2013 Latest Cisco DESGN (640-864) Exam 21-25

Ensurepass
 

QUESTION 21
What is primary consideration when choosing a routed network design over a traditional campus network design?
A. Layer 3 service support at the network edge
B. the routing protocol choice: open (OSPF) or proprietary (EIGRP)
C. the routing abilities of the host devices
D. the need to control the broadcast domains within the campus core
Correct Answer: A
Section: Design Explanation
Layer 3 ability at network edge should be available to leverage the benefits of routed network design. Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html

QUESTION 22
Which two statements best describe an OSPF deployment? (Choose two)
A. ABR provides automatic classful network boundary summarization.
B. ABR requires manual configuration for classful network summarization
C. External routes are propagated into the autonomous system from stub areas via ASBR.
D. External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.
E. External routes are propagated into the autonomous system from regular areas or NSSA via ABR.
Correct Answer: BD
Section: Routing Explanation
Refer to the link below, the protocol is designed to function that way.
Link: http://www.cisco.com/en/US/tech/tk365/technologies_white_paper09186a0080094e9e.shtml

QUESTION 23
Refer to the exhibit.
Which module is the Enterprise WAN module?
A. Enterprise A
B. Enterprise B
C. Enterprise C
D. Enterprise D
E. Enterprise E
F. Enterprise F
Correct Answer: C
Section: Architecture Explanation
WAN module consists of WAN link terminal devices, routers, firewalls, remoteaccess services.
Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html#wp708780

QUESTION 24
A large enterprise requires sensitive information be transmitted over a public infrastructure. It requires confidentiality, integrity, and authenticity. Which security solution best meets these requirements?
A. Cisco IOS Firewall
B. Intrusion Prevention
C. IPSec
D. AAA
E. Traffic Guard Protector
F. SECURE CONECTIVITY
Correct Answer: C
Section: Security Explanation
IPSec provides CIA (Confidentiality, Integrity & Authencity)
Link: http://nl.wikipedia.org/wiki/IPsec

QUESTION 25
There are a number of advantages to using virtualization within the data center module. Which the following two are samples of these advantages?
A. Virtualization consolidates many low-performance devices into a few high-performance devices, providing a more efficient utilization of hardware and increasing the price/performance ratio.
B. Virtualization compartmentalizes a single device into a few high-performance devices, providing a more efficient utilization of hardware and increasing the price/performance ratio.
C. Dynamic forcibility eliminates the need to add, reassign, or repurpose resources in the system.
D. Virtualization separates user via different physical networks into groups with visibility into only their logical network.
E. Virtualization provides distinct security policies per physical device.
Correct Answer: AD
Section: Data Center Explanation
From CCDA 640-864 Official Cert Guide – Page 142
Here are some of the common benefits achieved through virtualization techniques:

Better use of computing resources, higher server densities, and simplified server migrations

Provides flexibility for ease of management for adds, reassignments, or repurposingresources

Separation of users groups on the same physical network, enabling traffic isolation

Ability to provide per-department security policies

Reduction in power and space required

Increased uptime and reduced operational costs
or from CCDP guide page 303
Device virtualization:
Device virtualization allows multiple logical devices of a certain type, which have different roles, to be run inside a single physical device, instead of using separate physical devices for each of these roles. For example, a solution such as VMware ESX, Microsoft Hyper-V, or Citrix XenServer allows you to run multiple virtual machines (servers or PCs) inside a single physical piece of server hardware. Other examples are the use of virtual device context in firewalls, load balancers, or switches. A major benefit of device virtualization is that several low-performance devices can be replaced by one high-performance device. This replacement typically yields a better price-to-performance ratio. Another benefit is the added flexibility that makes it easier to add, reassign, or repurpose resources in the system.

Ensurepass offers Latest 2013 640-864 Real Exam Questions, help you to pass exam 100%.