2013 Latest Cisco DESGN (640-864) Exam 141-145


Which attack type would you expect on segments that have many servers for some well-known applications?
A. Trojan horses
B. DoS attacks
C. Application-layer attacks
D. Password attacks
Correct Answer: C
Section: Security Explanation

Application security and content security defense.

Several new application layer network products have been released that help address new classes of threats, such as spam, phishing, spyware, packet abuse, and unauthorized point-to-point file sharing. Content security products such as Cisco IronPort Appliances provide comprehensive antivirus, antispyware, file-blocking, antispam, URL blocking, and content-filtering services. These products supplement traditional firewalls and network-based intrusion detection system (NIDS) solutions with more granular traffic inspection services, thereby quarantining traffic so that it does not propagate throughout the network.
Denial-of-service (DoS) attack – Tries to overwhelm resources such as memory, CPU, and bandwidth, thus impacting the attacked system and denying legitimate users access.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition

Which types of communicating devices compose RMON architecture ?(choose two)
A. Router
B. Switch
C. Management station
D. Monitor
Correct Answer: CD
Section: Management – Operations Explanation
RMON is a standard monitoring specification that enables network monitoring devices and console systems to exchange network monitoring data. RMON provides more information than SNMP, but more sophisticated data collection devices (network probes) are needed. RMON looks at MAC layer data and provides aggregate information on the statistics and LAN traffic. Enterprise networks deploy network probes on several network segments; these probes report back to the RMON console. RMON allows network statistics to be collected even if a failure occurs between the probe and the RMON console. RMON1 is defined by RFCs 1757 and 2819, and additions for RMON2 are defined by RFC 2021.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 15

Which FCAPS function includes finding network problems that reduce availability?
A. Security management
B. Accounting management
C. Fault management
D. Performance management
Correct Answer: C
Section: Management – Operations Explanation
The ISO defines five types of network management processes that are commonly known as FCAPS. These processes are as follows:
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 15

What is the name of the organization that is in charge of creating the FCAPS architecture?
Correct Answer: B
Section: Management – Operations Explanation
FCAPS was actually created by the ISO not the ITU-T so if the above is a type-o than B is the correct answer. However, the ITU-T did refine FCAPS as stated below. In the early 1980s the term FCAPS was introduced within the first Working Drafts (N1719) of ISO 10040, the Open Systems Interconnection (OSI) Systems Management Overview (SMO) standard. At that time the intention was to define five separate protocol standards, one for each functional area. Since initial experiences showed that these protocols would become very similar, the ISO working group responsible for the development of these protocols (ISO/ TC97/SC16/WG4, later renamed into ISO-IEC/JTC1/SC21/WG4) decided to create a single protocol for all five areas instead. This protocol is called common management information protocol (CMIP). In the 1990s the ITU-T, as part of their work on Telecommunications Management Network (TMN), further refined the FCAPS as part of the TMN recommendation on Management Functions (M.3400). The idea of FCAPS turned out to be very useful for teaching network management functions; most text books therefore start with a section that explains the FCAPS.

Define some of the activities, tools, and techniques used in today’s network-design process.(Choose three.)
A. Analyzing network traffic
B. Simulation of network traffic
C. Network auditing
D. Filtering incoming network traffic
Correct Answer: ABC
Section: Design Explanation

Characterizing the Existing Network

Characterizing the network is Step 2 of the design methodology. In this section, you learn to identify a networks major features, tools to analyze existing network traffic, and tools for auditing and monitoring network traffic.
Steps in Gathering Information
When arriving at a site that has an existing network, you need to obtain all the existing documentation. Sometimes no documented information exists. You should be prepared to use tools to obtain information and get access to log in to the network devices to obtain information.
Here are the steps for gathering information:
When gathering exiting documentation, you look for site information such as site names, site addresses, site contacts, site hours of operation, and building and room access. Network infrastructure information includes locations and types of servers and network devices, data center and closet locations, LAN wiring, WAN technologies and circuit speeds, and power used. Logical network information includes IP addressing, routing protocols, network management, and security access lists used. You need to find out whether voice or video is being used on the network.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 1 30. Which types of tools are used during the network design process? (Page 34)
Network management tools
Network trending tools
Network modeling tools
Network simulation and testing tools
Network implementation tools
30. C and D (Page 624)

Ensurepass offers Latest 2013 640-864 Real Exam Questions, help you to pass exam 100%.