Cisco 642-873 Cert, Helpful Cisco 642-873 Demo With The Knowledge And Skills

NEW DUMPS– How to prepare the Cisco https://www.pass4itsure.com/642-873.html exam and to 100 percent pass it without any problem? Cisco 642-873 just published the newest Cisco 642-873 Flydumps with all the new updated exam questions and answers.You can get the free new version on Flydumps.com

QUESTION 45
Which of these statements best describes VPLS?
A. Neither broadcast nor multicast traffic is ever flooded in VPLS.
B. Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C. VPLS emulates an Ethernet switch, with each EMS being analogous to a VLAN.
D. Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E. When the provider experiences an outage, IP re-routing restores PW connectivity and MAC re-learning is needed.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 46
How does ERS use the VLAN tag?
A. to provide service internetworking
B. to support transparency for Layer 2 frames
C. as a connection identifier to indicate destination
D. as a mapping to the DLCI in service internetworking
E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 47
Which two of these correctly describe Fibre Channel? (Choose two.)
A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to 100 km before needing extenders

Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 48
What method does the Cisco MDS 9000 Series use to support trunking?
A. ISL
B. IVR
C. VoQ
D. VSANs
E. Enhanced ISL

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 49
Drop A.

B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
QUESTION 50
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?
A. Layer 2
B. Layer 3
C. in-band
D. out-of-band
E. edge
F. central

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 51
Which two statements about Layer 3 access designs are correct? (Choose two.)
A. IP address space is difficult to manage.
B. Broadcast and fault domains are increased.
C. Convergence time is fractionally slower than STP.
D. Limits on clustering and NIC teaming are removed.
E. Fast uplink convergence is supported for failover and fallback.

Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 52
What is the purpose of IGMP in a multicast implementation?
A. it is not used in multicast
B. it determines the virtual address group for a multicast destination
C. it dynamically registers individual hosts in a multicast group on a specific LAN
D. it is used on WAN connections to determine the maximum bandwidth of a connection
E. it determines whether Bidirectional PIM or PIM sparse mode will be used for a multicast flow

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
Which two characteristics are most typical of a SAN? (Choose two.)
A. NICs are used for network connectivity.
B. Servers request specific blocks of data.
C. Storage devices are directly connected to servers.
D. A fabric is used as the hardware for connecting servers to storage devices.
E. The TCO is higher because of the cost of director class storage switches.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 54
Which of these is least important when determining how many users a NAS can support?
A. bandwidth
B. number of plug-ins per scan
C. total number of network devices
D. number of checks in each posture assessment

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 55
Which of these is true of IP addressing with regard to VPN termination?
A. addressing designs need to allow for summarization
B. termination devices need routable addresses inside the VPN
C. IGP routing protocols will update their routing tables over an IPsec VPN
D. designs should not include overlapping address spaces between sites, since NAT is not supported

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 56
When is a first-hop redundancy protocol needed in the distribution layer?
A. when HSRP is not supported by the design
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution switch
F. when the design implements Layer 3 between the access switch and the distribution switch

Correct Answer: F Section: (none) Explanation
Explanation/Reference:
QUESTION 57
Refer to the exhibit. Which two characteristics are true of a firewall running in routed mode? (Choose two.)

A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.
E. Traffic switched between VLANs is subject to state tracking and other firewall configurable options.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 58
Which of these practices should you follow when designing a Layer 3 routing protocol?
A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 59
What is the recommended radius of a cell for a voice-ready wireless network?
A. 6 dBm
B. 7 dBm
C. 19 dBm
D. 5 dBm

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 60
Which three implementation modes may be used to deploy SLB? (Choose three.)
A. Router mode
B. One-arm mode
C. Three-arm mode
D. Bridge mode inline
E. Bridge mode passive
F. Combo Bridge router mode

Correct Answer: ABD Section: (none) Explanation
Explanation/Reference:
QUESTION 61
In a base e-Commerce module design, which routing statement is correct?
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 62
Refer to the exhibit. Which two statements about the topologies shown are correct? (Choose two.)

A. Design 1 is a looped triangle design.
B. Design 2 is a looped triangle design.
C. Design 2 achieves quick convergence using RSTP.
D. Both designs support stateful services at the aggregation layer.
E. Design 2 is the most widely deployed in enterprise data centers.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 63
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?
A. ISL
B. IVR
C. VoQ
D. VSANs
E. Enhanced ISL

Correct Answer: D Section: (none) Explanation
Explanation/Reference: QUESTION 64
Which technology allows centralized storage services to be shared across different VSANs?
A. IVR
B. FSPF
C. FICON
D. SANTap

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 65
Which two statements are correct regarding Flex Links? (Choose two.)
A. An interface can belong to multiple Flex Links.
B. Flex Links operate only over single pairs of links.
C. Flex Link pairs must be of the same interface type.
D. Flex Links automatically disable STP so no BPDUs are propagated.
E. Failover from active to standby on Flex Links takes less than a second.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:

Whenever Cisco candidates take a tour of sample questions of Cisco https://www.pass4itsure.com/642-873.html exam they find their training to be matchless to great extent.Passing the Cisco 642-873 on your own can be a difficult task,but with Cisco 642-873 preparation products,many candidates who appeared online passed Cisco 642-873 easily.

Continue Reading

Cisco 642-873 Questions, Latest Upload Cisco 642-873 Guide For Sale

Free sharing of new updated Cisco https://www.pass4itsure.com/642-873.html exam practice test. If you are looking to get certified in short possible time, better try Flydumps latest new version Cisco 642-873 with all new questions and answers added,visit Flydumps.com to free Cisco 642-873 download vce and pdf files.

Exam A
QUESTION 1
Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 2
Which of these is a Layer 2 transport architecture that provides packet-based transmission optimized for data based on a dual (counter-rotating) ring topology?
A. DTP
B. RPR
C. SDH
D. CWDM
E. DWDM

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 3
Which three of these are elements of the Cisco Unified Wireless Network architecture? (Choose three)
A. cell phones
B. remote access
C. mobility services
D. network management
E. network unification
F. network decentralization

Correct Answer: CDE Section: (none) Explanation
Explanation/Reference:
QUESTION 4
Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design? (Choose two.)

A. use a redundant link to the core
B. use a Layer 2 link between distribution switches
C. never use a redundant link to the core because of convergence issues
D. use a Layer 3 link between distribution switches with route summarization
E. use a Layer 3 link between distribution switches without route summarization

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 5
Which of these terms refers to call issues that cause variations in timing or time of arrival?
A. queuing
B. jitter
C. packet loss
D. digitized sampling
E. signal-to-noise ratio ratio

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 6
Which two of these are characteristics of an IDS sensor? (Choose two.)
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IDS interface and exits on another
E. has a promiscuous interface that is used to monitor the network

Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 7
In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 8
In which two locations in an enterprise network can an IPS sensor be placed? (Choose two.)
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 9
What is a virtual firewall?
A. another name for a firewall deployed in routed mode
B. another name for a firewall deployed in transparent mode
C. a separation of multiple firewall security contexts on a single firewall
D. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E. a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 10
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?
A. 19 dBm
B. 7 dBm
C. 10 dBm
D. 6 dBm
E. 5 dbm to 10 dBm

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 11
Why is STP required when VLANs span access layer switches?
A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 12
Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 13
Which two design concerns must be addressed when designing a multicast implementation? (Choose two.)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

Correct Answer: AF Section: (none) Explanation
Explanation/Reference:
QUESTION 14
Which two of these are recommended practices with trunks? (Choose two.)
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

Correct Answer: BE Section: (none) Explanation
Explanation/Reference:
QUESTION 15
For acceptable voice calls, the packet error rate should be no higher than what value?
A. 0.1%
B. 1%
C. 2.5%
D. 25%

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 16
Which of these statements is true of clientless end-user devices?
A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required in order to assign IP addresses.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 17
Which statement is correct regarding NBAR and NetFlow?
A. NetFlow uses five key fields for the flow.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.
E. NetFlow examines data in Layers 2 through 4.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 18
What is meant by the term “firewall sandwich”?
A. multiple layers of firewalling
B. a method of operating firewalls from multiple vendors
C. firewall connections in either an active or standby state
D. an architecture in which all traffic between firewalls goes through application-specific servers
E. an architecture in which all traffic between firewalls goes through application-specific gateways

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 19
When BGP tuning is used, how is packet flow into the e-commerce module controlled?
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

Correct Answer: D Section: (none) Explanation Explanation/Reference:
QUESTION 20
Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
A. Flex Links
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U

Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:

Free practice questions for Cisco https://www.pass4itsure.com/642-873.html exam.These questions are aimed at giving you an idea of the type of questions you can expect on the actual exam. You will get an idea of the level of knowledge each topic goes into but because these are simple web pages you will not see the interactive and performance based questions – those are available in the Cisco 642-873.

Continue Reading