IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CCDP 642-874 (Designing Cisco Network Service Architectures)시험대비 덤프

CCDP 642-874 (Designing Cisco Network Service Architectures)시험이 너무 어려워서 시험 볼 엄두도 나지 않는다구요? Pass4Test 덤프만 공부하신다면 IT인증시험 공부고민은 이젠 그만 하셔도 됩니다. Pass4Test에서 제공해드리는  CCDP 642-874 (Designing Cisco Network Service Architectures)시험대비 덤프는 덤프제공사이트에서 가장 최신버전이여서 시험패스는 한방에 갑니다. CCDP 642-874 (Designing Cisco Network Service Architectures)시험뿐만 아니라 IT인증시험에 관한 모든 시험에 대비한 덤프를 제공해드립니다. 많은 애용 바랍니다.

 

NO.1 As a critical part of the design for the Enterprise Campus network, which of the following two are true

concerning intrusion detection and prevention solution? (Choose two)

A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable of promiscuous

monitoring

B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.

C. IPS processes information on Layers 3 and 4 as well as analyzing the contents and payload of the

packets for more sophisticated embedded attacks (Layers 3 to 7)

D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly

E. IDS placement at the perimeter of Data Center outside the firewall generates many warnings that have

relatively low value because no action is likely to be taken on this information

Answer: C,D


NO.2 OSPF stub areas are an important tool for the Network designer; which of the following two should be

considered when utilizing OSPF stub areas? (Choose two)

A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs

B. OSPF not so stubby areas are particularly useful as a simpler form of summarization

C. OSPF stub areas are always insulated from external changes

D. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPF domain

E. OSPF totally stubby areas cannot distinguish among ABRs for the best route to destinations outside

the area

Answer: C,E


NO.3 Which two of these are characteristics of MPLS VPNs? (Choose two)

A. Layer 3 MPLS VPNs can forward only IP packets

B. Layer 2 MPLS VPNs can forward any network protocol

C. MPL S label paths are automatically formed based on Layer 2 frames

D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames

E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

Answer: A,B


NO.4 In base e-Commerce module designs, where should firewall perimeters be placed?

A. core layer

B. Internet boundary

C. aggregation layer

D. aggregation and core layers

E. access and aggregation layers

Answer: A


NO.5 How does ERS use the VLAN tag?

A. to provide service internetworking

B. to support transparency for Layer 2 frames

C. as a connection identifier to indicate destination

D. as a mapping to the DLCI in service internetworking

E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

Answer: C


NO.6 Which three routing protocols can minimize the number of routes advertised in the network? (Choose

three)

A. IGRP

B. RIPv2

C. OSPF

D. EIGRP

E. BGP

Answer: B,C,D


NO.7 When an Enterprise Campus network designer is addressing the merger of two companies with

different IGPs, which of the following is considered a superior routing design?

A. Eliminate the management and support for redistribution by choosing and cutting over to a single IGP

at the time of merger

B. Maintain distinct pockets across a moving boundary of routing protocols, redistributing between them

C. Manipulate the administrative distance of the different IGPs to be equal throughout the network

D. Leave the IGPs independent without redistribution wherever communication between company entities

is not required

Answer: B


NO.8 Which of these Layer 2 access designs does not support VLAN extensions?

A. FlexLinks

B. loop-free U

C. looped square

D. looped triangle

Answer: B

 

Posted 2014/5/29 10:09:30  |  Category: cisco  |  Tag: CCDP 642-874