Free Download Pass4sure Cisco 642-874 Exam Questions

By | July 23, 2013

Designing Cisco Network Service Architectures (ARCH): 642-874 Exam
642-874 Questions & Answers
Exam Code: 642-874
Exam Name: Designing Cisco Network Service Architectures (ARCH)
Q & A: 215 Q&As

QUESTION 1
To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?
A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with Layer 2 link
D. to two core switches from redundant distribution switches connected with a Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
Answer: D

QUESTION 2
Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?
A. Because the IP phone is a three-port switch. IP telephony extends the network edge, impacting the Distribution layer.
B. Video and voice are alike in being bursty and bandwidth intensive, and thus impose requirements to be lossless, and have minimized and jitter.
C. IP phones have no voice and data VLAN separation, so security policies must be based on upper layer traffic characteristics.
D. Though multi-VLAN access ports are set to dot1q and carry more than two VLANs they are not trunk ports.
Answer: D

QUESTION 3
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?
A. inline with a firewall
B. in a DMZ outside the firewall
C. parallel with a firewall
D. in a DMZ behind the firewall
Answer: D

QUESTION 4
The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address?
A. The IGPs should utilize authentication to avoid being the most vulnerable component
B. With SSM source or receiver attacks are not possible
C. With Shared Trees access control is always applied at the RP
D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network
Answer: B
QUESTION 6
Support of vPC on the Cisco Nexus 5000 access switch enables various new design options for the data center Access layer, including which of the following?
A. The vPC peer link is not required for Access layer control traffic, and can instead be used to span VLANs across the vPC access switches
B. A single switch can associate per-interface with more than one vPC domain
C. vPC can be used on both sides of the MEC, allowing a unique 16-link EtherChannel to be built between the access and aggregation switches
D. Allows an EtherChannel between a server and a access switch while still maintaining the level of availability that is associated with dual-homing a server to two different access switches
Answer: C

QUESTION 7
Which two of these are characteristics of MPLS VPNs? (Choose two)
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
Answer: AB

QUESTION 8
Which technology is an example of the need for a designer to clearly define features and desired performance when designing advanced WAN services with a service provider?
A. FHRP to remote branches.
B. Layer 3 MPLS VPNs secure routing
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.
Answer: B

QUESTION 9
When BGP tuning is used, how is packet flow into the e-commerce module controlled?
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
Answer: D

QUESTION 10
A customer has eight sites and plans to increase that number in the future. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make it easier to add branch sites in the future and to reduce traffic through the hub.
Which VPN topology should you recommend to this customer?
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
Answer: D

http://www.lead2pass.com/642-874.html