Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 642-874 Exam -

Free 642-874 Sample Questions:

1.Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
Answer: B

2.As a critical part of the design for the Enterprise Campus network, which of the following two are true concerning intrusion detection and prevention solution .? (Choose two)
A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable of promiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload of the packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warnings that have relatively low value because no action is likely to be taken on this information
Answer: C,E

3.From a design perspective which two of the following OHPF Statements are most relevant? (Choose two)
A. OSPF stub areas can be thought of as a simple form of summarization
B. OSPF cannot filter intra area routes
C. An ARR ran only exist in two areas - the backbone and one adjacent area
D. Performance issues in the Backbone area can be offset by allo wing some traffic to transit a non-backbone area
E. the size of an area (the LSDB) will be constrained by the size of the IP MTU
Answer: A,D

4.OSPF stub areas are an important tool for the Network designer; whi ch of the following two should be considered when utilizing OSPF stub areas? A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B. OSPF not so stubby areas are particularly useful as a simpler form of summarization
C. OSPF stub areas are always insulated from external changes
D. OSPF totally stubby cannot distinguish among ABRs for the best route to destinations outside the areas
E. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPF domain
Answer: B,D

5.Which two statements are correct regarding Flex Links? (Choose two)
A. An interface can belong to multiple Flex Links.
B. Flex Links operate only over single pairs of links.
C. Flex Link pairs must be of the same interface type
D. Flex Links automatically disable STP so no BPDUs are propagated
E. Failover from active to standby on Flex Links takes less than a second
Answer: B,D

6.Which of these technologies is characterized as being a multipoint Layer 2 VPN that connects two or more customer devices using Ethernet bridging techniques?
Answer: C

7.When is a first-hop redundancy protocol needed in the distribution layer?
A. when the design implements Layer 2 between the access arid distribution blocks
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution blocks
F. when the design implements Layer 2 between the access and distribution blocks
Answer: F

8.Why is STP required when VLANs span access layer switches?
A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology
Answer: B

9.When designing the IP routing for the Enterprise Campus network, which of these following two iBGB considerations should be taken into account?
A. iBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a trans it network
B. iBGP requires a full mesh of eBGP peers
C. Routers will not advertise iBGP learned routers to other iBGP peers.
D. The use of route reflections or Confederation eliminate any full mesh requirement while helping to scale iBGP
E. iGBP peers do not add any information to the AS path
Answer: A,D

10.Which virtualization technology allows multiple physical devices to be combined into a single logical device?
A. device visualization
B. device clustering
C. server visualization
D. network visualization
Answer: B

11.Which two of these are characteristics of MPLS VPNs? (Choose two)
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
Answer: A,B

12.Which technology is an example of the need for a designer to clearly define features and designed performance when designing advanced WAN services with a service provider?
A. FHRP to remote branches.
B. Layer 3 MPLS VPNs routing.
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall su pport network wide.
Answer: B

13.Which two restrictions must the Enterprise Campus network designer consider when evaluating WAN connectivity options? (Choose two)
A. OSPF over multicast EMS or VPLS network may not have con sistent broadcast or multicast performance
B. IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must be utilized with service provider support
C. QoS requirements with MPLS-VPN must be implemented by the service provider
D. Hierarchical VPLS designs are the least scalable
E. IGMP snooping is not on option with VPLS or EMS; instead admi nistrative scoping or allowing sufficient bandwidth for unnecessary multicast traffic at the edge links is required
Answer: A,C

14.There are 3 steps to confirm whether a range of IP address can be summarized. When of the following is used in each of these 3 steps?
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
Answer: A

15.Which two statements about layer 3 access designs are correct? (Choose two.)
A. IP address space is difficult to manage.
B. Broadcast and fault domains arc increased
C. Convergence time is fractionally slower than STP
D. Limits on clustering and NIC teaming are removed
E. Fast uplink convergence is supported tor failover and fallback
Answer: A,E

16.Which of these recommendations is most appropriate for t he core layer in the Cisco Campus Architecture?
A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
Answer: A

17.Which of the following is true concerning best design practices at th e switched Access layer of the traditional layer2 Enterprise Campus Network?
A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections fr om Access switches to redundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information
Answer: C three Layer 2 access designs have all of their uplinks in an acti ve state? (Choose three)
A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U
Answer: B,C,E

19.In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
Answer: A

20.When an Enterprise Campus network designer is addressing the merger of two companies with different IGPs, which of the following is considering a super r outing design?
A. Eliminate the management and support for redistribution by choosing and cutting over to a single IGP at the time of merger
B. Maintain distinct pockets across a moving boundary of routing pro tocols, redistributing between them
C. Manipulate the administrative distance of the different IGPs to be equal throughout the network
D. Leave the IGPs independent without redistribution wherever communication between company entities is not required
Answer: B

© 2014, All Rights Reserved