Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 642-889 Exam - Cheat-Test.com

Free 642-889 Sample Questions:

Q: 1
Which three Layer 3 VPN technologies are based on the overlay model? (Choose three.)
A. ATM virtual circuits
B. Frame Relay virtual circuits
C. GRE/IPsec
D. L2TPv3
E. MPLS Layer 3 VPNs
F. DMVPNs
Answer: C,D,F
Explanation:
The overlay model, where the service provider provides emulated leased lines to the customer. The service provider provides the customer with a set of emulated leased lines. These leased lines are calledVCs, which can be either constantly available (PVCs) or established on demand (SVCs). The QoSguarantees in the overlay VPN model usually are expressed in terms of bandwidth guaranteed on a certain VC(Committed Information Rate or CIR) and maximum bandwidth available on a certain VC (Peak InformationRate or PIR). The committed bandwidth guarantee usually is provided through the statistical nature of theLayer 2 service but depends on the overbooking strategy of the service providerThe peer-to-peer model, where the service provider and the customer exchange Layer 3 routing informationand the provider relays the data between the customer sites on the optimum path between the sites andwithout the customer's involvement.
The peer-to-peer VPN model was introduced a few years ago to alleviate the drawbacks of the overlay VPNmodel. In the peer-to-peer model, the Provider Edge (PE) device is a router (PErouter) that directly exchangesrouting information with the CPE router. The Managed Network service offered by many service providers,where the service provider also manages the CPE devices, is not relevant to this discussion because it's only arepackaging of another service. The Managed Network provider concurrently assumes the role of the VPNservice provider providing the VPN infrastructure) and part of the VPN customer role (managing the CPEdevice).
The peer-to-peer model provides a number of advantages over the traditional overlay model:
Routing (from the customer's perspective) becomes exceedingly simple, as the customer router exchangesrouting information with only one (or a few) PE-router, whereas in the overlay VPN network, the number ofneighbor routers can grow to a large number.
Routing between the customer sites is always optimal, as the provider routers know the customer's networktopology and can thus establish optimum inter-site routing.
Bandwidth provisioning is simpler because the customer has to specify only the inbound and outboundbandwidths for each site (Committed Access Rate [CAR] and Committed Delivery Rate [CDR]) and not theexact site-to-site traffic profile.
The addition of a new site is simpler because the service provider provisions only an additional site andchanges the configuration on the attached PE-router. Under the overlay VPN model, the service provider mustprovision a whole set of VCs leading from that site to other sites of the customer VPN.
Prior to an MPLS-based VPN implementation, two implementation options existed for the peer-topeer VPNmodel:
The shared-router approach, where several VPN customers share the same PE-router.
The dedicated-router approach, where each VPN customer has dedicated PE-routers.

Q: 2
Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?
A. DMVPN
B. GET VPN
C. SSL VPN
D. L2TPv3
Answer: B
Explanation:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps7180/deployment_guide_c07_554713.html

Q: 3
What is the primary difference between 6PE and 6VPE?
A. 6VPE does not require an MPLS core.
B. 6VPE requires an IPv6-aware core.
C. 6VPE provides IPv6 VPN services.
D. 6VPE tunnels IPv6 packets inside IPv4 packets.
Answer: C
Explanation:
6PE is for transporting ipv6 natively and 6VPE is for ipv6 mpls vpns

Q: 4
In MPLS Layer 3 VPN implementations, what is used on the PE router to isolate potential overlapping routing information between different customers?
A. route targets
B. VRFs
C. VC IDs
D. pseudowire IDs
E. pseudowire classes
Answer: B

Q: 5
Within the service provider IP/MPLS core network, what must be implemented to enable Layer 3 MPLS VPN services?
A. IS-IS or OSPF on all the PE and P routers
B. MP-BGP between the PE routers
C. RSVP on all the PE and P routers
D. targeted LDP between the PE routers
E. LDP between the CE and PE routers
Answer: B

Q: 6
In MPLS Layer 3 VPN implementations, which mechanism is used to control which routes are imported to a VRF?
A. RT
B. RD
C. VC ID
D. PW ID
E. VRF ID
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved