640-864 - Designing for Cisco Internetwork Solutions

Go back to Cisco

Example Questions

When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider? Which of these is the equation used to derive a 64 Kbps bit rate? What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks? (Choose two.) What does Cisco recommend as the foundation of any deployed security solution? What does Compressed Real-Time Transport Protocol (CRTP) compress? Which two of the following are benefits of using a modular approach to network design?(Choose two.) When designing using the Cisco Enterprise Architecture, in Which Enterprise Campus layer do the Enterprise Edge and Enterprise WAN modules establish their connection? When designing an EIGRP network, which two things should you take into consideration? (Choose two.) Which model of ISR is utilized for the teleworker design profile? The network-design process is limited by many external constraints. Which origins are of these constraints? In the Cisco branch office design, what categorizes an office as large? Which packet-switching topology approach typically requires the greatest level of expertise to implement? A Cisco security mechanism has the following attributes: it is a sensor appliance it searches for potential attacks by capturing and analyzing traffic it is a "purpose-built device" it is installed passively it introduces no delay or overhead Which Cisco security mechanism is this? Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access? What two CoS values are used by voice traffic? (Choose two.) Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer's existing network? A wireless LAN or WLAN is a wireless local area network, which is the linking of two or more computers or devices without using wires. How are wireless LANs identified? Which Cisco proprietary protocol will be used in LAN switches to control multicast traffic at the data link layer within a LAN switch? Your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for unequal cost multipath routing. Which should you choose? Which consideration is the most important for the network designer when considering IP routing? Which attack type would you expect on segments that have many servers for some well-known applications? Which two capabilities of NetFlow accounting assist designers with network planning? (Choose two.) When considering the three VoIP design models single site, centralized multisite, and distributed multisite which question below would help to eliminate one of these questions? Observe the following options, what is the hierarchy for IPv6 aggregatable addresses? Which statement is true about WANs? A company is designing a worldwide IPv6 network with duplicated file servers at multiple locations. Each file server contains identical reference information. Which IPv6 address type would be used to allow each end station to send a request to the nearest file server using the same destination address, regardless of the location of that end station? Which two encryption transforms will be used by both ESP and AH for authentication? When designing the infrastructure protection portion for the enterprise edge, which of these solutions would be the most appropriate solution to consider? ISDN is short for Integrated Services Digital Network. Under what category of WAN technologies does ISDN belong? Which statement describes a unique advantage of EIGRP? Which Cisco security management solution provides the means to identify, isolate, and counter security threats to the network? Which codec does Cisco recommend for WAN links? Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis? Which advantage is of security systems that are part of the Cisco ecosystem? A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at e-commerce hosts. The connection rate at the Internet firewall was limited, but the problem persists. What more can be done? You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface? Which item is not a part of the process recommended by Cisco for WAN designs? A lightweight access point is added to a working network. Which sequence will it use to associate itself with a wireless LAN controller? You are a network technician, can you tell me how many IP addresses are available for hosts in the subnet A Cisco security mechanism has the following attributes: - It is a sensor appliance - It searches for potential attacks by capturing and analyzing traffic - It is a "purpose-built device" - It is installed passively - It introduces no delay or overhead Which Cisco security mechanism is this? Your boss is interested in a wireless WAN solution which provides higher bandwidth than point-to-multipoint (p2mp) wireless. Which description is correct? A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the Internet using a single public IP address? The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer? An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise Architecture Model. Which two submodules are part of this module? Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network? Refer to the list of requirements. Which IP telephony design model should you implement to fulfill these requirements? - must be a single, large location with many remote sites - must have multisite WAN connectivity - requires SRST for call processing redundancy Which hierarchical layer has functions such as High availability, port security, and rate limiting? Which item is not an SNMP operation? Data link switching is typically used in which Enterprise Campus Module layer? Given a VoIP network with these attributes: Codec: G.711 WAN bandwidth: 768Kbps Packet Header: 6 bytes Payload: 160 bytes CRTP: No How many calls can be made?

Study Guides