640-864 - Designing for Cisco Internetwork Solutions
Go back to Cisco
When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?
Cisco Security MARS
Which of these is the equation used to derive a 64 Kbps bit rate?
2x4 kHz x 8-bit code words
What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks? (Choose two.)
Data, voice, and video cannot converge on their current PSTN structures.
WAN costs can be reduced by migrating to converged networks.
What does Cisco recommend as the foundation of any deployed security solution?
Corporate security policy
What does Compressed Real-Time Transport Protocol (CRTP) compress?
RTP, User Datagram Protocol (UDP), and IP headers
Which two of the following are benefits of using a modular approach to network design?(Choose two.)
When designing using the Cisco Enterprise Architecture, in Which Enterprise Campus layer do the Enterprise Edge and Enterprise WAN modules establish their connection?
When designing an EIGRP network, which two things should you take into consideration? (Choose two.)
ASN and K values must match.
The neighbor command can be used to enable unicast communication.
Which model of ISR is utilized for the teleworker design profile?
Cisco 800 Series
The network-design process is limited by many external constraints. Which origins are of these constraints?
Technological, political, social, and economical
In the Cisco branch office design, what categorizes an office as large?
between 100 and 200 users and a three-tier design
Which packet-switching topology approach typically requires the greatest level of expertise to implement?
A Cisco security mechanism has the following attributes: it is a sensor appliance it searches for potential attacks by capturing and analyzing traffic it is a "purpose-built device" it is installed passively it introduces no delay or overhead Which Cisco security mechanism is this?
Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?
What two CoS values are used by voice traffic? (Choose two.)
Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer's existing network?
A wireless LAN or WLAN is a wireless local area network, which is the linking of two or more computers or devices without using wires. How are wireless LANs identified?
Service Set Identifier (SSID)
Which Cisco proprietary protocol will be used in LAN switches to control multicast traffic at the data link layer within a LAN switch?
Cisco Group Management Protocol (CGMP)
Your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for unequal cost multipath routing. Which should you choose?
Which consideration is the most important for the network designer when considering IP routing?
Which attack type would you expect on segments that have many servers for some well-known applications?
Which two capabilities of NetFlow accounting assist designers with network planning? (Choose two.)
the calculation of packet and byte counts of network traffic
the monitoring of user network utilization
When considering the three VoIP design models single site, centralized multisite, and distributed multisite which question below would help to eliminate one of these questions?
Are there users whose only enterprise access is via a QoS-enabled WAN?
Observe the following options, what is the hierarchy for IPv6 aggregatable addresses?
Public, site, interface
Which statement is true about WANs?
WANs typically encompass broad geographic areas.
A company is designing a worldwide IPv6 network with duplicated file servers at multiple locations. Each file server contains identical reference information. Which IPv6 address type would be used to allow each end station to send a request to the nearest file server using the same destination address, regardless of the location of that end station?
Which two encryption transforms will be used by both ESP and AH for authentication?
HMAC-MD5 or Hash Message Authentication Code-Secure Hash Algorithm-1(HMAC-SHA-1)
When designing the infrastructure protection portion for the enterprise edge, which of these solutions would be the most appropriate solution to consider?
ISDN is short for Integrated Services Digital Network. Under what category of WAN technologies does ISDN belong?
Which statement describes a unique advantage of EIGRP?
It enables unequal-cost load balancing.
Which Cisco security management solution provides the means to identify, isolate, and counter security threats to the network?
Cisco Security Monitoring, Analysis, and Response System
Which codec does Cisco recommend for WAN links?
Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis?
virtual device context
Which advantage is of security systems that are part of the Cisco ecosystem?
Various partners as well as supporting products increase the effectiveness of security systems.
A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at e-commerce hosts. The connection rate at the Internet firewall was limited, but the problem persists. What more can be done?
Install all relevant operating system patches.
You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface?
Which item is not a part of the process recommended by Cisco for WAN designs?
Configure deployed services.
A lightweight access point is added to a working network. Which sequence will it use to associate itself with a wireless LAN controller?
primary, secondary, tertiary, master, greatest AP capacity
You are a network technician, can you tell me how many IP addresses are available for hosts in the subnet 184.108.40.206/27?
A Cisco security mechanism has the following attributes: - It is a sensor appliance - It searches for potential attacks by capturing and analyzing traffic - It is a "purpose-built device" - It is installed passively - It introduces no delay or overhead Which Cisco security mechanism is this?
Your boss is interested in a wireless WAN solution which provides higher bandwidth than point-to-multipoint (p2mp) wireless. Which description is correct?
P2p wireless connections can provide up to 44 Mbps raw bandwidth.
A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the Internet using a single public IP address?
The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer?
The campus core layer is optional.
An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise Architecture Model. Which two submodules are part of this module?
server farm/data center
Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network?
Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible.
Refer to the list of requirements. Which IP telephony design model should you implement to fulfill these requirements? - must be a single, large location with many remote sites - must have multisite WAN connectivity - requires SRST for call processing redundancy
Which hierarchical layer has functions such as High availability, port security, and rate limiting?
Which item is not an SNMP operation?
Data link switching is typically used in which Enterprise Campus Module layer?
Given a VoIP network with these attributes: Codec: G.711 WAN bandwidth: 768Kbps Packet Header: 6 bytes Payload: 160 bytes CRTP: No How many calls can be made?