2013 Latest Cisco Designing for Cisco Internetwork Solutions Exam DESGN v2.1 640-864 EXAM download 41-45
Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?
A. Authentication validation should be deployed as close to the data center as possible.
B. Use the principle of top-down privilege, which means that each subject should have the privileges that are necessary to perform their defined tasks, as well as all the tasks for those roles below them.
C. Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible.
D. For ease of management, practice defense in isolation security mechanisms should be in place one time, in one place.
Correct Answer: C
Section: Security Explanation
Validating user authentication should be implemented as close to the source as possible, with an emphasis on strong authentication for access from untrusted networks. Access rules should enforce policy deployed throughout the network with the following guidelines:
An integral part of identity and access control deployments is to allow only the necessary access. Highly distributed rules allow for greater granularity and scalability but, unfortunately, increase the management complexity. On the other hand, centralized rule deployment eases management but lacks flexibility and scalability.
Practicing defense in depth by using security mechanisms that back each other up is an important concept to understand. For example, the perimeter Internet routers should use ACLs to filter packets in addition to the firewall inspecting packets at a deeper level.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 13
Which of these is the equation used to derive a 64 Kbps bit rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words
Correct Answer: D
Section: Voice Video Explanation
While the human ear can sense sounds from 20 to 20, 000 Hz, and speech encompasses sounds from about 200 to 9000 Hz, the telephone channel was designed to operate at about 300 to 3400 Hz. This economical range carries enough fidelity to allow callers to identify the party at the far end and sense their mood. Nyquist decided to extend the digitization to 4000 Hz, to capture higher-frequency sounds that the telephone channel may deliver. Therefore, the highest frequency for voice is 4000 Hz. According to Nyquist theory, we must double the highest frequency, so 2x4kHz = 8kHz.
Each sample will be encoded into a 8-bit code. Therefore 8kHz x 8-bit code = 64 Kbps (notice about the unit Kbps: 8kHz = 8000 samples per second so 8000 x 8-bit = 64000 bit per second = 64 Kilobit per second = 64 Kbps)
Nyquist theory: When sampling a signal (e.g., converting from an analog signal to digital), the sampling
frequency must be greater than twice the bandwidth of the input signal in order to be able to reconstruct the
original perfectly from the sampled version.
Which one of these statements best describes the challenge of the designer when dealing with IP routing?
A. OSPF supports fast convergence does not require periodic routing table updates, so the optional network design is best simplified with the network as a single backbone area.
B. Manual summarization is limited to ABRs and ASBRs, therefore the designer must pay strict attention to the EIGRP topology.
C. EIGRP, as a proprietary protocol, has special challenges when dealing with networks deployed with IPv6.
D. Effective scalability with OSPF requires the designer to pay strict attention to the hierarchical network structure, localizing topology changes.
Correct Answer: D
Section: Routing Explanation
OSPF demands modular design, multiple areas for functioning optimally.
When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?
B. ACLs in the core layer
C. Cisco Security MARS
Correct Answer: A
Section: Security Explanation
Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Chose three)
A. provides end-user connectivity
B. provides high speed transport
C. provides QoS services
D. enforces security policies
E. provides WAN connection
F. connects access devices to the core backbone
Correct Answer: CDF
Section: Design Explanation
provides QoS services, enforces security policies and connects access devices to the core backbone are properties of distribution layer. Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html#wp708979
Ensurepass offers Latest 2013 640-864 Real Exam Questions, help you to pass exam 100%.