IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CCDP 642-874 EXAM 공부자료

여러분은   CCDP 642-874 (Designing Cisco Network Service Architectures)  인증시험 패스로 이 치열한 IT업계경쟁 속에서 자기만의 자리를 잡고, 스펙을 쌓고, 전문적인 지식을 높이고 싶으십니까?   CCDP 642-874 (Designing Cisco Network Service Architectures) 패스는 쉬운 일이 아닌걸 알고 있습니다. CCDP 642-874 (Designing Cisco Network Service Architectures) 패스는 여러분이 IT업계에 한발작 더 가까워졌다는걸 의미합니다.하지만 이렇게 중요한 시험이라고 많은 시간과 정력을 낭비할 필요는 없습니다. Pass4Test의 완벽한 자료만으로도 가능합니다.
Pass4Test의 덤프들은 모두 전문적으로 IT관련인증시험에 대하여 연구하여 만들어진것입니다.Pass4Test 안에는 아주 거대한 IT업계 엘리트들로 이루어진 그룹이 있습니다. 그들은 모두 관련 업계에서 권위가 있는 전문가들이고 자기만의 지식과 지금까지의 경험으로 최고의 IT인증 관련 자료를 만들어냅니다. Pass4Test의 문제와 답은 정확도가 아주 높으며 한번에 패스할수 있는 100%의 보장도를 자랑하며 그리고 또 일년무료 업데이트를 제공합니다.
Pass4Test에서는 이미   CCDP 642-874 (Designing Cisco Network Service Architectures) 인증시험의 일부 문제와 답을 사이트에 올려놓았으니 체험해보실 수 있습니다. Pass4Test 의  CCDP 642-874 (Designing Cisco Network Service Architectures) 덤프에 신뢰가 갈 것이며 또 망설임 없이 선택하게 될 것입니다.  Pass4Test  덤프로 여러분은 한번에 시험을 패스할 수 있으며 또 개인시간도 절약하고 무엇보다도 금전상으로 절약이 제일 크다고 봅니다.

 

 

NO.1 Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U
Answer: B,C,E

NO.2 Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
Answer: B

NO.3 Which of these technologies is characterized as being a multipoint Layer 2 VPN that connects two or
more customer devices using Ethernet bridging techniques?
A. DPT
B. MPLS
C. VPLS
D. CWDM
E. DWDM
F. SONET/SDH
Answer: C

NO.4 Which of these recommendations is most appropriate for the core layer in the Cisco Campus
Architecture?
A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
Answer: A

NO.5 Which three routing protocols can minimize the number of routes advertised in the network? (Choose
three)
A. IGRP
B. RIPv2
C. OSPF
D. EIGRP
E. BGP
Answer: B,C,D

NO.6 Which virtualization technology allows multiple physical devices to be combined into a single logical
device?
A. device visualization
B. device clustering
C. server visualization
D. network visualization
Answer: B

NO.7 OSPF stub areas are an important tool for the Network designer; which of the following two should be
considered when utilizing OSPF stub areas? (Choose two)
A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B. OSPF not so stubby areas are particularly useful as a simpler form of summarization
C. OSPF stub areas are always insulated from external changes
D. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPF domain
E. OSPF totally stubby areas cannot distinguish among ABRs for the best route to destinations outside
the area
Answer: C,E

NO.8 Why is STP required when VLANs span access layer switches?
A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology
Answer: B

NO.9 DRAG DROP
Drag the characteristic on the left to the corresponding IPSec VPN solution on the right.
Answer:

NO.10 Which technology is an example of the need for a designer to clearly define features and desired
performance when designing advanced WAN services with a service provider?
A. FHRP to remote branches.
B. Layer 3 MPLS VPNs secure routing
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.
Answer: B

NO.11 Which two statements are correct regarding Flex Links? (Choose two)
A. An interface can belong to multiple Flex Links.
B. Flex Links operate only over single pairs of links.
C. Flex Link pairs must be of the same interface type
D. Flex Links automatically disable STP so no BPDUs are propagated
E. Failover from active to standby on Flex Links takes less than a second
Answer: B,D

NO.12 Which two of these are characteristics of MPLS VPNs? (Choose two)
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
Answer: A,B

NO.13 When an Enterprise Campus network designer is addressing the merger of two companies with
different IGPs, which of the following is considered a superior routing design?
A. Eliminate the management and support for redistribution by choosing and cutting over to a single IGP
at the time of merger
B. Maintain distinct pockets across a moving boundary of routing protocols, redistributing between them
C. Manipulate the administrative distance of the different IGPs to be equal throughout the network
D. Leave the IGPs independent without redistribution wherever communication between company entities
is not required
Answer: B

NO.14 Which of the following is true concerning best design practices at the switched Access layer of the
traditional layer2 Enterprise Campus Network?
A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access
layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections from Access switches to redundant
Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information
Answer: A

NO.15 How does ERS use the VLAN tag?
A. to provide service internetworking
B. to support transparency for Layer 2 frames
C. as a connection identifier to indicate destination
D. as a mapping to the DLCI in service internetworking
E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites
Answer: C

NO.16 DRAG DROP
Drag the characteristic on the left the associated firewall deployment or topology on the right.
Answer:

NO.17 There are 3 steps to confirm whether a range of IP address can be summarized. When of the following
is used in each of these 3 steps?
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
Answer: C

NO.18 As a critical part of the design for the Enterprise Campus network, which of the following two are true
concerning intrusion detection and prevention solution? (Choose two)
A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable of promiscuous
monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layers 3 and 4 as well as analyzing the contents and payload of the
packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warnings that have
relatively low value because no action is likely to be taken on this information
Answer: C,D

NO.19 In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
Answer: A

NO.20 DRAG DROP
Drag the best practice recommendation for an Enterprise Campus network on the left to the technology to
which it most applies on the right.
Answer:
Posted 2012/11/28 7:03:22  |  Category: 미분류  |  Tag: