Sie sind auf Seite 1von 11

CISCO 640-863

Designing for Cisco Internetwork Solutions


90 Q&A

Looking for Real Exam Questions for IT Certification Exams!


We guarantee you can pass any IT certification exam at your first attempt with just 10-12
hours study of our guides.
Our study guides contain actual exam questions, you will get word to word same on your
actual test; accurate answers with detailed explanation verified by experts and all graphics
and drag-n-drop exhibits shown just as on the real test.
To test the quality of our guides, you can download the one-fourth portion of any guide from
http://www.certificationking.com absolutely free.
Besides, we also offer complete version of following exams absolutely free. You can start
your certification from these free guides and if you are satisfied you can buy the rest
Microsoft: 70-270, 70-305, 70-526, MB2-421
Cisco 642-901, 642-502, 642-425
Oracle: 1Z0-001, 1Z0-007, 1Z0-040, 1Z0-200 Novell: 50-676, 50-565
Adobe: 9A0-019 Apple: 9L0-004, 9L0-505, 9L0-606 3COM: 3M0-211
Citrix: 1Y0-223, 1Y0-256 CIW: 1D0-420 EMC: E20-001 Enterasys: 2B0-011
Exam Express: EE0-011 Foundry: FN0-100 Hyperion: 4H0-002
HP: HP0-045, HP0-052, HP0-055, HP0-090, HP0-216, HP0-417
Juniper: JN0-120, JN0-330 Lotus: 190-510 Network Appliances: NS0-121
Network General: 1T6-520 Nortel: 920-430, 920-803 OMG: UM0-100
Sybase: 510-015 SAIR: 3X0-101, 201 SAS: A00-201 Tibco: TB0-103 ..

For pricing and placing order, please visit http://certificationking.com/order.html


We accept all major credit cards through www.paypal.com
For other payment options and any further query, feel free to mail us at
info@certificationking.com

Q: 1 Refer to the exhibit. Which statement accurately represents the


characteristics of the core layer in this design?

A. QoS should be performed only in the core.


B. Load balancing should never be implemented or used in the core.
C. Access lists should be used in the core to perform packet manipulation.
D. It is acceptable to use a partial mesh in the core if it is connected to each device by multiple paths.
E. Policy-based traffic control is implemented in the core to enable prioritization, ensuring the best
performance for all time-critical applications.
Answer: D

www.CertificationKing.com
-3-

Q: 2 Which statement accurately describes one difference between a small office


and medium office topology?
A.
B.
C.
D.

Small offices commonly use Rapid PVST+ for Layer 3 deployments.


Medium offices commonly use integrated route and switching platforms.
Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks.
Medium offices use external access switches to support LAN connectivity.

Answer: D
Q: 3 Which three factors best justify WAN link redundancy between
geographically dispersed sites? (Choose three.)
A.
B.
C.
D.
E.
F.

important traffic flows


lack of speed
high link utilization
uncertain reliability
excessive packet transmission rate
high expense of transmitting data

Answer: A, B, D
Q: 4 Refer to the exhibit. Which two statements describe why Model A is the
recommended design for routing between Building Distribution switches and Campus Core switches?
(Choose two.)

www.CertificationKing.com
-4-

A.
B.
C.
D.
E.

It uses timer-based non-deterministic convergence.


It is software-based, providing fast convergence to the remaining path.
Routes are not summarized from distribution to the core.
The Layer 3 redundant equal cost links support fast convergence.
A link or box failure does not require routing protocol convergence.

Answer: D, E
Q: 5 An organization needs a WAN Transport technology that meets these
criteria:
has a low initial cost
provides low-to-medium BW
has medium-to-high latency and jitter
Which technology would you suggest?

A.
B.
C.
D.

DSL
X.25
ISDN
wireless
www.CertificationKing.com
-5-

E. analog modem

Answer: A
Q: 6 Which two of these represent a best practice implementation of a Split MAC
LWAPP deployment in a Cisco Unified Wireless Network? (Choose two.)
A. Each wireless client authentication type maps to a shared SSID which in turn maps to a common shared
VLAN.
B. Each wireless client authentication type maps to a unique SSID which in turn maps to a unique VLAN.
C. Each wireless client authentication type maps to a unique SSID which in turn maps to a common shared
VLAN.
D. 802.1Q trunking extends from the wired infrastructure to the access point for translation into SSID(s).
E. 802.1Q trunking extends from the wired infrastructure to a wireless LAN controller for translation into
SSID(s).
F. 802.1Q trunking extends from the wired infrastructure to a wireless LAN controller. Then the 802.1Q
packet is encapsulated in LWAPP and sent to the access point for transmission over the SSID(s).
Answer: B, E
Q: 7 Which two statements represent advantages that the top-down network
design process has over the bottom-up network design process? (Choose two.)
A.
B.
C.
D.
E.

is able to provide the big picture


utilizes previous experience
takes less time to design a network
identifies appropriate technologies first
provides a design for current and future development

Answer: A, E
Q: 8 Which two of these are required for wireless client mobility deployment
when using a Cisco Unified Wireless Network? (Choose two.)
A.
B.
C.
D.
E.
F.

assigned master controller


matching mobility group name
matching RF group name
matching RF power
matching security
matching RF channel
www.CertificationKing.com
-6-

Answer: B, E
Q: 9 Which two VoIP characteristics are affected most by codec choice? (Choose
two.)
A.
B.
C.
D.

voice quality
silent packet handling
voice packet header size
bandwidth required for voice calls

Answer: A, D
Q: 10 Which H.323 protocol controls call setup between endpoints?
A.
B.
C.
D.

H.225
H.245
RAS
RTCP

Answer: B
Q: 11 A company is designing a worldwide IPv6 network with duplicated file
servers at multiple locations. Each file server contains identical reference information. Which IPv6
address type would be used to allow each end station to send a request to the nearest file server using the
same destination address, regardless of the location of that end station?
A.
B.
C.
D.

unicast
anycast
multicast
broadcast

Answer: B
Q: 12 Given a VoIP network with these attributes:
Codec: G.728
Bit rate: 16 Kbps
WAN Bandwidth: 256 Kbps
www.CertificationKing.com
-7-

Packet Header: 6 bytes


Payload: 40 bytes
CRTP: Yes
How many calls can be made?
A.
B.
C.
D.

7 calls
8 calls
13 calls
14 calls

Answer: C
Q: 13 The topology map in the draft design document should cover which two
layers of the OSI model? (Choose two.)
A.
B.
C.
D.
E.
F.

physical
data link
network
transport
session
application

Answer: A, C
Q: 14 Which two techniques can reduce voice packet transfer delay across a link
of less than 512 kbps? (Choose two.)
A.
B.
C.
D.
E.

deploy LFI
increase queue depth
increase link bandwidth
extend the trust boundary
deploy software compression

Answer: A, C
Q: 15 Your company's Cisco routers are operating with EIGRP. You need to join
networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which
describes the best practice for routing protocol deployment?

www.CertificationKing.com
-8-

A.
B.
C.
D.
E.
F.

apply OSPF throughout both networks


apply one-way redistribution exclusively at each location
apply two-way redistribution exclusively at each location
apply two-way redistribution at each location with a route filter at only one location
apply two-way redistribution at each location with a route filter at each location
apply EIGRP with the same autonomous system throughout both networks

Answer: E
Q: 16 A Cisco security mechanism has the following attributes:
it is a sensor appliance
it searches for potential attacks by capturing and analyzing traffic
it is a "purpose-built device"
it is installed passively
it introduces no delay or overhead
Which Cisco security mechanism is this?
A.
B.
C.
D.
E.

IKE
PIX
HIPS
NIDS
HMAC

Answer: D
Q: 17 You are designing a small branch office that requires these attributes:
support for 60 users
the growth capacity to add another 15 users soon
redundant access
higher bandwidth between the Layer 2 switch and routing to the WAN
Which branch office topology or technology must be used?
A.
B.
C.
D.
E.

two-tier
loop-free
three-tier
EtherChannel
integrated routing and switching
www.CertificationKing.com
-9-

Answer: D
Q: 18 Which two of these best describe the implementation of a WAN Backup
design over the Internet? (Choose two.)
A.
B.
C.
D.
E.

a best-effort method
requires no ISP coordination or involvement
bandwidth guaranteed based on interface configuration
designed as an alternative to a failed WAN connection
implemented with a point-to-point logical link using a Layer 2 tunnel

Answer: A, D
Q: 19 Given a VoIP network with these attributes:
Codec: G.711
WAN bandwidth: 768Kbps
Packet Header: 6 bytes
Payload: 160 bytes
CRTP: No
How many calls can be made?
A.
B.
C.
D.
E.

7 calls
8 calls
9 calls
11 calls
13 calls

Answer: C
Q: 20 RST Corporation is planning to upgrade its current network. The chief
technology officer has supplied a topology diagram and an IP addressing scheme of the current network
during an interview.
RST has been growing at about twenty percent per year. It has been difficult to maintain customer
support at a satisfactory level. Therefore, the RST board has met with and directed the chief technology
officer to look into network improvements.
Which two items are most relevant in documenting RST's business requirements? (Choose two.)
www.CertificationKing.com
- 10 -

A.
B.
C.
D.
E.

projected growth estimates


network performance requirements
existing network topologies
improved customer support requirements
the IP addresses assigned by the ISP

Answer: A, D
Q: 21 The Cisco Data Center Network Architecture comprises which two Cisco
SONA layers? (Choose two.)
A.
B.
C.
D.
E.

Interactive Services
Business Applications
Network Infrastructure
Collaboration Applications
WAN/Internet

Answer: A, C
Q: 22 Drop

www.CertificationKing.com
- 11 -

Das könnte Ihnen auch gefallen