Category Archives: Cisco

Passed Cisco 642-874 Exam with Pass4sure and Lead2pass PDF & VCE (21-30)

There are 3 steps to confirm whether a range of IP addresses can be summarized. Which of the
following is used in each of these 3 steps?

A.    The first number in the contiguous block of addresses
B.    The last number in the contiguous block of addresses
C.    The size of the contiguous block of addresses
D.    The subnet mask of the original network address

Answer: C

A well-designed IP addressing scheme supporting role-based functions within the subnet will result in the most efficient use of which technology?

A.    Layer 3 switching in the core
B.    Network Admission Control (NAC)
C.    IP telephony (voice and video) services
D.    ACLs

Answer: D

Which of the following is true regarding the effect of EIGRP queries on the network design?

A.    EIGRP queries will be the most significant issue with respect to stability and convergence
B.    EIGRP queries are not a consideration as long as EIGRP has a feasible successor with a next hop AD
that is greater than the FD of the current successor route
C.    EIGRP queries will only increase the convergence time when there are no EIGRP stubs designed in
the network

Answer: A

Which of the following is a result when designing multiple EIGRP autonomous systems within the Enterprise Campus network?

A.    Improves scalability by dividing the network using summary routes at AS boundaries
B.    Decreases complexity since EIGRP redistribution is automatically handled in the background
C.    Reduces the volume of EIGRP queries by limiting them to one EIGRP AS
D.    Scaling is improved when a unique AS is run at the Access, Distribution, and Core layers of the network

Answer: A

When designing the routing for an Enterprise Campus network it is important to keep which of the following route filtering aspects in mind?

A.    Filtering is only useful when combined with route summarization
B.    It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remote sites
or site-to-site IPsec VPN networks
C.    IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding inappropriate transit traffic
through remote nodes or inaccurate or inappropriate routing updates
D.    The primary limitation of router filtering is that it can only be applied on outbound updates

Answer: B

Which statement is the most accurate regarding IPsec VPN design for an Enterprise Campus environment?

A.    VPN device IP addressing must align with the existing Campus addressing scheme.
B.    The choice of a hub-and-spoke or meshed topology ultimately depends on the number of remotes.
C.    Sizing and selection of the IPsec VPN headend devices is most affected by the throughput bandwidth
requirements for the remote offices and home worker
D.    Scaling considerations such as headend configuration, routing protocol choice, and topology have the
broadest impact on the design.

Answer: D

Refer to the exhibit. The Cisco Nexus 1000V in the VMware vSphere solution effectively creates an additional access layer in the virtualized data center network; which of the following 1000V characteristics can the designer take advantage of?


A.    Offloads the STP requirement from the external Access layer switches
B.    If upstream access switches do not support vPC or VSS the dual-homed ESX host traffic can still be
distributed using virtual port channel host mode using subgroups automatically discovered through CDP
C.    Allows transit traffic to be forwarded through the ESX host between VMNICs
D.    Can be divided into multiple virtual device contexts for service integration, enhanced security, administrative
boundaries, and flexibility of deployment

Answer: B

Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?

A.    Layer 3 routing between the Access and Aggregation layers facilitates the ability to span VLANs across
multiple access switches, which is a requirement for many server virtualization and clustering technologies.
B.    "East-west" server-to-server traffic can travel between aggregation modules by way of the core, but backup
and replication traffic typically remains within an aggregation module.
C.    Load balancing, firewall services, and other network services are commonly integrated by the use of service
modules that are inserted in the aggregation switches.
D.    Virtualization tools allow a cost effective approach for redundancy in the network design by using two or four
VDCs from the same physical switch.

Answer: C

Support of vPC on the Cisco Nexus 5000 access switch enables various new design options for the data center Access layer, including which of the following?

A.    The vPC peer link is not required for Access layer control traffic, and can instead be used to span VLANs
across the vPC access switches
B.    A single switch can associate per-interface with more than one vPC domain
C.    vPC can be used on both sides of the MEC, allowing a unique 16-link EtherChannel to be built between
the access and aggregation switches
D.    Allows an EtherChannel between a server and a access switch while still maintaining the level of availability
that is associated with dual-homing a server to two different access switches

Answer: C

Which technology is an example of the need for a designer to clearly define features and desired performance when designing advanced WAN services with a service provider?

A.    FHRP to remote branches
B.    Layer 3 MPLS VPNs secure routing
C.    Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service
D.    Intrusion prevention, QoS, and stateful firewall support network wide

Answer: B

If you want to pass Cisco 642-874 successfully, donot missing to read latest lead2pass Cisco 642-874 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

Passed Cisco 642-874 Exam with Pass4sure and Lead2pass PDF & VCE (11-20)

OSPF stub areas are an important tool for the Network designer; which of the following two should be considered when utilizing OSPF stub areas? (Choose two)

A.    OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B.    OSPF not so stubby areas are particularly useful as a simpler form of summarization
C.    OSPF stub areas are always insulated from external changes
D.    OSPF totally stubby areas cannot distinguish among ABRs for the best route to destinations outside the area
E.    OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPF domain

Answer: CD

Which two protocol characteristics should be most considered when designing a single unified fabric for the Data Center? (Choose two.)

A.    FCIP or FCoE allow for easier integration by using the Fibre Channel Protocol (FCP) and Fibre Channel framing
B.    iSCSI uses a special EtherType and an additional header containing additional control information
C.    FCIP and iSCSI has higher overhead than FCoE owing to TCP/IP
D.    FCoE was initially developed to be used as a switch-to-switch protocol, while FCIP is primarily meant to
be used as an access layer protocol to connect hosts and storage to a Fibre Channel SAN
E.    FCoE requires gateway functionality to integrate into an existing Fibre Channel network

Answer: AC

Drag the best practice recommendation for an Enterprise Campus network on the left to the technology to which it most applies on the right.



Drag and Drop Questions



Drag and Drop Questions



Which of these Layer 2 access designs does not support VLAN extensions?

A.    FlexLinks
B.    loop-free U
C.    looped square
D.    looped triangle
E.    loop-free inverted U

Answer: B

Which statement about Fibre Channel communications is correct?

A.    N_Port to N_Port connections use logical node connection points.
B.    Flow control is only provided by QoS.
C.    It must be implemented in an arbitrated loop.
D.    Communication methods are similar to those of an Ethernet bus.

Answer: A

In base e-Commerce module designs, where should firewall perimeters be placed?

A.    core layer
B.    Internet boundary
C.    aggregation layer
D.    aggregation and core layers
E.    access and aggregation layers

Answer: A

The Cisco Nexus 1000V is intended to address which disadvantage of the VMware vSphere solution?

A.    Inability to deploy new functional servers without requiring physical changes on the network
B.    Complexity added by the requirement for an ESX host for each virtual machine
C.    Network administrators lack control of the access layer of the network
D.    To increase the number of physical infrastructure and the virtual machines that can be managed

Answer: C

With respect to address summarization, which of the following statements concerning IPv4 and IPv6 is true?

A.    The potential size of the IPv6 address blocks suggests that address summarization favors IPv6 over IPv4.
B.    Role based addressing using wildcard masks to match multiple subnets is suitable for IPv4, but unsuitable
for IPv6.
C.    In order to summarize, the number of subnets in the IPv4 address block should be a power of 2 while the
number of subnets in the IPv6 address block should be a power of 64.
D.    WAN link addressing best supports summarization with a /126 subnet for IPv4 and a /31 for IPv6.

Answer: B

If you want to pass Cisco 642-874 successfully, donot missing to read latest lead2pass Cisco 642-874 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

Passed Cisco 642-874 Exam with Pass4sure and Lead2pass PDF & VCE (1-10)

Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?

A.    Because the IP phone is a three-port switch, IP telephony extends the network edge, impacting the
Distribution layer.
B.    Video and voice are alike in being bursty and bandwidth intensive, and thus impose requirements to
be lossless, and have minimized delay and jitter.
C.    IP phones have no voice and data VLAN separation, so security policies must be based on upper layer
traffic characteristics.
D.    Though multi-VLAN access ports are set to dot1q and carry more than two VLANs they are not trunk ports.

Answer: D

Addressing QoS design in the Enterprise Campus network for IP Telephony applications means what?

A.    It is critical to identify aggregation and rate transition points in the network, where preferred traffic and
congestion QoS policies should be enforced
B.    Suspect traffic should be dropped closest to the source, to minimize wasting network resources
C.    An Edge traffic classification scheme should be mapped to the downstream queue configuration
D.    Applications and Traffic flows should be classified, marked and policed within the Enterprise Edge of the
Enterprise Campus network

Answer: A

The requirement for high availability within the Data Center network may cause the designer to consider which one of the following solutions?

A.    Construct a hierarchical network design using EtherChannel between a server and two VDCs from the
same physical switch
B.    Utilize Cisco NSF with SSO to provide intrachassis SSO at Layers 2 to 4
C.    Define the Data Center as an OSPF NSSA area, advertising a default route into the DC and summarizing
the routes out of the NSSA to the Campus Core
D.    Implement network services for the Data Center as a separate services layer using an active/active model
that is more predictable in failure conditions

Answer: B

When designing remote access to the Enterprise Campus network for teleworkers and mobile workers, which of the following should the designer consider?

A.    It is recommended to place the VPN termination device in line with the Enterprise Edge firewall, with
ingress traffic limited to SSL only
B.    Maintaining access rules, based on the source IP of the client, on an internal firewall drawn from a
headend RADIUS server is the most secure deployment
C.    VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when
the remote user community is small and dedicated DHCP scopes are in place
D.    Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick), including
at Layer7

Answer: D

Which three statements about firewall modes are correct? (Choose three.)

A.    A firewall in routed mode has one IP address.
B.    A firewall in transparent mode has one IP address.
C.    In routed mode, the firewall is considered to be a Layer 2 device.
D.    In routed mode, the firewall is considered to be a Layer 3 device.
E.    In transparent mode, the firewall is considered to be a Layer 2 device.
F.    In transparent mode, the firewall is considered to be a Layer 3 device.

Answer: BDE

Which two of these correctly describe asymmetric routing and firewalls? (Choose two.)

A.    only operational in routed mode
B.    only operational in transparent mode
C.    only eight interfaces can belong to an asymmetric routing group
D.    operational in both failover and non-failover configurations
E.    only operational when the firewall has been configured for failover

Answer: CD

Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.)

A.    You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with
SSO in a Layer 3 environment.
B.    SSO and NSF each require the devices to either be graceful restart-capable or graceful restart- aware.
C.    In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence
times than single supervisors with tuned IGP timers
D.    The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E.    Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers

Answer: AC

Refer to the exhibit. Which of the following two are advantages of Server virtualization using VMware vSphere? (Choose two)


A.    Retains the one-to-one relationship between switch ports and functional servers
B.    Enables the live migration of a virtual server from one physical server to another without disruption to
users or loss of services
C.    The access layer of the network moves into the vSphere ESX servers, providing streamlined vSphere
D.    Provides management functions including the ability to run scripts and to install third-party agents for
hardware monitoring, backup, or systems management
E.    New functional servers can be deployed with minimal physical changes on the network

Answer: BD

Which of the following two are effective and simple means of employing route summarization within the Enterprise Campus network? (Choose two)

A.    A default route ( /0) advertised dynamically into the rest of the network
B.    Route filtering to manage traffic flows in the network, avoid inappropriate transit traffic through remote
nodes, and provide a defense against inaccurate or inappropriate routing updates
C.    Use manual split horizon
D.    Use a structured hierarchical topology to control the propagation of EIGRP queries
E.    Open Shortest Path First (OSPF) stub areas

Answer: AE

From a design perspective which two of the following OSPF statements are most relevant? (Choose two)

A.    OSPF stub areas can be thought of as a simple form of summarization
B.    OSPF cannot filter intra-area routes
C.    An ABR can only exist in two areas – the backbone and one adjacent area
D.    Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area
E.    The size of an area (the LSDB) will be constrained by the size of the IP MTU

Answer: AB

If you want to pass Cisco 642-874 successfully, donot missing to read latest lead2pass Cisco 642-874 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

Updated Cisco 300-208 PDF & VCE Free Download Now

Implementing Cisco Secure Access Solutions: 300-208 Exam
300-208 Questions & Answers
Exam Code: 300-208
Exam Name: Implementing Cisco Secure Access Solutions
Q & A: 93 Q&As

How frequently does the Profiled Endpoints dashlet refresh data?
A. every 30 seconds
B. every 60 seconds
C. every 2 minutes
D. every 5 minutes
Answer: B

Continue reading

Free Download Cisco 300-206 PDF Full Version Now

Implementing Cisco Edge Network Security Solutions: 300-206 Exam
300-206 Questions & Answers
Exam Code: 300-206
Exam Name: Implementing Cisco Edge Network Security Solutions
Q & A: 95 Q&As

A network administrator is creating an ASA-CX administrative user account with the following
– The user will be responsible for configuring security policies on
network devices.
– The user needs read-write access to policies.
– The account has no more rights than necessary for the job.
What role will be assigned to the user?
A. Administrator
B. Security administrator
C. System administrator
D. Root Administrator
E. Exec administrator
Answer: B

Continue reading

Free Download Cisco 700-302 PDF Full Version Now

Advanced Borderless Network Architecture Field Engineer Exam : 700-302 Exam
700-302 Questions & Answers
Exam Code: 700-302
Exam Name: Advanced Borderless Network Architecture Field Engineer Exam
Q & A: 65 Q&As

How do network administrators identify problem areas and locate them in the context of access
point floor, building, and campus locations?
A. Cisco EnergyWise
B. Cisco EnergyWise Orchestrator Sustainability Dashboard
C. Cisco IronPort Web Security Appliance
D. Air Quality Index charts
Answer: D

Continue reading

Free Download Pass4sure Cisco CCIE 400-051 Dumps

CCIE Collaboration Written: 400-051 Exam
400-051 Questions & Answers
Exam Code: 400-051
Exam Name: CCIE Collaboration Written
Q & A: 162 Q&As

Which two statements describe security services that are provided by the Phone Proxy function on a Cisco ASA appliance? (Choose two.)
A. it is supported only on phones that use SCCP.
B. It is supported on an adaptive security appliance that runs in transparent mode.
C. It provides interworking to ensure that the external IP phone traffic is encrypted, as long as the Cisco Unified Communications Manager cluster runs in secure mode.
D. It provides a proxy of phone signaling, with optional use of NAT, to hide the Cisco Unified Communications Manager IP address from the public Internet.
E. it proxies phone media so that internal phones are not directly exposed to the Internet.
F. it supports IP phones that send phone proxy traffic through a VPN tunnel.
Answer: DE

Continue reading

Free Download Pass4sure Cisco CCENT 640-822 Exam Questions

640-822 Questions & Answers

Exam Code: 640-822

Exam Name: Interconnecting Cisco Networking Devices Part 1 (ICND1)

Q & A: 353 Q&As 

Refer to the exhibit. What is needed to allow host A to ping host B?
A. a straight-through cable connecting the switches
B. a crossover cable connecting the switches
C. a router connected to the switches with straight-through cables
D. a CSU/DSU connected to the switches with straight-through cables
E. a backbone switch connecting the switches with either fiber optic or straight-through cables
Answer: C
Hotspot question. Click on the correct location or locations in the exhibit.
All 5 questions.
PS: You can see the Comprehensive Question Description & Topology and Answer
& Explanation From Full Version.
Host A needs to communicate with the email server shown in the graphic. What address will be
placed in the destination address field of the frame when it leaves Host A?A. the MAC address of Host A
B. the MAC address of Switch 1
C. the MAC address of E0 of the router
D. the MAC address of E1 of the router
E. the MAC address of Switch 2
F. the MAC address of the email server
Answer: C
Refer to the exhibit. The DHCP settings have recently been changed on the DHCP server and the
client is no longer able to reach network resources. What should be done to correct this situation?
A. Verify that the DNS server address is correct in the DHCP pool.
B. Ping the default gateway to populate the ARP cache.
C. Use the tracert command on the DHCP client to first determine where the problem is located.
D. Clear all DHCP leases on the router to prevent address conflicts.
E. Issue the ipconfig command with the /release and /renew options in a command window.
Answer: E


100% Pass Guaranteed or Full Refund

Lead2Pass 640-822 braindumps can ensure you a passing score in the test. However, if you fail the 640-822 exam at the first attempt after using our products, we will arrange a Full Refund to you. You just need to send your 640-822 score report and some relevant forms to us. After confirming your information, we will proceed for the guarantee claim to eliminate your worries.Besides, the product you buy will be updated in time within 150 Days for free.

[OFFER] LAN Switching and Wireless: CCNA Exploration Companion Guide

LAN Switching and Wireless, CCNA Exploration Companion Guide is the official supplemental textbook for the LAN Switching and Wireless course in the Cisco Networking Academy CCNA® Exploration curriculum version 4. This course provides a comprehensive approach to learning the technologies and protocols needed to design and implement a converged switched network. The Companion Guide, written and edited by a Networking Academy instructor, is designed as a portable desk reference to use anytime, anywhere. The book’s features reinforce the material in the course to help you focus on important concepts and organize your study time for exams.

Wayne Lewis is the Cisco Academy Manager for the Pacific Center for Advanced Technology Training (PCATT), based at Honolulu Community College.

Continue reading

Pages: 1 2 ... 86 87 88 89 90 91 92 93