Download New Updated (Spring 2015) Cisco 640-864 Actual Tests 51-60

Ensurepass

 

QUESTION 51

Which one of these statements is true concerning the data center distribution (aggregation) layer design?

 

A.      With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.

B.      The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices such as firewalls or content switching devices.

C.      A mix of both Layer 2 and Layer 3 access is sometimes the most optimal.

D.      In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.

 

Correct Answer: C

 

 

QUESTION 52

When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?

 

A.      802.1X

B.      ACLs in the core layer

C.      Cisco Security MARS

D.      Cisco Firewall Services Module

 

Correct Answer: C

 

QUESTION 53

A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at e- commerce hosts. The connection rate at the Internet firewall was limited, but the problem persists. What more can be done?

 

A.      Move the servers to the DMZ.

B.      Install all relevant operating system patches.

C.      Block the servers’ TCP traffic at the Internet firewall.

D.      Block the servers’ UDP traffic at the Internet firewall.

 

Correct Answer: B

 

 

QUESTION 54

RST Corporation is planning to upgrade its current network. The chief technology officer has supplied a topology diagram and an IP addressing scheme of the current network during an interview. RST has been growing at about twenty percent per year. It has been difficult to maintain customer support at a satisfactory level. Therefore, the RST board has met with and directed the chief technology officer to look into network improvements. Which two items are most relevant in documenting RST’s business requirements? (Choose two.)

 

A.      existing network topologies

B.      network performance requirements

C.      the IP addresses assigned by the ISP

D.      improved customer support requirements

E.       projected growth estimates

 

Correct Answer: DE

 

 

QUESTION 55

Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two.)

 

A.      a best-effort method

B.      bandwidth guaranteed based on interface configuration

C.      designed as an alternative to a failed WAN connection

D.      implemented with a point-to-point logical link using a Layer 2 tunnel

E.       requires no ISP coordination or involvement

 

Correct Answer: AC

 

 

 

QUESTION 56

Which two design criteria require VLANs in a proposed solution? (Choose two.)

 

A.      the segmenting of collision domains

B.      a limited corporate budget

C.      the use of multivendor equipment

D.      security between departments

E.       video streaming on the LAN

F.       the segmenting of broadcast domains

 

Correct Answer: DF

 

 

QUESTION 57

Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two.)

 

A.      SSL Acceleration Network Module

B.      VPN Shared Port Adapter

C.      VPN Acceleration Module

D.      high-performance VPN encryption AIM

E.       VPN Service Adapter

F.       built-in hardware-based encryption acceleration

 

Correct Answer: DF

 

 

QUESTION 58

Which three factors best justify WAN link redundancy between geographically dispersed sites? (Choose three.)

 

A.      high expense of transmitting data

B.      important traffic flows

C.      excessive packet transmission rate

D.      uncertain reliability

E.       high link utilization

F.       lack of speed

 

Correct Answer: BDF

 

 

 

 

 

 

QUESTION 59

Which three pieces of information should be documented for each step of each phase in a design implementation plan? (Choose three.)

 

A.      easy guidelines in case of failure

B.      estimated rollback time in case of failure

C.      simple implementation guidelines

D.      estimated implementation time

E.       design document references

F.       step description

 

Correct Answer: DEF

 

 

QUESTION 60

The topology map in the draft design document should cover which two layers of the OSI model? (Choose two.)

 

A.      session

B.      data link

C.      transport

D.      application

E.       physical

F.       network

 

Correct Answer: EF

 

Free VCE & PDF File for Cisco 640-864 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …