2013 Latest Cisco Designing for Cisco Internetwork Solutions Exam DESGN v2.1 640-864 EXAM download 61-65
In a Cisco CatOS switch, what is the recommended practice when configuring switch-to-switch intercommunications to carry multiple VLANs for Dynamic Trunk Protocol?
A. auto to auto_negotiate
B. disable Dynamic Trunk Protocol when operating in the distribution layer
C. auto to auto_no_negotiate
D. desirable to desirable_no_negotiate
E. on to on_negotiate
F. desirable to desirable_negotiate
Correct Answer: E
Section: Management – Operations Explanation
Access Layer Best Practices
When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design. Performance in the access layer is also important. Redundancy and QoS features should be considered.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3
What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks? (Choose two.)
A. Voice networks cannot carry data unless the PRI circuits aggregate the BRI circuits.
B. Their PSTNs cannot deploy features quickly enough.
C. Data, voice, and video cannot converge on their current PSTN structures.
D. Voice has become the primary traffic on networks.
E. WAN costs can be reduced by migrating to converged networks.
Correct Answer: CE
Section: Voice Video Explanation
VoIP provides transport of voice over the IP protocol family. IP makes voice globally available regardless of the data-link protocol in use (Ethernet, ATM, Frame Relay). With VoIP, enterprises do not have to build separate voice and data networks. Integrating voice and data into a single converged network eliminates duplicate infrastructure, management, and costs.
Figure 14-7 shows a company that has separate voice and data networks. Phones connect to local PBXs, and the PBXs are connected using TDM trunks. Off-net calls are routed to the PSTN. The data network uses LAN switches connected to WAN routers. The WAN for data uses Frame Relay. Separate operations and management systems are required for these networks. Each system has its corresponding monthly WAN charges and personnel, resulting in additional costs.
With separate voice and data networks,
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 14 (Page 532)
A lightweight access point is added to a working network. Which sequence will it use to associate itself with a wireless LAN controller?
A. primary, secondary, tertiary, greatest AP capacity, master
B. primary, secondary, tertiary, master, greatest AP capacity
C. master, primary, secondary, tertiary, greatest AP capacity
D. greatest AP capacity, primary, secondary, tertiary, master
Correct Answer: B
Section: Wireless Explanation
WLAN Controller Platforms
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 5
Which three mechanisms are required to deploy QoS on an IP WAN? (Choose three.)
A. queuing and scheduling
B. Call Admission Control
C. traffic shaping
D. link efficiency techniques
E. traffic classification
F. bandwidth provisioning
Correct Answer: CDE
Section: QoS Explanation
Queuing, Traffic Shaping, and Policing
Cisco has developed many different QoS mechanisms, such as queuing, policing, and traffic shaping, to enable network operators to manage and prioritize the traffic flowing on the network. Applications that are delay sensitive, such as VoIP, require special treatment to ensure proper application functionality. Queuing refers to the buffering process used by routers and switching when they receive traffic faster than can be transmitted. Different queuing mechanisms can be implemented to influence the order in which the different queues are serviced (that is, how different types of traffic are emptied from the queues). Table 6-6 identifies QoS considerations to optimize bandwidth.
Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 6
Which two statements best describe the implementation of Overlay VPN connectivity for remote access in the Enterprise Edge WAN module? (Choose two.)
A. Bandwidth is provisioned on a site-to-site basis.
B. It uses dedicated point-to-point links.
C. Optimum routing between customer sites requires a full mesh of virtual circuits.
D. It must use Layer 2 labels to forward packets
E. The ISP actively participates in customer routing.
Correct Answer: AC
Section: WAN VPN Explanation
The network layer in the TCP/IP protocol suite consists of the IP routing systemhow reachability information is conveyed from one point in the network to another. There are a few methods to construct VPNs within the network layer; each is examined in the following paragraphs. A brief overview of non-IP VPNs is provided in Part II of this article.A brief overview of the differences in the “peer” and “overlay” VPN models is appropriate at this point. Simply put, the “peer” VPN model is one in which the network-layer forwarding path computation is done on a hop-by-hop basis, where each node in the intermediate data transit path is a peer with a next-hop node. Traditional routed networks are examples of peer models, where each router in the network path is a peer with its next-hop adjacencies. Alternatively, the “overlay” VPN model is one in which the network-layer forwarding path is not done on a hop-by-hop basis, but rather, the intermediate linklayer network is used as a “cut-through” to another edge node on the other side of a large cloud.
Examples of “overlay” VPN models include ATM, Frame Relay, and tunneling implementations.Having drawn these simple distinctions between the peer and overlay models, it should be noted that the overlay model introduces some serious scaling concerns in cases where large numbers of egress peers are required because the number of adjacencies increases in direct proportion to the number of peersthe amount of computational and performance overhead required to maintain routing state, adjacency information, and other detailed packet forwarding and routing information for each peer becomes a liability in very large networks. If all the egress nodes in a cut-through network become peers in an effort to make all egress nodes one “Layer 3” hop away from one another, the scalability of the VPN overlay model is limited quite remarkably.
Ensurepass offers Latest 2013 640-864 Real Exam Questions, help you to pass exam 100%.