Ensurepass

 

QUESTION 71

Which two statements about IPv6 addresses are true? (Choose two.)

 

A.      Two colons (::) are used to represent successive hexadecimal fields of zeros.

B.      Leading zeros are required.

C.      Two colons (::) are used to separate fields.

D.      A single interface will have multiple IPv6 addresses of different types.

 

Correct Answer: AD

 

 

QUESTION 72

Which three security measures can be used to mitigate DoS attacks that are directed at exposed hosts within the E-Commerce module? (Choose three.)

 

A.      Use NIDSs and HIPSs to detect signs of attack and to identify potentially successful breaches.

B.      Partition the exposed hosts into a separate LAN or VLAN.

C.      Use LAN switch VTP pruning to separate hosts on the same segment.

D.      Use a VPN concentrator (IPSec) to protect and verify each connection to the exposed host or hosts.

E.       Use firewalls to block all unnecessary connections to the exposed hosts.

 

Correct Answer: ABE

 

 

 

 

 

QUESTION 73

Which technology can ensure data confidentiality, data integrity, and authentication across a public IP network?

 

A.      VSANs

B.      VPDNs

C.      VLANs

D.      GRE

E.       IPsec

 

Correct Answer: E

 

 

QUESTION 74

Which statement best describes Call Admission Control?

 

A.      It extends QoS capabilities to protect voice from excessive data traffic.

B.      It protects voice from voice.

C.      It provides endpoint registration control.

D.      It provides endpoint bandwidth control.

 

Correct Answer: B

 

 

QUESTION 75

A customer wishes to implement VoIP using centralized call-processing. In addition, the customer wishes to have voice quality and good bandwidth utilization. Which codec would you suggest?

 

A.      G.711

B.      G.729

C.      G.726

D.      G.723.1

 

Correct Answer: B

 

 

QUESTION 76

Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three.)

 

A.      server statistics

B.      network audit

C.&n
bsp;    
traffic analysis

D.      visual inventory

E.       staff input

 

Correct Answer: BCE

 

 

QUESTION 77

Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer’s existing network?

 

A.      NetMon

B.      MRTG

C.      SNMP MIB compiler

D.      NetFlow

 

Correct Answer: D

 

 

QUESTION 78

Which statement identifies a benefit obtained when using a top-down network design plan?

 

A.      provides a more detailed picture of the desired network

B.      facilitates design based on previous experience

C.      is less time-consuming than using a bottom-up approach

D.      allows quick responses to design requests

E.       incorporates customer organizational requirements

 

Correct Answer: E

 

 

QUESTION 79

Lightweight access points are being deployed in remote locations where others are already operational. The new access points are in a separate IP subnet from the wireless controller. OTAP has not been enabled at any locations. Which two methods can the AP use to locate a wireless controller? (Choose two.)

 

A.      NV-RAM IP address

B.      master

C.      primary, secondary, tertiary

D.      DHCP

E.       local subnet broadcast

F.       DNS

 

Correct Answer: DF

 

QUESTION 80

Which Cisco security solution can quarantine and prevent non-compliant end stations from accessing the network until they achieve security policy compliance?

 

A.      Cisco Security Monitoring, Analysis, and Response System

B.      Adaptive Security Appliance

C.      Network Admission Control

D.      Network Intrusion Prevention System

E.       Cisco Secure Connectivity

F.       Access Control Server

 

Correct Answer: C

Free VCE & PDF File for Cisco 640-864 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

Comments are closed.