Download Cisco 640-864 Vce Exams Cisco 640-864 Dumps Practice Test – Popular Exams

The actual Cisco exam questions and answers will sharpen your skills and expand your knowledge to obtain a definite your money and time on your preparation for your Cisco 640-864 certification exam. You will find we are a trustful partner if you choose us as your assistance on your Cisco 640-864 certification exam. Now we add the latest Cisco 640-864 content and to print and share content.

Exam A
Which two capabilities of NetFlow accounting assist designers with network planning? (Choose two.)
A. the monitoring of processor time on network devices
B. the calculation of packet and byte counts of network traffic
C. the decoding and analyzing of packets
D. the presentation of a time-based view of application usage on the network
E. the monitoring of user network utilization
Correct Answer: BE
What is the benefit of deploying a gatekeeper in an H.323 IP telephony network.?
A. provides spatial redundancy through the use of HSRP
B. provides load balancing via GUP when alternate gatekeepers are deployed
C. reduces configuration complexity by centralizing the dial plan
D. increases redundancy by allowing each gateway to maintain a copy of the dial plan
Correct Answer: C
An organization needs a WAN Transport technology that meets these criteria:
-Has a low initial cost
-Provides low-to-medium BW

Has medium-to-high latency and jitter Which technology would you suggest?



analog modem


Correct Answer: D

Which Cisco security solution offers protection against “day zero” attacks?
A. Cisco IOS IPS
B. Cisco IOS Firewall
C. Cisco Traffic Anomaly Detector
D. Cisco Adaptive Security Appliance
E. Cisco Security Agent
Correct Answer: E

Which type of trunk is required in order to connect a fax machine to a PBX?
A. intra-office
B. Foreign Exchange Office
C. central office
D. Foreign Exchange Station
E. inter-office
Correct Answer: D
Which H.323 protocol controls call setup between endpoints? The safer , easier way to help you pass any IT exams.
B. H.245
C. H.225
Correct Answer: C
Which two of these represent a best practice implementation of a Split MAC LWAPP deployment in a Cisco Unified Wireless Network? (Choose two.)
A. Each wireless client authentication type maps to a unique SSID Which in turn maps to a unique VLAN.
B. 802.1Q trunking extends from the wired infrastructure to the access point for translation into SSID(s).
C. 802.1Q trunking extends from the wired infrastructure to a wireless LAN controller for translation into SSID(s).
D. Each wireless client authentication type maps to a shared SSID Which in turn maps to a common shared VLAN.
E. Each wireless client authentication type maps to a unique SSID Which in turn maps to a common shared VLAN.
F. 802.1Q trunking extends from the wired infrastructure to a wireless LAN controller. Then the 802.1Q packet is encapsulated in LWAPP and sent to the access point for transmission over the SSID(s).
Correct Answer: AC
Which two statements best describe intradomain route summarization? (Choose two.)
A. EIGRP and OSPF must be manually configured to summarize at non-classful boundaries.
B. EIGRP and OSPF automatically summarize at classful network boundaries.
C. OSPF and RIP automatically summarize at classful network boundaries.
D. EIGRP and RIP automatically summarize at classful network boundaries.
E. EIGRP and OSPF automatically summarize at non-classful boundaries.
Correct Answer: AD

Which two VoIP characteristics are affected most by codec choice? (Choose two.)
A. voice quality
B. voice packet header size
C. bandwidth required for voice calls
D. silent packet handling
Correct Answer: AC
A network design document is being prepared for a customer. Which three network design elements must be included? (Choose three.)
A. proof of concept
B. data sources
C. design details
D. organizational policies
E. implementation plan
Correct Answer: ACE
Which of these accurately describes dial backup routing?
A. it always uses distance vector routing protocols
B. once the backup link is activated it will remain active even after the primary link is restored
C. it always uses permanent static routes
D. it is supplied by the service provider as a secondary PVC at no additional charge
E. the router intiates the dial backup link when a failure is detected on the primary link
Correct Answer: E
Which statement correctly describes queuing in environments supporting teleworkers?
A. Queuing occurs on the outbound interface.
B. Hardware queues are configured for appropriate PQ, CQ, or WFQ.
C. Priority queuing guarantees some level of service to all traffic.
D. WFQ is the Cisco IOS default on all WAN links regardless of speed.
E. CQ is for time-sensitive protocols.
Correct Answer: A
Which two techniques can reduce voice packet transfer delay across a link of less than 512 kbps? (Choose two.)
A. deploy LFI
B. increase link bandwidth
C. extend the trust boundary
D. deploy software compression
E. increase queue depth
Correct Answer: AB
Drag and Drop A.

Correct Answer:
Your company uses OSPF for internal routing. The company will be connected to VendorA via a single
dedicated link and to VendorB via redundant dedicated links. Both vendors also use OSPF for internal
Which of the following deployments describes the best intra-domain routing practice in this situation?

A. Redistribute the routes on each link between your company and the vendors to a shared EIGRP routing protocol.
B. Use IBGP to reach VendorA and EBGP to reach VendorB.
C. Use static routes to reach VendorA and EBGP to reach VendorB.
D. Use static routes to reach both VendorA and VendorB.
E. Connect your company to both VendorA and VendorB using existing OSPF.
Correct Answer: C

Which statement can a network designer use to describe route summarization to an IT manager?
A. It is the grouping of ISP network addresses to minimize the number of routes to the Internet.
B. It is the grouping of multiple discontiguous subnets to increase routing performance.
C. It is the grouping of multiple contiguous networks and advertising as one large network.
D. It is the grouping of multiple contiguous subnets into one Class A, B, or C IP address to minimize
routing table size. Correct Answer: C QUESTION 17
Refer to the exhibit.

All primary links are T1s. The customer wants to have a backup to each remote office from the
Headquarters office.
Which two types of backup links would be viable solutions? (Choose two.)

A. dial backup routing
B. shadow SVC
C. permanent secondary WAN link

Correct Answer: AC
A Cisco SONA architecture layer is described as follows:
The layer’s IT resources are interconnected across a converged network foundation. The layer’s IT
resources include servers, storage, and clients. The layer represents how resources exist across the
The customer objective for the layer is to have anywhere/anytime connectivity. Which Cisco SONA
architecture layer is being described?

A. Application
B. Integrated Transport
C. Physical
D. Networked Infrastructure
E. Interactive Services
Correct Answer: D QUESTION 19

Which information should a network summary report identify?
A. actions needed to support the existing network
B. customer requirements
C. new network features
D. customer requirement modifications
E. actions needed to support existing network features
F. infrastructure shortcomings
Correct Answer: F
Given a VoIP network with these attributes:
Codec: G.711 WAN bandwidth: 768Kbps Packet Header: 6 bytes Payload: 160 bytes CRTP: No How
many calls can be made?

A. 7 calls
B. 13 calls
C. 8 calls
D. 9 calls
E. 11 calls
Correct Answer: E
What are three valid methods of gathering information about an existing data network? (Choose three.)
A. Use organizational input.
B. Analyze the user-mapping of a running application.
C. Perform a traffic analysis.
D. Perform a packet-level audit to verify carrier service guarantees.
E. Use reports that analyze the metrics of the customer’s existing network.
F. Perform a network audit to gather more detail about the network.
Correct Answer: CEF
Which two of these are required for wireless client mobility deployment when using a Cisco Unified Wireless Network? (Choose two.)
A. matching RF power
B. matching security
C. assigned master controller
D. matching mobility group name
E. matching RF channel
F. matching RF group name
Correct Answer: BD

In the Cisco branch office design, what categorizes an office as large?
A. between 50 and 100 users and a single-tier design
B. between 100 and 200 users and a three-tier design
C. between 50 and 100 users and a three-tier design
D. over 200 users and a two-tier design
E. between 100 and 200 users and a two-tier design
Correct Answer: B
A company is designing a worldwide IPv6 network with duplicated file servers at multiple locations. Each file server contains identical reference information. Which IPv6 address type would be used to allow each end station to send a request to the nearest file server using the same destination address, regardless of the location of that end station?
A. broadcast
B. multicast
C. anycast
D. unicast
Correct Answer: C
When designing using the Cisco Enterprise Architecture, in Which Enterprise Campus layer do the Enterprise Edge and Enterprise WAN modules establish their connection?
A. Building Access
B. Building Distribution
C. Campus Core
D. Enterprise Branch
E. Enterprise Data Center
Correct Answer: B
Which three of these describe the best practice for Cisco wireless outdoor Mesh network deployment? (Choose three.)
A. mesh hop counts of 4 or fewer
B. RAP implemented with 20 or fewer MAP nodes
C. client access via 802.11a and backhaul with 802.11b/g
D. client access via 802.11b/g and backhaul with 802.11a
E. mesh hop counts of 8 to 4
F. RAP implemented with 20 to 32 MAP nodes
Correct Answer: ADF
The Cisco Data Center Network Architecture comprises Which two Cisco SONA layers? (Choose two.)
A. Collaboration Applications
B. WAN/Internet
C. Interactive Services
D. Network Infrastructure
E. Business Applications
Correct Answer: CD
Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.)
A. reduces dial infrastructure expenditures
B. reduces the number of physical connections
C. allows networks to be set up and restructured quickly
D. simplifies the underlying structure of a customer WAN
E. extends the network to remote users
Correct Answer: AB
You are designing a small branch office that requires these attributes: support for 60 users the growth capacity to add another 15 users soon redundant access higher bandwidth between the Layer 2 switch and routing to the WAN Which branch office topology or technology must be used?
A. EtherChannel
B. loop-free
C. three-tier
D. two-tier
E. integrated routing and switching
Correct Answer: A
Western Associated News Agency recently acquired a large news organization with several sites, Which
will allow it to expand to worldwide markets. The new acquisition includes these connectivity technologies:
Frame Relay ATM SONET cable DSL wireless
From a Layer 1 viewpoint,
Which Enterprise Edge module will be most affected?

A. Internet Connectivity
B. E-Commerce
D. Edge Distribution
Correct Answer: F

Which two implementation plan principles best describe how to deal with potential failures? (Choose two.)
A. A table of failure points, rollback steps, and estimated rollback times.
B. A good implementation plan.
C. A test should be included at every step.
D. A detailed rollback procedure for each implementation step.
E. A successful test network test.
Correct Answer: CD
Drag and Drop A.

Correct Answer:
Refer to the exhibit.

You are documenting the existing network of a customer with a large installed Cisco network. The routers
listed are in use on the network.
Which two additional pieces of information would be the most valuable in completing your documentation
of these routers? (Choose two.)

A. software revisions
B. interface options
C. power requirements
D. error statistics
E. management protocols
Correct Answer: AB
Which of these is the next step after the design phase in the PPDIOO process?
A. Develop a high-level migration plan.
B. Develop the implementation plan in as much detail as possible.
C. Create a pilot or a prototype network.
D. Identify Which network management protocol will be used for Which function.
E. Order the equipment.
Correct Answer: B
You are designing IPv6 into an existing IPv4 network.
Which two strategies can you use to allow both address schemes to coexist, thus facilitating migration?
(Choose two)

A. translate one protocol into the other
B. redistribute between IPv6-capable and non-IPv6-capable routing protocols
C. encapsulate IPv6 packets within IPv4 packets
D. bridge between the IPv6 and IPv4 networks
E. enable anycast capability in the routing protocol

Correct Answer: AC
A network is being designed to meet the requirements listed.
Within the enterprise network:
All routers are Cisco 3800 Series routers running the latest Cisco IOS release.
The fastest convergence time possible is required.
Unequal cost load-balancing is required.
For Internet connections:
A single link is used to connect to a single ISP.Which two routing protocols should be used?(Choose two.)

A. Use Internal BGP as the IGP within the enterprise.
B. Use Static (Default) routing between the enterprise and the ISP.
C. Use OSPF as the IGP within the enterprise.
D. Use EIGRP as the IGP within the enterprise.
E. Use EIGRP between the enterprise and the ISP.
F. Use External BGP between the enterprise and the ISP.

Correct Answer: BD
Which two statements best describe Cisco Wireless LAN Guest Access in a Cisco Unified Wireless Network? (Choose two.)
A. Dedicated guest VLANs are only extended to the wireless controllers in the network to ensure path isolation.
B. Guest tunnels have limitations on Which wireless controllers can originate the tunnel.
C. Dedicated guest VLANs are extended throughout the network to the access points for path isolation.
D. Guest tunnels can originate and terminate on any wireless controller platform.
E. Guest tunnels have limitations on which wireless controllers can terminate the tunnel.
F. Dedicated guest access in the DMZ extends from the origination to the termination controllers without dedicated guest VLANs.
Correct Answer: EF
Refer to the exhibit.

Which statement accurately represents the characteristics of the core layer in this design?
A. Access lists should be used in the core to perform packet manipulation.
B. QoS should be performed only in the core.
C. Load balancing should never be implemented or used in the core.
D. It is acceptable to use a partial mesh in the core if it is connected to each device by multiple paths.
E. Policy-based traffic control is implemented in the core to enable prioritization, ensuring the best performance for all time-critical applications.

Correct Answer: D
For Which technology is IPsec required for a site-to-site enterprise WAN/MAN architecture?
A. self-deployed MPLS
C. Frame Relay
E. ISP Service
Correct Answer: E
What does Cisco recommend as the foundation of any deployed security solution?
A. Customer needs
B. Security audit
C. Service-level agreement
D. Corporate security policy
Correct Answer: D QUESTION 41
What is the administrative distance of eBGP routes?
A. 200
B. 100
C. 20
D. 110
Correct Answer: C QUESTION 42
Which name is for the Cisco product that provides centralized, policy-based security management?
B. Out-of-band management

Correct Answer: D QUESTION 43
Which statement represents a likely starting point for planning network changes?
A. Protocol assessment
B. Determining the design requirements
C. Determining the business needs
D. Determining the application requirements

Correct Answer: D QUESTION 44
Drag and Drop


Correct Answer:
What does IGMP stand for?
A. Internet Group Management Protocol
B. Interior Gateway Routing Protocol
C. Interior Group Management Protocol
D. Interior Gateway Media Protocol

Correct Answer: A
ISDN is short for Integrated Services Digital Network. Under what category of WAN technologies does ISDN belong?
A. Cell-switched
B. Circuit-switched
C. Packet-switched
D. Leased lines

Correct Answer: B
As a network engineer, can you tell me accounting management on a network-management system allows a network manager to perform Which function?
A. Assess the network’s effectiveness and throughput
B. Charge back to users for network resources
C. Performance management
D. Identify problem areas in the network

Correct Answer: B
Which address type is
A. Unicast
B. Anycast
C. Multicast
D. Broadcast
Correct Answer: C
What is the length of the key used with Triple Data Encryption Standard (3DES)?
A. 64 bits
B. 168 bits
C. 128 bits
D. 56 bits
Correct Answer: B
Refer to the exhibit.

Which layer is the distribution layer?
A. Layer A
B. Layer B
C. Layer C
D. Layers A and B form a consolidated core and distribution layer

Correct Answer: B

Our material on our site Cisco is exam-oriented, keeping in view the candidates requirements and level of understanding.Cisco 640-864 materials are in the most popular and easy-to-use PDF version. You can use it on any devices with you anywhere.

You may also like