Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 642-873 Exam - Cheat-Test.com

Free 642-873 Sample Questions:

1. Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Answer: B

2. Which of these is a Layer 2 transport architecture that provides packet-based transmission optimized for data based on a dual (counter-rotating) ring topology?
A. DTP
B. RPR
C. SDH
D. CWDM
E. DWDM
Answer: B

3. Which three of these are elements of the Cisco Unified Wireless Network architecture? (Choose three)
A. cell phones
B. remote access
C. mobility services
D. network management
E. network unification
F. network decentralization
Answer: C, D, E

4. Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
A. Flex Links
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Answer: B, C, E

5. Which of these terms refers to call issues that cause variations in timing or time of arrival?
A. queuing
B. jitter
C. packet loss
D. digitized sampling
E. signal-to-noise ratio ratio
Answer: B

6. Which two of these are characteristics of an IDS sensor? (Choose two.)
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IDS interface and exits on another
E. has a promiscuous interface that is used to monitor the network
Answer: A, E

7. In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
Answer: A

8. In which two locations in an enterprise network can an IPS sensor be placed? (Choose two.)
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking
Answer: C, D

9. What is a virtual firewall?
A. another name for a firewall deployed in routed mode
B. another name for a firewall deployed in transparent mode
C. a separation of multiple firewall security contexts on a single firewall
D. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E. a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
Answer: C

10. In a VoWLAN deployment, what is the recommended separation between cells with the same channel?
A. 19 dBm
B. 7 dBm
C. 10 dBm
D. 6 dBm
E. 5 dbm to 10 dBm
Answer: A

11. Why is STP required when VLANs span access layer switches?
A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology
Answer: B

12. Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
Answer: A

13. Which two design concerns must be addressed when designing a multicast implementation? (Choose two.)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
Answer: A, F

14. Which two of these are recommended practices with trunks? (Choose two.)
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
Answer: B, E

15. For acceptable voice calls, the packet error rate should be no higher than what value?
A. 0.1%
B. 1%
C. 2.5%
D. 25%
Answer: B

16. Which of these statements is true of clientless end-user devices?
A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required in order to assign IP addresses.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.
Answer: A

17. Which statement is correct regarding NBAR and NetFlow?
A. NetFlow uses five key fields for the flow.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.
E. NetFlow examines data in Layers 2 through 4.
Answer: B

18. What is meant by the term "firewall sandwich"?
A. multiple layers of firewalling
B. a method of operating firewalls from multiple vendors
C. firewall connections in either an active or standby state
D. an architecture in which all traffic between firewalls goes through application-specific servers
E. an architecture in which all traffic between firewalls goes through application-specific gateways
Answer: A

19. When BGP tuning is used, how is packet flow into the e-commerce module controlled?
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved