using IP-TV over multiple LAN/WAN connections
E. Live radio broadcasts delivered over multiple LAN/WAN connections
F. High bandwidth, high volume transactional applications
Correct Answer: ADE Section: (none) Explanation
QUESTION 138
You are a technician at Certkiller.com. Your newly appointed Certkiller trainee Jack wants to know which of the following are considerations to using IP Multicast delivery.
What would your reply be? (Select two.)
A. No congestion avoidance.
B. Not for bandwidth intensive applications.
C. No guaranteed delivery mechanism.
D. Source sends multiple data streams out each interface.
E. Ordered delivery of packets.
Correct Answer: CE Section: (none) Explanation
QUESTION 139
What are potential issues when using PIM-SM for multicast networks? (Choose two)
A. Not effective for dense distribution of receivers.
B. Easy to troubleshoot.
C. Unicast routing protocol dependent.
D. Requires an RP for the initial distribution.
E. RPs can become bottlenecks unless carefully placed.
Correct Answer: DE Section: (none) Explanation
Explanation/Reference: Explanation:
Potential issues with PIM-SM include:
1) PIM-SM requires an RP during the initial setup of the distribution tree (it can switch to the shortest-path
tree once RP is established and determined as optimal). RPs can become bottlenecks if not selected with
great care.
2) PIM-SM’s complex behavior is difficult to understand and therefore difficult to debug.
Reference: Arch student guide p.8-29
QUESTION 140
You are a technician at Certkiller.com. Your newly appointed Certkiller trainee wants to know which of the following are considerations to using IP Multicast delivery.
What would your reply be? (Choose Two.)
A. No congestion avoidance.
B. Low end routers in use.
C. No guaranteed delivery mechanism.
D. Source sends multiple data streams out each interface.
E. Ordered delivery of packets.
F. Not for bandwidth intensive applications.
Correct Answer: CE Section: (none) Explanation
QUESTION 141
You are the network administrator at Certkiller.Your newly appointed Certkiller trainee wants to know what the source address of IP multicast traffic is.
What will your reply be?
A. The assigned IP address of the source host
B. A reserved link address in the 224.0.0.0/24 LCP block
C. A GLOP address with an embedded AS number assigned to the source organization
D. A source-specific (SSM) address in the 232/8 block
Correct Answer: A Section: (none) Explanation
QUESTION 142
What are the characteristics of an IP Multicast source distribution tree? (Choose three)
A. Sub-optimal paths from source to all receivers.
B. Minimal memory utilization on multicast routers.
C. Router maintenance of complete path information for each source.
D. Optimal path from source to each receiver.
E. Reduced latency when compared to shared distribution trees.
F. Single root RP forwarding of all source traffic.
Correct Answer: CDE Section: (none) Explanation
Explanation/Reference: Explanation:
IP Multicast Source Distribution Trees:
1) Uses more memory (Router maintenance of complete path information for each source)
2) Supports optimal paths from source to all receivers
3) Minimizes delay
Reference: Arch student guide p.8-20
QUESTION 143
What are two potential issues when using PIM-SM for multicast networks? (Choose two)
A. Not effective for dense distribution of receivers.
B. Easy to troubleshoot.
C. Unicast routing protocol dependent.
D. Requires an RP for the initial distribution.
E. RPs can become bottlenecks unless carefully placed.
Correct Answer: DE Section: (none) Explanation
Explanation/Reference: Explanation:
Potential issues with PIM-SM include:
1) PIM-SM requires an RP during the initial setup of the distribution tree (it can switch to the shortest-path
tree once RP is established and determined as optimal). RPs can become bottlenecks if not selected with
great care.
2) PIM-SM’s complex behavior is difficult to understand and therefore difficult to debug.
Reference: Arch student guide p.8-29
QUESTION 144
Which of the following components would you most probably encounter in the VPN/Remote Access module? (Choose three.)
A. ISDN
B. IDS
C. Firewall
D. PSTN
E. Access server
F. All of the above.
Correct Answer: BCE Section: (none) Explanation
QUESTION 145
Which VNP management characteristic would you use when you want to make sure that the network in operation has the least disruption of service when topology changes are made?
A. Auto setup
B. Remote management
C. Dynamic reconfiguration
D. Automatic reconfiguration.
E. Path MTU discovery
Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
Dynamic reconfiguration: All configuration changes should take effect without requiring a reboot of the
device.
Disruption of service with a fully loaded VPN device can potentially impact thousands of individual users.
Reference: Arch student guide p.9-17
QUESTION 146
Your newly appointed Certkiller trainee wants to know which protocol at Layer 3 can be used to provide data integrity, privacy, and security on an IP based VPN.
What would your reply be?
A. GRE
B. PKI
C. IPSec
D. L2TP
E. Kerberos
F. MD5
Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
IPSec is a set of standards that specify various options for providing VPN data privacy. Packet authentication protects the information flow from being tampered with or even repeated, thereby minimizing disruption to the communication. An IPSec networking architecture has been specifically designed to address these issues. The framework set forth by the IPSec working group, Internet Engineering Task Force (IETF), pofides data integrity checks for tamper detection, source address verification, and data privacy for the packet data nad data path.
Reference: Arch student guide p.9-9.
QUESTION 147
You are contracted as a network administrator the company, Certkiller Ltd. Recently you received complaints by users that they are experiencing performance problems on the company’s site-to-site VPN network. Upon investigating the complaints you find that the VPN connection uses IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links.
What can be done to address this problem successfully? (Choose two.)
A. Employ path MTU discovery.
B. Set the MTU value to 1400 bytes.
C. Reset the MTU value to lower than 1400 bytes.
D. Set the MTU higher than 1500 bytes.
E. Turn off pre-fragmentation for IPSec.
F. None of the above.
Correct Answer: AB Section: (none) Explanation
QUESTION 148
You are the network administrator at Certkiller. Which Cisco Works VPN/Security Management Solution will you use to gain access to devices and the displays that will show their real-time status as well as their operational and configuration functions through a web browser?
A. Resource Manager (RME)
B. VPN Monitor
C. Cisco View
D. Omni-vision
E. IDS Host Sensor
Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation:
The CiscoWorks VPN/Security Management Solution includes VPN Monitor.
VPN Monitor: Collects, stores, and reports on IPsec-based site-to-site and remote-access VPNs. VPN
Monitor supports the Cisco VPN concentrators and routers.
Reference: Arch student guide p.9-19.
QUESTION 149
Which network management tool helps network administrators develop and maintain new and existing traffic filters on Cisco devices?
A. CiscoView
B. ACL Manager
C. Cisco Netsys
D. Resource Manager
Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
ACL Manager manages the access lists of Cisco devices. ACLM provides tools to set up and manage IP and IPX filtering and device access control. These tools include: access list editors, policy template managers, network and service class managers for scalability, access list navigation tools for troubleshooting, optimization of access lists, and automated distribution of access list updates.
Reference: Arch student guide p.4-25
QUESTION 150
You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what the device weight limit per CallManager in a Cisco IP phone configuration would be.
What would your reply be?
A. 800
B. 5000
C. 6500
D. 2500
Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
The clustering option relate to the grouping of devices, usually phones and gateways. With the limits imposed on a single CallManager (device weights of 5,000 per CallManager, not IP phones) and good design practices, the minimum configuration consists of two CallManagers, which will support up to 2,500 IP phones. Cisco recommends four CallManagers to support 5,000 IP phones and up to six CallManagers to support up to 10,000 IP phones.
Reference: Arch student guide p.11-28
QUESTION 151
Which of the following signaling techniques is used amongst CallManager clusters for intercluster calls?
A. SS7
B. H.323
C. MGCP
D. BRI2
Correct Answer: B Section: (none) Explanation
QUESTION 152
You are a technician at Certkiller. Your newly appointed Certkiller trainee wants to know what the maximum number of CallManager servers you can have in a cluster is.
What would your reply be?
A. 3
B. 7
C. 8
D. 56
Correct Answer: C Section: (none) Explanation
QUESTION 153
With Call Manager v3.1, what is the maximum number of servers in a Cluster?
A. 3
B. 6
C. 7
D. 8
Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
The primary advantage of the distributed call processing model is that, by using local call processing, it provides the same level of features and capabilities whether the IP WAN is available or not. Each site can have from one to eight Cisco CallManager servers in a cluster based on the number of users.
Reference: Arch student guide p.11-43
QUESTION 154
Which three are used in configuration Call Manager dial plans? (Choose three)
A. Route list
B. Route group
C. Gateway list
D. Route keeper
E. Route pattern
F. First digit pattern
Correct Answer: ABE Section: (none) Explanation QUESTION 155
Which of the following are functions form part of Web Cache Communication Protocol (WCCP)? (Choose four.)
A. Fault tolerance
B. Network address translation
C. Load balancing
D. Scalability
E. Remote management
F. Service assurance
G. Redundancy allowance
Correct Answer: ACDF Section: (none) Explanation
Explanation/Reference: Explanation:
Cisco routers and switches incorporate Web Cache Communication Protocol (WCCP) software to enable content routing capabilities. Additionally, Cisco offers content routers specifically designed to support large-scale mirrored web sites. Content routing routes user requests to the replicated-content site (typically a mirror site) that can serve them most quickly and efficiently. The content routing software redirects a user request to the closest (best) replicated-content site, based on network delay, using a software process called boomerang. The content routing software load balances up to 500 sites for each domain it is configured to support.
Reference: Arch student guide p.12-6
QUESTION 156
Mentioned below are several tools. Which of them is a web-browser based tool designed to provide administrative access for content networking?
A. Cisco CallManager
B. Hypertext Administration Design (HAD)
C. Access Point
D. Content Distribution Manager (CDM)
E. Self-Organizing Distributed Architecture (SODA)
F. Web Cache Communication Protocol (WCCP)
Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
The Cisco Content Distribution Manager (CDM) is a web-browser-based tool that provides the administrative function for content networking. With the CDM, you can configure and monitor Content Engines, import and preview media, and generate media URLs for access from web sites. You also set maximum bandwidth usage over the WAN from the CDM to the remote Content Engines, as well as maximum LAN bandwidth usage from the Content Engines to end-user desktops.
Reference: Arch student guide p.12-9
QUESTION 157
You are a technician at Certkiller. You were instructed to place Content Engines on the Certkiller network.
Where would you place it when you are dealing with transparent caching?
A. Close to the servers.
B. Behind the main server.
C. At the Internet edge.
D. In front of web server farms.
E. Close to the end users.
Correct Answer: E Section: (none) Explanation
We provide Cisco 642-871 exam help and information on a wide range of issues. Cisco 642-871 is professional and confidential and your issues will be replied within 12 hous.Cisco 642-825 exam free to send us any questions and we always try our best to keeping our Customers Satisfied.