gemxia's picture
From gemxia rss RSS  subscribe Subscribe

Cisco 642-812 exam 

Examkiller Cisco Certification exam:
Code: 642-812

 

 
 
Tags:  Cisco  Certification  exam  Cisco 642-812 
Views:  424
Downloads:  1
Published:  July 12, 2010
 
0
download

Share plick with friends Share
save to favorite
Report Abuse Report Abuse
 
Related Plicks
Cisco DQOS Exam Certification Guide (IP Telephony Self-Study)

Cisco DQOS Exam Certification Guide (IP Telephony Self-Study)

From: anon-390058
Views: 282 Comments: 0
Cisco DQOS Exam Certification Guide (IP Telephony Self-Study) ,cd library binder, alexandria library program, library st thomas vi, library of photography
 
See all 
 
More from this user
Examkiller Cisco 640-721 exam

Examkiller Cisco 640-721 exam

From: gemxia
Views: 276
Comments: 0

000-M48

000-M48

From: gemxia
Views: 200
Comments: 0

1Y0-A17

1Y0-A17

From: gemxia
Views: 496
Comments: 0

ExamKiller IBM 000-600 exam

ExamKiller IBM 000-600 exam

From: gemxia
Views: 281
Comments: 0

920-344

920-344

From: gemxia
Views: 283
Comments: 0

000-M60

000-M60

From: gemxia
Views: 229
Comments: 0

See all 
 
 
 URL:          AddThis Social Bookmark Button
Embed Thin Player: (fits in most blogs)
Embed Full Player :
 
 

Name

Email (will NOT be shown to other users)

 

 
 
Comments: (watch)
 
 
Notes:
 
Slide 1: Question: 1 What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)? A - VLAN instance mapping and revision number B - VLAN instance mapping and member list C - VLAN instance mapping, revision number, and member list D - VLAN instance mapping, revision number, member list, and timers Answer: A Question: 2 Refer to the exhibit. Switch P1S1 is not applying VLAN updates from switch P2S1. What are three reasons why this is not occurring? (Choose three.) A - Switch P2S1 is in server mode. B - Switch P1S1 is in transparent mode. C - The MD5 digests do not match. D - The passwords do not match.
Slide 2: E - The VTP domains are different. F - VTP trap generation is disabled on both switches. Answer: B, D, E Question: 3 Which two statements are true about HSRP, VRRP, and GLBP? (Choose two.) A - GLBP allows for router load balancing of traffic from a network segment without the different host IP configurations required to achieve the same results with HSRP. B - GLBP allows for router load balancing of traffic from a network segment by utilizing the creation of multiple standby groups. C - GLBP and VRRP allow for MD5 authentication, whereas HSRP does not. D - Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple available gateways. E - HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP does not. Answer: A, D Question: 4 Refer to the exhibit. Which statement is true when voice traffic is forwarded on the same VLAN used by the data traffic? A - Quality of service cannot be applied for the voice traffic. B - The voice traffic cannot be forwarded to the distribution layer. C - Port security cannot be enabled on the switch that is attached to the IP phone. D - The voice traffic cannot use 802.1p priority tagging. Answer: D Question: 5 Refer to the exhibit.
Slide 3: Both host stations are part of the same subnet but are in different VLANs. On the basis of the information presented in the exhibit, which statement is true about an attempt to ping from host to host? A - A trunk port will need to be configured on the link between Sw_A and Sw_B for the ping command to be successful. B - The two different hosts will need to be in the same VLAN in order for the ping command to be successful. C - A Layer 3 device is needed for the ping command to be successful. D - The ping command will be successful without any further configuration changes. Answer: D Question: 6 Examine the router output above. Which two items are correct? (Choose two.) A - Router A will assume the active state if its priority is the highest. B - If Ethernet 0/2 goes down, the standby router will take over. C - When Ethernet 0/3 of Router A comes back up, the priority will become 105. D - The local IP address of Router A is 10.1.0.6.
Slide 4: E - The local IP address of Router A is 10.1.0.20. Answer: A, C Question: 7 What must be configured on a Cisco switch in order to advertise VLAN information? A - VTP password B - VTP domain name C - VTP revision number D - VTP mode E - VTP pruning Answer: B Question: 8 Exhibit: Refer to the exhibit. The command spanning-tree bpdufilter enable is configured on interface Fa0/1 on switch S6. The link between switch S5 and S6 fails. Will Host A be able to reach Host B? A - Fifty percent of the traffic will successfully reach Host B, and fifty percent will dead-end at switch S3 because of a partial spanning-tree loop. B - No. Traffic will pass from switch S6 to S2 and dead-end at S2. C - No. Traffic will loop back and forth between switch S6 and Host A. D - No. Traffic will loop back and forth between switches S2 and S3. E - Yes. Traffic will pass from switch S6 to S2 to S1. Answer: E Question: 9 Refer to the exhibit.
Slide 5: Which two problems are the most likely cause of the exhibited output? (Choose two.) A - spanning tree issues B - HSRP misconfiguration C - VRRP misconfiguration D - physical layer issues E - transport layer issues Answer: B, D Question: 10 Which two statements concerning STP state changes are true? (Choose two.) A - Upon bootup, a port transitions from blocking to forwarding because it assumes itself as root. B - Upon bootup, a port transitions from blocking to listening because it assumes itself as root. C - Upon bootup, a port transitions from listening to forwarding because it assumes itself as root. D - If a forwarding port receives no BPDUs by the max_age time limit, it will transition to listening. E - If a forwarding port receives an inferior BPDU, it will transition to listening. F - If a blocked port receives no BPDUs by the max_age time limit, it will transition to listening. Answer: B, F Question: 11 What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals? A - RSTP information is automatically aged out. B - The port sends a TCN to the root bridge. C - The port moves to listening state. D - The port becomes a normal spanning tree port. Answer: A Question: 12 Which three statements about the Multiple Spanning Tree (MST) protocol (IEEE 802.1s) are true? (Choose three.) A - An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions. B - All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768. C - All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers. D - Enabling MST with the spanning-tree mode mst global configuration command also enables RSTP. E - To verity the MST configuration, the show pending command can be used in MST configuration mode. F - When RSTP and MSTP are configured, UplinkFast and BackboneFast must also be enabled. Answer: A, D, E Question: 13 Refer to the exhibit.
Slide 6: A workstation PC is connected to the Cisco IP phone access port. Based on the configuration in the exhibit, how will the traffic be managed? A - The IP phone access port will override the priority of the frames received from the PC. B - The IP phone access port will trust the priority of the frames received from the PC. C - The switch port Fa0/4 will override the priority of the frames received from the PC. D - The switch port Fa0/4 will trust the priority for the frames received from the PC. Answer: A Question: 14 Which protocol enables a group of routers to form a single virtual router and use the real IP address of a router as the gateway address? A - Proxy ARP B - HSRP C - IRDP D - VRRP E - GLBP Answer: D Question: 15 Which two statements are true about best practices in VLAN design? (Choose two.) A - Routing should occur at the access layer it voice VLANs are utilized. Otherwise, routing should occur at the distribution layer. B - Routing should always be performed at the distribution layer. C - Routing should not be performed between VLANs located on separate switches. D - VLANs should be localized to a switch. E - VLANs should be localized to a single switch unless voice VLANs are being utilized. Answer: B, D Question: 16 Exhibit:
Slide 7: Refer to the exhibit and the show interfaces fastethernet0/1 switchport outputs. Users in VLAN 5 on switch SW_A complain that they do not have connectivity to the users in VLAN 5 on switch SW_B. What should be done to fix the problem? A - Configure the same number of VLANs on both switches. B - Create switch virtual interfaces (SVI) on both switches to route the traffic. C - Define VLAN 5 in the allowed list for the trunk port on SW_A. D - Disable pruning for all VLANs in both switches. E - Define VLAN 5 in the allowed list for the trunk port on SW_B Answer: C Question: 17 Which two statements are true about voice packets in a LAN? (Choose two.) A - Voice traffic data flow involves large volumes of large packets. B - Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is. C - Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication. D - Voice packets are very sensitive to delay and jitter. E - Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery. Answer: C, D Question: 18
Slide 8: Exhibit: Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? (Choose two.) A - BPDUs will be sent out every two seconds. B - The time spent in the listening state will be 30 seconds. C - The time spent in the learning state will be 15 seconds. D - The maximum length of time that the BPDU information will be saved is 30 seconds. E - This switch is the root bridge for VL.AN 200. F - BPDUs will be sent out every 10 seconds. Answer: B, F Question: 19 Which two statements about the various implementations of STP are true? (Choose two.) A - Common Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in the network. B - The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard. C - Per-VLAN Spanning Tree (PVST) supports 802.1 Q trunking. D - Per-VLAN Spanning Tree Plus(PVST+) is an enhancement to 802.1Q specification and is supported only on Cisco devices. E - Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and BackboneFast for faster network reconvergence. F - Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network, regardless of the multiple number of VLANs. Answer: D, E Question: 20 Exhibit:
Slide 9: Refer to the exhibit. Which statement is true about the output? A - The port on switch CAT1 is forwarding and sending BPDUs correctly. B - The port on switch CAT1 is blocking and sending BPDUs correctly. C - The port on switch CAT2 is forwarding and receiving BPDUs correctly. D - The port on switch CAT2 is blocking and sending BPDUs correctly. E - The port on switch CAT3 is forwarding and receiving BPDUs correctly. F - The port on switch CAT3 is forwarding, sending, and receiving BPDUs correctly. Answer: A Question: 21 Exhibit:
Slide 10: Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1. Given the output that was generated, which two security statements are true? (Choose two.) A - Interface FastEthernet 0/1 was configured with the switchport port-security aging command. B - Interface FastEthernet 0/1 was configured with the switchport port-security protect command. C - Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict command. D - When the number of secure IP addresses reaches 10, the interface will immediately shut down. E - When the number of secure MAC addresses reaches 10, the interface will immediately shut down and an SNMP trap notification will be sent. Answer: B, E Question: 22 In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Choose three.) A - STP B - CDP C - EAP MD5 D - TACACS+ E - EAP-over-LAN F - protocols not filtered by an ACL Answer: A, B, E Question: 23 Which three interface commands will configure the switch port to support a connected Cisco phone and to trust the CoS values received on the port if CDP discovers that a Cisco phone is attached? (Choose three.)

   
Time on Slide Time on Plick
Slides per Visit Slide Views Views by Location