シスコ技術者認定に対応した642-873問題集
を提供しています。CCDP といったシスコ認定資格を取得するための近道となります.642-873
問題集IT認証の専門家によって力を尽くして作り上げたの問題集で、精度が高くて一回で合格することを保証しますそれに万が一不合格になる場合全額返済します。何とかして、このすごさをお伝えさせて頂きたい!!全額返金キャンペンも実施いたします。
642-873無料
問題集、皆さん、参考のため、ご覧ください
1. Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Answer: B
2. Which of these is a Layer 2 transport architecture that provides packet-based transmission optimized
for data based on a dual (counter-rotating) ring topology?
A. DTP
B. RPR
C. SDH
D. CWDM
E. DWDM
Answer: B
3. Which three of these are elements of the Cisco Unified Wireless Network architecture? (Choose three)
A. cell phones
B. remote access
C. mobility services
D. network management
E. network unification
F. network decentralization
Answer: CDE
6. Which two of these are characteristics of an IDS sensor? (Choose two.)
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IDS interface and exits on another
E. has a promiscuous interface that is used to monitor the network
Answer: AE
7. In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
Answer: A
8. In which two locations in an enterprise network can an IPS sensor be placed? (Choose two.)
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking
Answer: CD
9. What is a virtual firewall?
A. another name for a firewall deployed in routed mode
B. another name for a firewall deployed in transparent mode
C. a separation of multiple firewall security contexts on a single firewall
D. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E. a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
Answer: C
10. In a VoWLAN deployment, what is the recommended separation between cells with the same
channel?
A. 19 dBm
B. 7 dBm
C. 10 dBm
D. 6 dBm
E. 5 dbm to 10 dBm
Answer: A
12. Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act
as remote VPN clients in order to receive predefined security policies and configuration parameters from
the VPN headend at the central site?
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
Answer: A
13. Which two design concerns must be addressed when designing a multicast implementation? (Choose
two.)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses Answer: AF
14. Which two of these are recommended practices with trunks? (Choose two.)
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
Answer: BE