2013 Latest Cisco Designing for Cisco Internetwork Solutions Exam DESGN v2.1 640-864 EXAM download 216-220
Which network management protocol allows a network device to have vendor-specific objects for management?
A. SNMP v1
B. SNMP v2
C. SNMP v3
Correct Answer: A
Section: Management – Operations Explanation
A MIB is not a network management protocol. The MIB is a database that contains the objects, but it’s just
a database, not a network management protocol.
RMON is often called a protocol, but does not in fact define any new protocol operations; RMON is a MIB
module for SNMP that describes objects that permit advanced network management capabilities. There are
2 versions of RMON: RMON1 (RMONv1)and RMON2 (RMONv2). RMON1 defined 10 MIB groups for basic
network monitoring, which can now be found on most modern network hardware. RMON2 (RMONv2) is an
extension of RMON that focuses on higher layers of traffic above the medium access-control (MAC) layer.
RMON2 has an emphasis on IP traffic and application-level traffic. RMON2 allows network management
applications to monitor packets on all network layers. This is difference from RMON which only allows
network monitoring at MAC layer or below.
SNMP is the only network management protocol in the list above.
SNMPv1 supports “vendor-specific objects”, but this information is hard to find
A Management Information Base (MIB) is a collection of information that is stored on the local agent of the managed device. MIBs are organized hierarchically and are accessed by the NMS. MIBs are databases of objects organized in a tree-like structure, with each branch containing similar objects. Each object has a unique object identifier (number) that uniquely identifies the managed object of the MIB hierarchy. Read and write community strings are used to control access to MIB information. The top-level MIB object IDs belong to different standards organizations and lower-level object IDs are allocated to associated organizations. Standard MIBs are defined by RFCs. Vendors define private branches that include managed objects for their products. RFC 1213 describes the MIBs for TCP/IP. Cisco defines the MIBs under the Cisco head object. For example, a Cisco MIB can be uniquely identified by either the object name, iso.org. dod.private.enterprise.cisco, or the equivalent object descriptor, 18.104.22.168.4.1.9.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 15
Which two solutions are parts of the Cisco Security Management Suite? (Choose two.)
B. Cisco Security Agent
C. NAC Appliance
F. Cisco Security MARS
Correct Answer: DF
Solutions of the Cisco Security Management Suite are:
Cisco Security Manager (CSM) is an integrated solution for conguration management of rewall, VPN, router, switch module, and IPS devices.
Cisco Secure Access Control Server (ACS) provides centralized control for administrative access to Cisco devices and security applications.
Cisco Security Monitoring, Analysis, and Response System (MARS) is an appliance-based solution for network security administrators to monitor, identify, isolate, and respond to security threats.
Management Center for CSA (CSA MC) is an SSL web-based tool for managing Cisco Security Agent congurations.
Cisco Router and Security Device Manager (SDM) is a web-based tool for routers and supports a wide range of IOS software.
Cisco Adaptive Security Device Manager (ASDM) is a web-based tool for managing Cisco ASA 5500 series appliances, PIX 500 series appliances (version 7.0 or higher), and Cisco Catalyst 6500 Firewall Services Modules (FWSM version 3.1 or higher).
Cisco Intrusion Prevention System Device Manager (IDM) is a web-based application that congures
and manages IPS sensors.
(Reference. CCDA Official Exam Certification Guide 3rd)
When monitoring voice traffic on a converged network, which are the three most important QoS characteristics to pay attention to? (Choose three.)
C. packet loss
D. bit error rate
E. CRTP hop configuration
Correct Answer: ABC
Section: QoS Explanation
Packets might not arrive at a constant rate because they take different paths and have perhaps experienced congestion in the network. Real-time applications such as voice and video are not very tolerant to jitter and delay.
Table identifies various application requirements for data, voice, and video traffic.
Packet loss is another item that affects voice and video quality. It causes voice and video clipping and skips. It is caused by several factors: congested links, improper QoS configuration, bad packet buffer management, and routing issues. Packet loss is also caused by packets received outside of the dejitter buffer range, which are packets that are discarded. Cisco VoIP uses 20-ms samples of voice payload per VoIP packet. Codec algorithms can then correct up to 30 ms of lost voice. For the codec correction to be effective, only 1 packet can be lost during any given time. When this occurs, the DSP interpolates the conversation with what it thinks the audio should be.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition
An internal network has servers with private IPv4 addresses that must be visible from the public network. Which kind of address translation should be used to ensure this?
A. many-to-one translation (PAT)
B. many-to-one translation (Dynamic NAT)
C. one-to-one translation (Static NAT)
D. one-to-one translation (NAT Traversal)
Correct Answer: C
Section: Security Explanation
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 8 (Page 281 – 282)
Which two of these are the most accurate characteristics of EIGRP deployment? (Choose two.)
A. Provides features for most Ethernet, Frame Relay, and dial-up network deployment types.
B. Provides routing for IPv4, IPv6, Appletalk, and IPX.
C. Provides default hierarchical routing and summarization of a VLSM IP address deployment.
D. Provides quick convergence through neighbor relationships and topology backup routes.
E. Provides the best route selection on combined default metrics of active bandwidth, delay, load, reliability, and MTU parameters.
Correct Answer: BD
Section: Routing Explanation
EIGRP is sometimes referred to as a hybrid routing protocol because it has characteristics of both distance-vector and link-state protocols. For example, EIGRP doesnt send link-state packets as OSPF does; instead, it sends traditional distance-vector updates containing information about networks plus the cost of
reaching them from the perspective of the advertising router. And EIGRP has link-state characteristics as
well-it synchronizes routing tables between neighbors at startup, and then sends specific updates only when
topology changes occur. This makes EIGRP suitable for very large networks. EIGRP has a maximum hop
count of 255. There are a number of powerful features that make EIGRP a real standout from IGRP and
The main ones are listed here:
Support for IP, IPX, and AppleTalk via protocol-dependent modules.
Considered classless (same as RIPv2 and OSPF)
Support for VLSM/CIDR
Support for summaries and discontiguous networks
Efficient neighbor discovery
Communication via Reliable Transport Protocol (RTP)
Best path selection via Diffusing Update Algorithm (DUAL)
One of the most interesting features of EIGRP is that it provides routing support for multiple
Network layer protocols: IP, IPX, and AppleTalk. The only other routing protocol that comes close and
supports multiple network layer protocols is Intermediate System-to-Intermediate System (IS-IS), but it only
supports IP and Connectionless Network Service (CLNS). EIGRP supports different Network layer
protocols through the use of protocol-dependent modules (PDMs). Each EIGRP PDM will maintain a
separate series of tables containing the routing information that applies to a specific protocol. What this
means to you is that there will be IP/EIGRP tables, IPX/EIGRP tables, and AppleTalk/EIGRP tables.
EIGRP for IPv4 Summary
The characteristics of EIGRP for IPv4 networks follow:
Hybrid routing protocol (a distance-vector protocol that has link-state protocol characteristics).
Uses IP protocol number 88.
Classless protocol (supports VLSMs).
Default composite metric uses bandwidth and delay.
You can factor load and reliability into the metric.
Sends partial route updates only when there are changes.
Supports MD5 authentication.
Uses DUAL for loop prevention.
By default, equal-cost load balancing with equal metrics. Unequal-cost load sharing with the variance command.
Administrative distance is 90 for EIGRP internal routes, 170 for EIGRP external routes, and 5 for EIGRP summary routes.
High scalability; used in large networks.
Multicasts updates to 22.214.171.124.
Does not require a hierarchical physical topology.
Provides routing for IPv4, plus legacy protocols such as AppleTalk and IPX.
EIGRP implements DUAL to select paths and guarantee freedom from routing loops. J. J. Garcia Luna-Aceves developed DUAL. It is mathematically proven to result in a loop-free topology, providing no need for periodic updates or route hold-down mechanisms that make convergence slower. DUAL selects a best path
and a second-best path to reach a destination. The best path selected by DUAL is the successor, and the second-best path (if available) is the feasible successor. The feasible distance is the lowest calculated metric of a path to reach the destination.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 10
Ensurepass offers Latest 2013 640-864 Real Exam Questions, help you to pass exam 100%.