Latest Cisco CCNP 642-813 SWITCH Real Exam Download 31-40

Ensurepass

QUESTION 31

During the implementation of a voice solution, which two required items are configured at an access layer switch that will be connected to an IP phone to provide VoIP communication? (Choose two.)

 

A.        allowed codecs

B.        untagged VLAN

C.        auxiliary VLAN

D.        Cisco Unified Communications Manager IP address

E.         RSTP

 

Correct Answer: BC

 

 

QUESTION 32

Which two statements best describe Cisco IOS IP SLA? (Choose two.)

 

A.       only implemented between Cisco source and destination-capable devices

B.       statistics provided by syslog, CLI, and SNMP

C.       measures delay, jitter, packet loss, and voice quality

D.      only monitors VoIP traffic flows

E.       provides active monitoring

 

Correct Answer: CE

 

 

QUESTION 33

Which two items best describe a Cisco IOS IP SLA responder? (Choose two.)

 

A.        required at the destination to implement Cisco IOS IP SLA services

B.        improves measurement accuracy

C.        required for VoIP jitter measurements

D.        provides security on Cisco IOS IP SLA messages via LEAP or EAP-FAST authentication

E.         responds to one Cisco IOS IP SLA operation per port

F.         stores the resulting test statistics

 

Correct Answer: BC

 

 

QUESTION 34

Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancy using NSF? (Choose two.)

 

A.        supported by RIPv2, OSPF, IS-IS, and EIGRP

B.        uses the FIB table

C.        supports IPv4 and IPv6 multicast

D.        prevents route flapping

E.         independent of SSO

F.         NSF combined with SSO enables supervisor engine load balancing

 

Correct Answer: BD

 

 

QUESTION 35

You are tasked with designing a security solution for your network. What information should be gathered before you design the solution?

 

A.        IP addressing design plans, so that the network can be appropriately segmented to mitigate potential network threats

B.        a list of the customer requirements

C.        detailed security device specifications

D.        results from pilot network testing

 

Correct Answer: B

 

 

 

QUESTION 36

Which two components should be part of a security implementation plan? (Choose two.)

 

A.        detailed list of personnel assigned to each task within the plan

B.        a Layer 2 spanning-tree design topology

C.        rollback guidelines

D.        placing all unused access ports in VLAN 1 to proactively manage port security

E.         enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis

 

Correct Answer: BC

 

 

QUESTION 37

When creating a network security solution, which two pieces of information should you have obtained previously to assist in designing the solution? (Choose two.)

 

A.        a list of existing network applications currently in use on the network

B.        network audit results to uncover any potential security holes

C.        a planned Layer 2 design solution

D.        a proof-of-concept plan

E.         device configuration templates

 

Correct Answer: AB

 

 

QUESTION 38

What action should you be prepared to take when verifying a security solution?

 

A.        having alternative addressing and VLAN schemes

B.        having a rollback plan in case of unwanted or unexpected results

C.        running a test script against all possible security threats to insure that the solution will mitigate all potential threats

D.        isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

 

Correct Answer: B

 

 

QUESTION 39

When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?

 

A.        No more than one secure MAC address should be set.

B.        The default is set.

C.        The IP phone should use a dedicated port, therefore only one MAC address is needed per port.

D.        No value is needed if the switchport priority extend command is configured.

E.         No more than two secure MAC addresses should be set.

 

Correct Answer: E

 

 

QUESTION 40

Refer to the exhibit. From the configuration shown, what can be determined?

 

clip_image002

 

A.        The sticky addresses are only those manually configured MAC addresses enabled with the sticky keyword.

B.        The remaining secure MAC addresses are learned dynamically, converted to sticky secure MAC addresses, and added to the running configuration.

C.        A voice VLAN is configured in this example, so port security should be set for a maximum of 2.

D.        A security violation restricts the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port is shut down if more than 10 devices per VLAN attempt to access the port.

 

Correct Answer: B

 

 

 

Download Latest Cisco 642-813 SWITCH Real Free Tests , help you to pass exam 100%.

 

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.