IT업계에 종사하시는 분들은 IT인증시험을 통한 자격증취득의 중요성을 알고 계실것입니다. ITExamDump에서 제공해드리는 인증시험대비 고품질 덤프자료는 제일 착한 가격으로 여러분께 다가갑니다. ITExamDump덤프는 IT인증시험에 대비하여 제작된것으로서 높은 적중율을 자랑하고 있습니다.덤프를 구입하시면 일년무료 업데이트서비스, 시험불합격시 덤프비용환불 등 퍼펙트한 서비스도 받을수 있습니다.
ITExamDump는 믿을 수 있는 사이트입니다. IT업계에서는 이미 많이 알려져 있습니다. 그리고 여러분에 신뢰를 드리기 위하여 Cisco 인증642-874 관련자료의 일부분 문제와 답 등 샘플을 무료로 다운받아 체험해볼 수 있게 제공합니다. 아주 만족할 것이라고 믿습니다. ITExamDump제품에 대하여 아주 자신이 있습니다. Cisco 인증642-874 도 여러분의 무용지물이 아닌 아주 중요한 자료가 되리라 믿습니다. 여러분께서는 아주 순조로이 시험을 패스하실 수 있을 것입니다.
시험 번호/코드: 642-874
시험 이름: Cisco (Designing Cisco Network Service Architectures)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 281 문항
업데이트: 2013-10-10
아직도 Cisco인증642-874시험준비를 어떻게 해야 할지 망설이고 계시나요? 고객님의 IT인증시험준비길에는 언제나 ITExamDump가 곁을 지켜주고 있습니다. ITExamDump시험공부자료를 선택하시면 자격증취득의 소원이 이루어집니다. Cisco인증642-874시험덤프는ITExamDump가 최고의 선택입니다.
인터넷에는Cisco인증 642-874시험대비공부자료가 헤아릴수 없을 정도로 많습니다.이렇게 많은Cisco인증 642-874공부자료중 대부분 분들께서 저희ITExamDump를 선택하는 이유는 덤프 업데이트가 다른 사이트보다 빠르다는 것이 제일 큰 이유가 아닐가 싶습니다. ITExamDump의 Cisco인증 642-874덤프를 구매하시면 덤프가 업데이트되면 무료로 업데이트된 버전을 제공받을수 있습니다.
ITExamDump 의 학습가이드에는Cisco 642-874인증시험의 예상문제, 시험문제와 답입니다. 그리고 중요한 건 시험과 매우 유사한 시험문제와 답도 제공해드립니다. ITExamDump 을 선택하면 ITExamDump 는 여러분을 빠른시일내에 시험관련지식을 터득하게 할 것이고Cisco 642-874인증시험도 고득점으로 패스하게 해드릴 것입니다.
Cisco인증642-874시험을 패스하기가 어렵다고 하면 합습가이드를 선택하여 간단히 통과하실 수 잇습니다. 우리ITExamDump에서는 무조건 여러분을 위하여 관연 자료덤프 즉 문제와 답을 만들어낼 것입니다. 우리덤프로Cisco인증642-874시험준비를 잘하시면 100%Cisco인증642-874시험을 패스할 수 있습니다. ITExamDump덤프로 여러분은Cisco인증642-874시험을 패스는 물론 여러분의 귀증한 간도 절약하실 수 있습니다.
642-874 덤프무료샘플다운로드하기: http://www.itexamdump.com/642-874.html
NO.1 Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
Answer: B
Cisco 642-874 642-874자격증 642-874시험문제 642-874
NO.2 There are 3 steps to confirm whether a range of IP address can be summarized. When of the following
is used in each of these 3 steps?
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
Answer: C
Cisco 642-874인증 642-874 642-874 642-874기출문제
NO.3 Which two statements are correct regarding Flex Links? (Choose two)
A. An interface can belong to multiple Flex Links.
B. Flex Links operate only over single pairs of links.
C. Flex Link pairs must be of the same interface type
D. Flex Links automatically disable STP so no BPDUs are propagated
E. Failover from active to standby on Flex Links takes less than a second
Answer: B,D
Cisco 642-874 642-874 642-874자격증
NO.4 Which of the following is true concerning best design practices at the switched Access layer of the
traditional layer2 Enterprise Campus Network?
A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access
layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections from Access switches to redundant
Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information
Answer: A
Cisco 642-874 642-874기출문제 642-874 642-874최신덤프 642-874 pdf
NO.5 In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
Answer: A
Cisco dumps 642-874자격증 642-874 642-874 pdf
NO.6 Which of these recommendations is most appropriate for the core layer in the Cisco Campus
Architecture?
A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
Answer: A
Cisco자료 642-874인증 642-874 642-874 642-874 642-874
NO.7 OSPF stub areas are an important tool for the Network designer; which of the following two should be
considered when utilizing OSPF stub areas? (Choose two)
A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B. OSPF not so stubby areas are particularly useful as a simpler form of summarization
C. OSPF stub areas are always insulated from external changes
D. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPF domain
E. OSPF totally stubby areas cannot distinguish among ABRs for the best route to destinations outside
the area
Answer: C,E
Cisco 642-874 dump 642-874 dumps 642-874 642-874 pdf
NO.8 DRAG DROP
Drag the characteristic on the left the associated firewall deployment or topology on the right.
Answer:
NO.9 When an Enterprise Campus network designer is addressing the merger of two companies with
different IGPs, which of the following is considered a superior routing design?
A. Eliminate the management and support for redistribution by choosing and cutting over to a single IGP
at the time of merger
B. Maintain distinct pockets across a moving boundary of routing protocols, redistributing between them
C. Manipulate the administrative distance of the different IGPs to be equal throughout the network
D. Leave the IGPs independent without redistribution wherever communication between company entities
is not required
Answer: B
Cisco dump 642-874 642-874 642-874자격증 642-874
NO.10 Which three routing protocols can minimize the number of routes advertised in the network? (Choose
three)
A. IGRP
B. RIPv2
C. OSPF
D. EIGRP
E. BGP
Answer: B,C,D
Cisco자격증 642-874 642-874 642-874
NO.11 DRAG DROP
Drag the characteristic on the left to the corresponding IPSec VPN solution on the right.
Answer:
NO.12 Which technology is an example of the need for a designer to clearly define features and desired
performance when designing advanced WAN services with a service provider?
A. FHRP to remote branches.
B. Layer 3 MPLS VPNs secure routing
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.
Answer: B
Cisco 642-874 642-874시험문제 642-874 642-874 642-874
NO.13 Why is STP required when VLANs span access layer switches?
A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology
Answer: B
Cisco인증 642-874최신덤프 642-874 642-874최신덤프
NO.14 Which virtualization technology allows multiple physical devices to be combined into a single logical
device?
A. device visualization
B. device clustering
C. server visualization
D. network visualization
Answer: B
Cisco덤프 642-874 dumps 642-874 pdf 642-874 642-874최신덤프
NO.15 Which of these technologies is characterized as being a multipoint Layer 2 VPN that connects two or
more customer devices using Ethernet bridging techniques?
A. DPT
B. MPLS
C. VPLS
D. CWDM
E. DWDM
F. SONET/SDH
Answer: C
Cisco dumps 642-874자료 642-874 642-874
NO.16 How does ERS use the VLAN tag?
A. to provide service internetworking
B. to support transparency for Layer 2 frames
C. as a connection identifier to indicate destination
D. as a mapping to the DLCI in service internetworking
E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites
Answer: C
Cisco 642-874자격증 642-874최신덤프 642-874
NO.17 DRAG DROP
Drag the best practice recommendation for an Enterprise Campus network on the left to the technology to
which it most applies on the right.
Answer:
NO.18 Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U
Answer: B,C,E
Cisco최신덤프 642-874 642-874 dump 642-874시험문제 642-874
NO.19 As a critical part of the design for the Enterprise Campus network, which of the following two are true
concerning intrusion detection and prevention solution? (Choose two)
A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable of promiscuous
monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layers 3 and 4 as well as analyzing the contents and payload of the
packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warnings that have
relatively low value because no action is likely to be taken on this information
Answer: C,D
Cisco시험문제 642-874기출문제 642-874인증 642-874
NO.20 Which two of these are characteristics of MPLS VPNs? (Choose two)
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
Answer: A,B
Cisco 642-874자격증 642-874자격증 642-874
ITexamdump의 CAT-500덤프의 VCE테스트프로그램과 LOT-958덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 000-955시험에 대비한 고품질 덤프와 1z0-822시험 최신버전덤프를 제공해드립니다. 최고품질 200-101시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.
댓글 없음:
댓글 쓰기