CertifyMe. CertifyMe

Similar documents
Cisco Cisco Express Foundation for Field Engineers V

Exam : Cisco Certified Network Associate(CCNA) Title : Version : DEMO

examcollection.premium.exam.68q. Exam code: Exam name: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version 15.

CCNA. Course Catalog

COPYRIGHTED MATERIAL. Table of Contents. Assessment Test

Cisco Certified Network Associate ( )

TEXTBOOK MAPPING CISCO COMPANION GUIDES

CCNA Routing and Switching (NI )

PASS4TEST IT 인증시험덤프전문사이트

Question: 1 Which three parameters must match to establish OSPF neighbor adjacency? (Choose three.)

Exam : Cisco Title : Update : Demo. Composite Exam

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

Exam Topics Cross Reference

CertifyMe. CertifyMe

PrepKing. PrepKing

A. RouterA received a hello packet with mismatched autonomous system numbers.


: Building Cisco Multilayer Switched Networks

Actualtests Q

Exam Questions Demo Cisco. Exam Questions

CCNA Cisco Certified Network Associate CCNA (v3.0)

Pass4sures. Latest Exam Guide & Learning Materials

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

CCNP (Routing & Switching and T.SHOOT)

Exam Name: CCNA - Cisco Certified Network Associate

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

CCNP SWITCH (22 Hours)

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

CCNA Routing & Switching

Cisco CCNA (ICND1, ICND2) Bootcamp

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

CISCO EXAM QUESTIONS & ANSWERS

CERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA

CCNA 3 (v v6.0) Chapter 5 Exam Answers % Full

Lab 1-2Connecting to a Cisco Router or Switch via Console. Lab 1-6Basic Graphic Network Simulator v3 Configuration

CompTIA Network+ Study Guide Table of Contents

Cisco Exam Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Version: 6.0 [ Total Questions: 79 ]

CCNA 4 - Final Exam (B)

CISCO EXAM QUESTIONS & ANSWERS

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Fundamentals of Network Security v1.1 Scope and Sequence

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

H Q&As. HCNA-HNTD (Huawei Network Technology and Device) Pass Huawei H Exam with 100% Guarantee

CCNA. The knowledge and skills that a learner must have before attending this course are as follows:

Building Cisco Multilayer Switched Networks (BCMSN)

Course: CCNA Bootcamp (Intensive CCNA)

Cisco Cisco ADVDESIGN. Download Full Version :

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Exam Questions

Cisco Testinside Exam Bundle

Interconnecting Cisco Networking Devices: Accelerated

The primary audience for this course includes Network Administrators, Network Engineers,

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

8. Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem?

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des

Vendor: Cisco. Exam Code: Exam Name: CCNA Cisco Certified Network Associate CCNA (v3.0) Version: Demo

CCNA 3 (v v6.0) Chapter 7 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 6 Exam Answers % Full

CISCO EXAM QUESTIONS & ANSWERS

Configuring the Access Point/Bridge for the First Time

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide

SEVENMENTOR TRAINING PVT.LTD

Troubleshooting and Maintaining Cisco IP Networks v2 ( )

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

CCIE Route & Switch Written (CCIERSW) 1.0

Exam Code : Version: Free Demo. IT Certification Guaranteed, The Easy Way!

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Exam : Cisco Title : Update : Demo. Cisco Certified Network Associate

Implementing Cisco IP Routing ( )

Lab 8.5.2: Troubleshooting Enterprise Networks 2

C H A P T E R Overview Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide OL

CCNA 3 (v v6.0) Chapter 8 Exam Answers % Full

Skills Assessment (OSPF) Student Training Exam

Managing Site-to-Site VPNs

CISCO EXAM QUESTIONS & ANSWERS

CCIE R&S LAB CFG H2/A5 (Jacob s & Jameson s)

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Skills Assessment (EIGRP) Student Training Exam

Troubleshooting CHAPTER

GuideTorrent. The best excellent exam certification guide torrent and dumps torrent provider

Gigabit SSL VPN Security Router

GoCertify Advanced Cisco CCIE Lab Scenario # 1

Cisco 5921 Embedded Services Router

Cisco Questions & Answers

Implementing Cisco IP Routing (ROUTE)

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Cisco CISCO Interconnecting Cisco Networking Devices Exam (ICND) Practice Test. Version

CCNA Security 1.0 Student Packet Tracer Manual

Skills Assessment (EIGRP) Student Training Exam

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Index. Numerics. Index 1

CertifyMe. CertifyMe

MTA_98-366_Vindicator930

Vendor: Cisco. Exam Code: Exam Name: Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Version: Demo

Managing Site-to-Site VPNs: The Basics

Q&As Implementing Cisco IP Switched Networks (SWITCH v2.0)

Transcription:

CertifyMe Number: 642-383 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ CertifyMe 642-383

Exam A QUESTION 1 Which of the following best describe the customer benefits of change management in the operate phase? verifying that the system meets operational, functional, and interface requirements A. improve its ability to make sound financial decisions by developing a business case based on its business requirements and establishing a basis for developing a technology strategy B. reduce operating costs and limit change-related incidents by providing a consistent and efficient set of processes C. improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the system Correct Answer: C QUESTION 2 Which of these is the best definition of the Cisco Lifecycle Services approach? A. It defines the minimum set of services required to successfully deploy and operate a set of Cisco technologies. B. It determines how best to price Cisco products. C. It provides partners with a useful way to leverage Cisco resources. D. It consists of these phases: plan, deploy, support, and troubleshoot. Correct Answer: A QUESTION 3 What two types of telephony interfaces are used for PSTN connectivity? (Choose two.) A. Digital B. Optical C. Analog D. CDMA Correct Answer: AC QUESTION 4 Which statement correctly describes the keyswitch model of deployment for call processing?

A. All IP Phones are able to answer any incoming PSTN call on any line. B. PSTN calls are routed through a receptionist or automated attendant. C. All IP Phones in the system have a single unique extension number. Correct Answer: QUESTION 5 Which definition best describes the implementation service component within the implement phase? A. providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer network B. assessing the ability of site facilities to accommodate proposed infrastructure changes C. developing and executing proof-of-concept tests, validating high-level infrastructure design, and identifying any design enhancements D. installing, configuring, and integrating systems components based on an implementation plan developed in earlier phases E. improving a customer's infrastructure security system Correct Answer: D QUESTION 6 A customer with a small enterprise network of 15 remote sites is trying to optimize its VPN by migrating some remote sites using Frame Relay connections to the Internet to using cable connections to the Internet. Minimizing costs is one of the customer's highest priorities. Only a moderate amount of IP traffic is passing through the network, most of which is from the remote sites to the central site. IPSec should be used to provide VPN functionality and basic confidentiality is desired. Based on the traffic patterns, which topology would be the easiest for this customer to set up and manage? A. full mesh B. partial mesh C. point-to-multipoint D. hub-and-spoke Correct Answer: D QUESTION 7 How can the proper configuration of Voice Mail be tested at an end user's IP phone?

http://www.gratisexam.com/ A. Press the "i" button. B. Press the "Settings" button. C. Press the "Services" button. D. Press the "Messages" button. Correct Answer: D QUESTION 8 In what location is it recommended that the Cisco Catalyst 6500 Series WLSM be placed? A. distribution layer B. core layer C. access layer D. network management functional module Correct Answer: A QUESTION 9 Which of these is an accurate list of Cisco Lifecycle Services phases? A. initiation, planning, analysis, design, development, implementation, operations and maintenance B. project planning, site assessment, risk assessment, solution selection and acquisition, testing, and operations C. prepare, plan, design, implement, operate, and optimize D. analysis, design, deployment, testing, implementation, and production E. presales, project planning, development, implementation, operations testing, and operations sign-off Correct Answer: C QUESTION 10 Hotspot

A. B. C. D. Correct Answer: Answer: Check TopCerts eengine, Download from Member Center QUESTION 11 What port role assignment would you make for the Gigabit Ethernet port on the Cisco CE520 used in the Smart Business Communications System? A. IP Phone and desktop B. Cisco UC520 C. Cisco CE520 D. Cisco 871W QUESTION 12 Refer to the exhibit. Switches A and C are running PVST+ STP, and Switch B is running 802.1Q STP. If the BPDU of the root in VLAN 1 is better than the BPDU of the root in VLAN 2, then there is no blocking port in the VLAN 2 topology. The BPDU of VLAN 2 never makes a "full circle" around the topology; it is replaced by the VLAN 1 BPDU on the B-C link, because B runs only one STP merged with VLAN 1 STP of PVST+. Thus, there is a forwarding loop. What does PVST+ do to correct this? A. Switch A sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B) towards Switch C. Switch C will put port C-B into a type-inconsistent state, which prevents the loop. B. Switch B sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch A) towards Switch C. Switch C will put port C-B into a type-inconsistent state, which prevents the loop. C. Switch C sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B) towards Switch C. Switch A will put port C-B into a type-inconsistent state, which prevents the loop. D. Switch A sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch B) towards Switch B. Switch A will put port C-B into a type-inconsistent state, which prevents the loop. Correct Answer: A QUESTION 13 Which interface on the Cisco UC520 is assigned an IP address either statically or through DHCP?

A. WAN interface B. LAN interface C. Switchport D. PSTN Interface Correct Answer: A QUESTION 14 Which benefit can be obtained by using the change management service component in the operate phase? A. reduced operating costs, due to a consistent framework for making necessary changes in an efficient and accountable manner B. greater accuracy, completeness, and timeliness of network configuration information C. notification provided to interested parties regarding problems that have been identified, and a system that scales with customer requirements D. improved system service quality and fewer disruptions Correct Answer: A QUESTION 15 What are two ways to test the LAN connectivity on the Cisco CE520? (Choose two.) A. Ping the IP address of the Cisco-Data Access VLAN from the Cisco UC520 console. B. Ping the IP address of the Cisco-Data VLAN from a device attached to the Cisco CE520. C. Ping default gateway from the Cisco UC520. D. Ping the IP address of the Cisco-Voice VLAN from a device attached to the Cisco CE520. E. Ping default gateway from the Cisco CE520. F. Ping the IP address of the Cisco-Distribution VLAN from the Cisco UC520 console. D QUESTION 16 Which statement correctly describes configuration of the VPN server? A. It requires definition of a Group ID for remote clients. B. It requires configuration of port settings for the VPN server on the Cisco UC520. C. It uses a preshared key for remote device authentication. D. The WAN interface is preselected.

Correct Answer: C QUESTION 17 In a new Cisco UC520 installation, when must IP routing be configured? A. When the service provider assigns static IP information. B. When the service provider assigns dynamic IP information. C. When analog PSTN trunks are used. D. When digital PSTN trunks are used. Correct Answer: A QUESTION 18 Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System? (Choose two.) A. allow for guest access B. increase connection speeds C. add additional access points D. network management with CLI Correct Answer: AC QUESTION 19 Which critical issue should you account for when implementing an integrated network security management design? A. NAT interoperates with encrypted voice traffic B. host-based intrusion detection systems reside in the network C. all network devices are time-synchronized D. SNMP community read-write strings are configured to allow for total management access Correct Answer: C QUESTION 20

In which of these phases is a customer's current network infrastructure assessed? A. plan B. design C. implement D. prepare Correct Answer: A QUESTION 21 To save time during rediscovery, which three types of device information does Cisco Configuration Assistant retain? (Choose three.) A. IP Address B. MAC Address C. Host Name D. Communication Protocol E. Port Settings F. Topology Correct Answer: ACD QUESTION 22 Which dial plan scenario may require PSTN trunks for outbound calls? A. All the employees, the auto attendant or receptionist, and the voice-mail system have direct inward dial numbers using analog trunks. B. A subset of the employees, the auto attendant or receptionist, and the voice-mail system have direct inward dial numbers, and the remaining employees do not have direct inward dial numbers. C. All the employees, the auto attendant or receptionist, and the voice-mail system have direct inward dial numbers using digital interfaces. Correct Answer: A QUESTION 23 What are two configurable options for Call Control on the Cisco UC520? (Choose two.) A. Shared Key B. PBX C. Key System

D. Encryption E. Call Waiting C QUESTION 24 Refer to the exhibit. According to the Cisco VPN Client software outputs shown, which two statements are correct about the connection entry named isr? (Choose two.) A. HMAC-SHA1 is used to authenticate the remote users. B. Preshared key is used to authenticate the remote peer. C. AES is used to provide data confidentiality. D. The Cisco VPN Client software is assigned an internal IP address of 192.168.1.1. E. The PC that is running the Cisco VPN Client software will not have access to the local LAN once the PC is connected into the VPN. E QUESTION 25 Refer to the exhibit. According to the Cisco Adaptive Security Device Manager window, which statement about address translation is correct? A. Using Network Address Translation, any host on the DMZ1 subnet (172.16.1.0) will be translated to a mapped address on the outside interface of 192.168.1.11. B. Using port address translation, DMZ2 host 172.16.10.2 will be translated on DMZ1 to IP address 172.16.1.22 with a dynamically assigned port address. C. Using Network Address Translation, host 10.0.1.10 on the inside network will be dynamically translated to a mapped address from the address pool of 192.168.1.20 to 192.168.1.94. D. Using port address translation, outside host 192.168.1.10 with a dynamically assigned port address will be translated to 10.0.1.11 on the inside interface. Correct Answer: C QUESTION 26 Which two are benefits of installing Cisco Monitor Director at an SMB site for the partner selling the solution? (Choose two.) A. simplifies Smart Business Communications System installation B. allows the end customer to get free software updates C. monthly recurring revenue model

D. automated monthly reporting on system performance Correct Answer: CD QUESTION 27 Which Cisco Catalyst Express 520 feature optimizes quality of service? A. Cisco Configuration Assistant B. Cisco Smartports C. Cisco Network Admission Control D. Cisco Smart Assist QUESTION 28 Which three business requirements development activities are performed in the prepare phase before creating a technology strategy? (Choose three.) A. identifying and assessing customer business requirements B. documenting and categorizing customer business requirements in terms of performance, availability, capacity, and security C. producing a documented technology strategy D. creating a bill of materials E. presenting documented business requirements to a customer and having the customer validate them F. completing a site survey Correct Answer: ABE QUESTION 29 Refer to the exhibit. This display has been truncated to remove information that is not relevant to the question. What would be a reason that there have been 21 ignored packets? A. Ethernet0 has no CDP neighbors. B. There are no free input buffers to accept new packets. C. There are no free output buffers for packets, which are traversing the router, to go into for transmission. D. Ethernet0 and the neighbor that it is connected to are not running the same routing protocol. E. This is not a valid error display. The display has been modified to show that there have been ignored packets.

QUESTION 30 After configuring VTP, you no longer receive updates as expected. Which command can you use to verify the number of VTP advertisements being transmitted? A. show vtp database B. show vtp counters C. show vtp statistics D. show vtp status QUESTION 31 You enter the command show ip ospf neighbor and see "two-way/drother" listed as the state for neighbor 10.1.1.1. What does this status indicate? A. The neighbor 10.1.1.1 is not a DR or BDR. B. The neighbor relationship with 10.1.1.1 has not yet completed. C. DR and BDR election is in progress. D. The neighbor 10.1.1.1 is the BDR. Correct Answer: A QUESTION 32 Which design phase service component includes the development and documentation of the test case or cases used to verify that a deployed infrastructure meets operational, functional, and interface requirements? A. Implementation Plan B. Business Plan C. Staging Plan D. Detailed Design Development E. Systems Acceptance Test Plan Development Correct Answer: E QUESTION 33

Which implement phase service component consists of explaining the benefits and limitations of purchased support options to a customer and ensuring that the customer understands operational processes and responsibilities? A. Staging and System Migration B. Post Implementation Support Handoff Meeting C. Detailed Design Development D. Staff Training QUESTION 34 In which of these phases is a customer's network assessed to determine its system readiness? A. plan B. design C. operate D. implement Correct Answer: A QUESTION 35 How many voice expansion slots are provided by the Cisco UC520? A. one B. two C. three D. four Correct Answer: A QUESTION 36 A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.) A. switchport port-security B. switchport port-security tagging C. switchport access vlan D. switchport double-tag snooping E. switchport mode access

Correct Answer: CE QUESTION 37 Which network management tool is designed to allow businesses to manage up to 40 devices? A. CiscoWorks Unrestricted B. CiscoWorks SNMS C. Campus Manager D. Resource Management Essentials QUESTION 38 You are troubleshooting OSPF neighbor establishment problems, which are occurring over Frame Relay interfaces that use the default OSPF network type. What should you verify in the router configuration? A. the ip ospf network point-to-point statement under the Frame Relay interface B. the ip ospf priority 0 statement on the Frame Relay interface on the designated router C. the neighbor statements on the Frame Relay interface D. the frame-relay map statement on the Frame Relay interface Correct Answer: D QUESTION 39 You are configuring a VLAN and the switch you are using requires that you do so within the VLAN database. Which command allows you to enter the VLAN database? A. Switch# vlan database B. Switch(config)# vlan database C. Switch(config-if)# vlan database D. Switch(vlan)# vlan database Correct Answer: QUESTION 40

Which two statements best describe the wireless core feature set using autonomous access points when implementing repeater topology? (Choose two.) A. RF overlap between access points should be 10 to 15 percent with unique channels configured. B. RF overlap between primary and repeater access points should be 10 to 15 percent with the same channel configured. C. RF overlap between primary and repeater access points should be 50 percent with the same channel configured. D. RF overlap between primary and repeater access points should be 50 percent with unique channels configured. E. Clients that are associated with the repeater access point will have 10 to 15 percent less data throughput than clients that are associated with the primary root access point. F. Clients that are associated with the repeater access point will have 50 percent less data throughput than clients that are associated with the primary root access point. Correct Answer: CF QUESTION 41 Refer to the exhibit. The Cisco Aironet 802.11a/b/g Wireless LAN Client Adapter has two LEDs. Which two LED states indicate that the card is associated to an access point and is working properly? (Choose two.) A. green LED off; amber LED solid B. green LED off; amber LED blinking sporadically C. green LED blinking quickly; amber LED blinking quickly D. green LED blinking slowly; amber LED blinking slowly E. green LED blinking slowly; amber LED blinking quickly Correct Answer: CD QUESTION 42 Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configuration of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the site-to-site VPN between Router A and Router B. What is the mostly likely cause of this fault? A. The IPSec and IKE encryption methods do not match. They all have to be either 3DES or AES. B. Router A is using a standard IP ACL (100-149) while Router B is using a turbo ACL (150-199). C. The D-H Group settings on the two routers are set to group 2. They must be set to group 1 for SHA-1. D. The IPSec policy map names on the two routers do not match. They must be the same on both routers. E. The IPSec rules on the two routers are not permitting the correct interesting traffic. Correct Answer: E

QUESTION 43 OSPF routes are being redistributed into EIGRP but they are not showing up in the routing table. What are two possible causes? (Choose two.) A. CEF has not been enabled. B. Synchronization has been turned off. C. Incorrect distribute lists have been configured. D. No default metric has been configured for EIGRP. E. The ip classless command is missing. F. There are mismatched autonomous system numbers. Correct Answer: CD QUESTION 44 Which two statements best describe the wireless implementation of Cisco Aironet root and non-root bridging? (Choose two.) A. Point-to-point access points can be used if one is root and the other is non-root. B. WGB can be used with an access point if the distance is less than one mile. C. Root mode must be enabled only on one side in a point-to-point link to interoperate with other vendors and comply with 802.11. D. Up to 17 non-root bridges can associate to a root bridge. E. Point-to-point WGB can be used if total number of PCs is fewer than eight. D QUESTION 45 Refer to the exhibit. Which two statements are correct about what is displayed? (Choose two.) A. The IP address that is used for the router ID must be reachable. B. Router 1 is the designated router because it has the lowest configured IP address. C. Router 1 is the designated router because it has the highest configured loopback address. D. If Router 1 had a PRI of 0, it could not be a designated router or a backup designated router. E. Router 1 has had its ID manually configured by using the router-id command. Correct Answer: CD QUESTION 46

The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points? A. 48-bit IV B. AES C. TKIP D. MIC QUESTION 47 A company needs to provide site-to-site VPN, remote access VPN, and firewall protection. Which device best supports all three functions? A. Cisco PIX B. Cisco ASA C. Cisco Concentrator D. Cisco Router and Security Device Manager QUESTION 48 Which two statements are correct about using Cisco Router and Security Device Manager (SDM) to configure the OSPF routing protocol? (Choose two.) A. Cisco SDM enforces the creation of area 0 when configuring OSPF. B. Cisco SDM will use the supplied wildcard mask to exclude the host bits from the configured network address. C. Cisco SDM allows the configuration of an area range to allow route summarization between OSPF areas. D. Cisco SDM allows the selection of OSPFv1 or OSPFv2. E. Cisco SDM allows the configuration of passive interfaces. E QUESTION 49 Refer to the exhibit. R2 is always in the init state. Which two statements are correct? (Choose two.) A. R2 is seeing hello packets from R1. B. R2 is not seeing hello packets from R1. C. The exchanging of data between R1 and R2 is occurring because each is sending hello packets.

D. Two-way communication has not been established between R1 and R2 because R2 is not seeing its router ID in the hello packets that it is receiving from R1. E. R2 has an access list defined for S0 that is blocking an OSPF multicast IP address of 224.0.0.5. Correct Answer: AD QUESTION 50 Which two features are only supported when using the Cisco Router and Security Device Manager (SDM) Advanced Firewall wizard and not supported when using the Cisco SDM Basic Firewall wizard? (Choose two.) A. deep-packet inspections B. IP unicast Reverse Path Forwarding on the outside (untrusted) interface C. DMZ services D. custom inspection rules E. proxy authentication Correct Answer: CD QUESTION 51 When troubleshooting poor network performance, which two symptoms would typically be associated with a network layer problem? (Choose two.) A. Packet loss is more than 30 percent. B. There is excessive broadcast traffic. C. There are excessive CRC errors. D. Pings succeed only part of the time. E. Slips are detected on WAN interfaces. F. ARP requests are timing out. Correct Answer: AD QUESTION 52 Which command can be used to verify that RIPv2 is running on a router? A. show startup-config B. show ip route C. show ip route rip D. show ip protocols Correct Answer: D

QUESTION 53 Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.) A. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router. B. Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router. C. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or controllers. D. Layer 3 services can be configured in WLSM. E. Layer 3 services can be configured in WLSE. D QUESTION 54 You have just configured and enabled the Cisco IOS Firewall feature set from a remote location using the Cisco Router and Security Device Manager (SDM) Firewall wizard. You later want to double-check your configuration using Cisco SDM. However, you find that you can no longer connect to the Cisco IOS Firewall using Cisco SDM. What is the probable cause of this failure? A. You must additionally specify the Cisco SDM management port number to gain access when the configuration has been applied. B. You have not generated an RSA key pair between the host and device to allow secure access via Cisco SDM. C. You have been locked out via access lists that have been applied to the router as a result of your Cisco SDM configuration. D. You must specify the host IP address of Cisco SDM in the Configuration panel for allowed management connections. Correct Answer: C QUESTION 55 An 802.11b telephone is receiving an audio signal from an access point, but cannot send audio. What is a possible cause? A. The RSSI value on the telephone is greater than 35. B. The access point is set to receive only at 802.11g data rates. C. The security settings in the telephone do not match the settings in the access point.

D. The transmit power in the telephone is significantly lower than the transmit power in the access point. Correct Answer: D QUESTION 56 Refer to the exhibit. A host on the Sales subnet (10.0.2.0/24) is not able to initiate a web connection to an outside website. According to the network diagram and partial Cisco Adaptive Security Device Manager configuration shown in the exhibit, what is the cause of the problem? A. The dynamic NAT global pool is not configured correctly. B. The source networks for static NAT are not configured correctly. C. The administrator has not added an access list to allow the connection. D. The source network for dynamic NAT is not configured correctly. Correct Answer: D QUESTION 57 Users logging into Cisco Router and Security Device Manager should be authenticated using the Cisco ISR local user database. Currently, none of the users can access Cisco Router and Security Device Manager via HTTP. You should check the configuration of which command or commands when attempting to resolve this problem? A. ip http secure-server B. ip http authentication local C. line vty 0 5 login local D. aaa new-model aaa authentication login default local QUESTION 58 When using Cisco Router and Security Device Manager to configure AAA login authentication policies, which four methods are available? (Choose four.) A. group RADIUS: use a list of RADIUS hosts B. group TACACS+: use a list of TACACS+ hosts C. enable: use enable password D. otp: use one-time password E. local: use local database

F. default: use line password Correct Answer: ABCE QUESTION 59 Which two statements are correct about OSPF in a multiarea environment? (Choose two.) A. OSPF will by default summarize routing updates between areas. B. OSPF requires the use of the area range configuration command only when nondefault summarization is required. C. OSPF ABR routers are needed only at the boundary of another OSPF area. D. OSPF uses wildcard masks in the network statements but subnet masks in the area range statements. E. OSPF requires that all areas have a least one ASBR. Correct Answer: CD http://www.gratisexam.com/ QUESTION 60 You have just configured HSRP and need to determine which router is active. Which command should you enter? A. show ip hsrp active B. show standby active C. show standby D. show active Correct Answer: C QUESTION 61 A North American customer is using 2.4-GHz radios in a point-to-point configuration. The radio power level is 17 dbm and is transmitting at 11 Mbps. The customer is using 21.5-dBi dish antennas and 50 feet of cabling, with a loss of 8.4 db per 100 feet. The customer increased the distance between the transmitter stations and began experiencing link problems. Without using a professional installer, which step should the customer take to fix the situation?

A. Use a cable with lower loss. B. Upgrade to an 802.11a radio. C. Install a higher gain antenna. D. Increase the transmitter power. Correct Answer: A QUESTION 62 Which three statements are correct about the IEEE 802.3af Power over Ethernet standard? (Choose three.) A. It defines a port that acts as a power source to be a PSE. B. It defines a powered device to be a PDE. C. It defines how a powered device is detected. D. It defines three methods of delivering Power over Ethernet to the discovered powered device. E. It describes five power classes to which a device may belong. F. It defines power class 0 as being reserved for future use. Correct Answer: ACE QUESTION 63 A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which two of these might have caused this problem? (Choose two.) A. The ip https server command is missing from the running configuration. B. The ip http secure-server command is missing from the running configuration. C. The user is trying to launch Cisco Router and Security Device Manager from the inside (secured) interface with a firewall enabled. D. The user has a privilege level lower than 15. E. The browser security level is set too high. D QUESTION 64 Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.) A. The primary Layer 2 WDS server address is configured via the infrastructure access point GUI. B. The primary Layer 2 WDS server address is automatically discovered by the infrastructure access points through multicast.

C. The primary Layer 2 WDS is selected by the highest MAC address, followed by priority number. D. The primary Layer 2 WDS is selected by the highest priority number, followed by MAC address. E. The primary Layer 2 WDS is selected by the highest IP address, followed by MAC address. D QUESTION 65 Refer to the exhibit. A network administrator is troubleshooting an EIGRP connection between Router A and Router B. Given the debug output on Router A, which two statements are true? (Choose two.) A. Router A received a hello packet with mismatched autonomous system numbers. B. Router A received a hello packet with mismatched hello timers. C. Router A received a hello packet with mismatched authentication parameters. D. Router A received a hello packet with mismatched metric-calculation mechanisms. E. Router A will form an adjacency with Router B. F. Router A will not form an adjacency with Router B. Correct Answer: DF QUESTION 66 Which command assigns a cost value of "17" to a switch port? A. spanning-tree interface fastethernet 5/8 17 B. spanning-tree portcost 17 C. spanning-tree port cost 17 D. spanning-tree vlan 1 cost 17 Correct Answer: D QUESTION 67 You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted interface. You suspect that the rule may be blocking necessary traffic onto the network. What must you do to delete that rule when using Cisco Router and Security Device Manager? A. Select ACL Editor > Access Rules to delete the rule. B. You must remove the association between the rule and the interface before deleting the rule. C. You must delete the associated access list on the interface, then reconfigure the access list as required, and then reapply the access group to the proper interface. D. Go to the Edit Firewall Policy tab to delete the rule.

QUESTION 68 A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling and both radios set at 20 mw. The wireless bridges are not able to establish or maintain a link. What is needed to successfully complete this link? A. An amplifier needs to be installed at one of the sites. B. The antenna must be raised high enough to clear the trees. C. Lower loss cabling needs to be used to bring the EIRP into legal limits. D. Due to the trees, a 21-dBi dish needs to be used for its narrower beamwidth. QUESTION 69 You connect via Telnet to a Cisco access point and enter the command show dot11 linktest. Which output might you obtain? A. signal-to-noise ratio B. incoming and outgoing signal strength C. TX packets dropped D. RX packets per second QUESTION 70 Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the site-to-site VPN between Router A and Router B. What is the mostly likely cause of this fault? A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150?99). B. The IKE encryption methods on the two routers are different. C. The IPSec policy map names on the two routers are different. D. The IPSec rules on the two routers are not permitting the correct interesting traffic.

QUESTION 71 What two types of telephony interfaces are used for PSTN connectivity? (Choose two.) A. Digital B. Optical C. Analog D. CDMA Correct Answer: AC QUESTION 72 In what location is it recommended that the Cisco Catalyst 6500 Series WLSM be placed? A. distribution layer B. core layer C. access layer D. network management functional module Correct Answer: A QUESTION 73 Refer to the exhibit. According to the Cisco Adaptive Security Device Manager window, which statement about address translation is correct? A. Using Network Address Translation, any host on the DMZ1 subnet (172.16.1.0) will be translated to a mapped address on the outside interface of 192.168.1.11. B. Using port address translation, DMZ2 host 172.16.10.2 will be translated on DMZ1 to IP address 172.16.1.22 with a dynamically assigned port address. C. Using Network Address Translation, host 10.0.1.10 on the inside network will be dynamically translated to a mapped address from the address pool of 192.168.1.20 to 192.168.1.94. D. Using port address translation, outside host 192.168.1.10 with a dynamically assigned port address will be translated to 10.0.1.11 on the inside interface. Correct Answer: C

QUESTION 74 After configuring VTP, you no longer receive updates as expected. Which command can you use to verify the number of VTP advertisements being transmitted? A. show vtp database B. show vtp counters C. show vtp statistics D. show vtp status QUESTION 75 The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points? A. 48-bit IV B. AES C. TKIP D. MIC QUESTION 76 Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.) A. The primary Layer 2 WDS server address is configured via the infrastructure access point GUI. B. The primary Layer 2 WDS server address is automatically discovered by the infrastructure access points through multicast. C. The primary Layer 2 WDS is selected by the highest MAC address, followed by priority number. D. The primary Layer 2 WDS is selected by the highest priority number, followed by MAC address. E. The primary Layer 2 WDS is selected by the highest IP address, followed by MAC address. D QUESTION 77 A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling

and both radios set at 20 mw. The wireless bridges are not able to establish or maintain a link. What is needed to successfully complete this link? A. An amplifier needs to be installed at one of the sites. B. The antenna must be raised high enough to clear the trees. C. Lower loss cabling needs to be used to bring the EIRP into legal limits. D. Due to the trees, a 21-dBi dish needs to be used for its narrower beamwidth. QUESTION 78 In what location is it recommended that the Cisco Catalyst 6500 Series WLSM be placed? A. distribution layer B. core layer C. access layer D. network management functional module Correct Answer: A QUESTION 79 Which two statements best describe the wireless core feature set using autonomous access points when implementing repeater topology? (Choose two.) A. RF overlap between access points should be 10 to 15 percent with unique channels configured. B. RF overlap between primary and repeater access points should be 10 to 15 percent with the same channel configured. C. RF overlap between primary and repeater access points should be 50 percent with the same channel configured. D. RF overlap between primary and repeater access points should be 50 percent with unique channels configured. E. Clients that are associated with the repeater access point will have 10 to 15 percent less data throughput than clients that are associated with the primary root access point. F. Clients that are associated with the repeater access point will have 50 percent less data throughput than clients that are associated with the primary root access point. Correct Answer: CF QUESTION 80 Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager

configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the site-to-site VPN between Router A and Router B. What is the mostly likely cause of this fault? A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150?99). B. The IKE encryption methods on the two routers are different. C. The IPSec policy map names on the two routers are different. D. The IPSec rules on the two routers are not permitting the correct interesting traffic. QUESTION 81 Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.) A. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router. B. Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router. C. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or controllers. D. Layer 3 services can be configured in WLSM. E. Layer 3 services can be configured in WLSE. D QUESTION 82 Users logging into Cisco Router and Security Device Manager should be authenticated using the Cisco ISR local user database. Currently, none of the users can access Cisco Router and Security Device Manager via HTTP. You should check the configuration of which command or commands when attempting to resolve this problem? A. ip http secure-server B. ip http authentication local C. line vty 0 5 login local D. aaa new-model aaa authentication login default local

QUESTION 83 A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which two of these might have caused this problem? (Choose two.) A. The ip https server command is missing from the running configuration. B. The ip http secure-server command is missing from the running configuration. C. The user is trying to launch Cisco Router and Security Device Manager from the inside (secured) interface with a firewall enabled. D. The user has a privilege level lower than 15. E. The browser security level is set too high. D QUESTION 84 Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the site-to-site VPN between Router A and Router B. What is the mostly likely cause of this fault? A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150?99). B. The IKE encryption methods on the two routers are different. C. The IPSec policy map names on the two routers are different. D. The IPSec rules on the two routers are not permitting the correct interesting traffic. QUESTION 85 The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points? A. 48-bit IV B. AES C. TKIP D. MIC QUESTION 86 You have just configured HSRP and need to determine which router is active. Which command should you enter?

A. show ip hsrp active B. show standby active C. show standby D. show active Correct Answer: C QUESTION 87 A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which two of these might have caused this problem? (Choose two.) A. The ip https server command is missing from the running configuration. B. The ip http secure-server command is missing from the running configuration. C. The user is trying to launch Cisco Router and Security Device Manager from the inside (secured) interface with a firewall enabled. D. The user has a privilege level lower than 15. E. The browser security level is set too high. D QUESTION 88 A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling and both radios set at 20 mw. The wireless bridges are not able to establish or maintain a link. What is needed to successfully complete this link? A. An amplifier needs to be installed at one of the sites. B. The antenna must be raised high enough to clear the trees. C. Lower loss cabling needs to be used to bring the EIRP into legal limits. D. Due to the trees, a 21-dBi dish needs to be used for its narrower beamwidth. QUESTION 89 What two types of telephony interfaces are used for PSTN connectivity? (Choose two.) A. Digital

B. Optical C. Analog D. CDMA Correct Answer: AC QUESTION 90 The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points? A. 48-bit IV B. AES C. TKIP D. MIC QUESTION 91 How can the proper configuration of Voice Mail be tested at an end user's IP phone? A. Press the "i" button. B. Press the "Settings" button. C. Press the "Services" button. D. Press the "Messages" button. Correct Answer: D QUESTION 92 Which benefit can be obtained by using the change management service component in the operate phase? A. reduced operating costs, due to a consistent framework for making necessary changes in an efficient and accountable manner B. greater accuracy, completeness, and timeliness of network configuration information C. notification provided to interested parties regarding problems that have been identified, and a system that scales with customer requirements D. improved system service quality and fewer disruptions Correct Answer: A

QUESTION 93 Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System? (Choose two.) A. allow for guest access B. increase connection speeds C. add additional access points D. network management with CLI Correct Answer: AC QUESTION 94 After configuring VTP, you no longer receive updates as expected. Which command can you use to verify the number of VTP advertisements being transmitted? A. show vtp database B. show vtp counters C. show vtp statistics D. show vtp status QUESTION 95 Refer to the exhibit. A network administrator is troubleshooting an EIGRP connection between Router A and Router B. Given the debug output on Router A, which two statements are true? (Choose two.) A. Router A received a hello packet with mismatched autonomous system numbers. B. Router A received a hello packet with mismatched hello timers. C. Router A received a hello packet with mismatched authentication parameters. D. Router A received a hello packet with mismatched metric-calculation mechanisms. E. Router A will form an adjacency with Router B. F. Router A will not form an adjacency with Router B. Correct Answer: DF

QUESTION 96 Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the site-to-site VPN between Router A and Router B. What is the mostly likely cause of this fault? A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150?99). B. The IKE encryption methods on the two routers are different. C. The IPSec policy map names on the two routers are different. D. The IPSec rules on the two routers are not permitting the correct interesting traffic. QUESTION 97 The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points? A. 48-bit IV B. AES C. TKIP D. MIC QUESTION 98 Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.) A. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router. B. Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router. C. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or controllers. D. Layer 3 services can be configured in WLSM. E. Layer 3 services can be configured in WLSE. D QUESTION 99 You have just configured HSRP and need to determine which router is active.

Which command should you enter? A. show ip hsrp active B. show standby active C. show standby D. show active Correct Answer: C QUESTION 100 Which benefit can be obtained by using the change management service component in the operate phase? A. reduced operating costs, due to a consistent framework for making necessary changes in an efficient and accountable manner B. greater accuracy, completeness, and timeliness of network configuration information C. notification provided to interested parties regarding problems that have been identified, and a system that scales with customer requirements D. improved system service quality and fewer disruptions Correct Answer: A http://www.gratisexam.com/