Which two of these are characteristics of multicast routing? (Choose two.)
A. multicast routing uses RPF.
B. multicast routing is connectionless.
C. In multicast routing, the source of a packet is known.
D. When network topologies change, multicast distribution trees are not rebuilt, but use the original path
E. Multicast routing is much like unicast routing, with the only difference being that it has a a group of receivers
rather than just one destination
Which of the following is most accurate with respect to designing high availability within the Enterprise Campus network?
A. High availability at and between the Distribution and Access layers is as simple as redundant switches
and redundant Layer 3 connections
B. Non-deterministic traffic patterns require a highly available modular topology design
C. Distribution layer high availability design includes redundant switches and Layer 3 equal-cost load sharing
connections to the switched Access and routed Core layers, with a Layer 3 link between the Distribution
switches to support summarization of routing information from the Distribution to the Core
D. Default gateway redundancy allows for the failure of a redundant Distribution switch without affecting
Which of the following should the Enterprise Campus network designer consider with respect to Video traffic?
A. While it is expected that the sum of all forms of video traffic will grow to over 90% by 2013, the
Enterprise will be spared this rapid adoption of video by consumers through a traditional top-down approach
B. Avoid bandwidth starvation due to video traffic by preventing and controlling the wide adoption
of unsupported video applications
C. Which traffic model is in use, the flow direction for the traffic streams between the application
components, and the traffic trends for each video application
D. Streaming video applications are sensitive to delay while interactive video applications, using
TCP as the underlying transport, are fairly tolerant of delay and jitter
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? (Choose two.)
A. Never use passive interfaces.
B. Use NSSA areas from the core down.
C. Use totally stub areas to stop type 3 LSAs.
D. Use the lowest Ethernet interface IP address as the router ID.
E. Manipulate the reference bandwidth.
Which two design recommendations are most appropriate when EIGRP is the data center core routing protocol? (Choose two.)
A. Summarize data center subnets.
B. Advertise a default route into the data center core from the aggregation layer.
C. Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.
D. Adjust the default bandwidth value to ensure proper bandwidth on all links.
Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
A. Flex Links
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Which three statements about Network Attached Storage are correct? (Choose three.)
A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between servers.
E. A NAS implementation is not as fast as a DAS implementation.
In a collapsed core design, which three benefits are provided by a second-generation Cisco MDS director? (Choose three.)
A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D. all ISLs contained within a single chassis
E. higher latency and throughput than a core-edge design switch
Which two statements about both FCIP and iSCSI are correct? (Choose two.)
A. They support file-level storage for remote devices.
B. They require high throughput with low latency and low jitter.
C. Their purpose is to provide connectivity between host and storage.
D. They support block-level storage for remote devices.
E. Their purpose is to provide connectivity between separate wide-area SANs.
Which three statements about zoning are correct? (Choose three.)
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
If you want to pass Cisco 642-874 successfully, donot missing to read latest lead2pass Cisco 642-874 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.