642-383 - Cisco Express Foundation for Field Engineers
Go back to Cisco
You have just configured HSRP and need to determine which router is active. Which command should you enter?
An 802.11b telephone is receiving an audio signal from an access point, but cannot send audio. What is a possible cause?
The transmit power in the telephone is significantly lower than the transmit power in the access point.
In which of these phases is a customer's current network infrastructure assessed?
Which two statements best describe the wireless core feature set using autonomous access points when implementing Wireless Domain Services? (Choose two.)
Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco Integrated Services Router.
Layer 3 services can be configured in WLSM.
Which two statements are correct about using Cisco Router and Security Device Manager (SDM) to configure the OSPF routing protocol? (Choose two.)
Cisco SDM will use the supplied wildcard mask to exclude the host bits from the configured network address.
Cisco SDM allows the configuration of passive interfaces.
A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which two of these might have caused this problem? (Choose two.)
The ip http secure-server command is missing from the running configuration.
The user has a privilege level lower than 15.
You enter the command show ip ospf neighbor and see "two-way/DROTHER" listed as the state for neighbor 10.1.1.1. What does this status indicate?
The neighbor 10.1.1.1 is not a DR or BDR.
Which command assigns a cost value of "17" to a switch port?
spanning-tree vlan 1 cost 17
A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling and both radios set at 20 mW. The wireless bridges are not able to establish or maintain a link. What is needed to successfully complete this link?
The antenna must be raised high enough to clear the trees.
The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points?
In what location is it recommended that the Cisco Catalyst 6500 Series WLSM be placed?
In a new Cisco UC520 installation, when must IP routing be configured?
When the service provider assigns static IP information.
Which of the following best describe the customer benefits of change management in the operate phase? verifying that the system meets operational, functional, and interface requirements
improve the return on investment and hasten migration by identifying and planning for necessary infrastructure changes and resource additions, as well as reduce deployment costs by analyzing gaps early in the planning process to determine what is needed to support the system
You connect via Telnet to a Cisco access point and enter the command show dot11 linktest. Which output might you obtain?
incoming and outgoing signal strength
What port role assignment would you make for the Gigabit Ethernet port on the Cisco CE520 used in the Smart Business Communications System?
Which definition best describes the implementation service component within the implement phase?
installing, configuring, and integrating systems components based on an implementation plan developed in earlier phases
Which dial plan scenario may require PSTN trunks for outbound calls?
All the employees, the auto attendant or receptionist, and the voice-mail system have direct inward dial numbers using analog trunks.
How can the proper configuration of Voice Mail be tested at an end user's IP phone?
Press the "Messages" button.
Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System? (Choose two.)
allow for guest access
add additional access points
What two types of telephony interfaces are used for PSTN connectivity? (Choose two.)
You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted interface. You suspect that the rule may be blocking necessary traffic onto the network. What must you do to delete that rule when using Cisco Router and Security Device Manager?
You must remove the association between the rule and the interface before deleting the rule.
Which design phase service component includes the development and documentation of the test case or cases used to verify that a deployed infrastructure meets operational, functional, and interface requirements?
Systems Acceptance Test Plan Development
A North American customer is using 2.4-GHz radios in a point-to-point configuration. The radio power level is 17 dBm and is transmitting at 11 Mbps. The customer is using 21.5-dBi dish antennas and 50 feet of cabling, with a loss of 8.4 dB per 100 feet. The customer increased the distance between the transmitter stations and began experiencing link problems. Without using a professional installer, which step should the customer take to fix the situation?
Use a cable with lower loss.
Which statement correctly describes configuration of the VPN server?
It uses a preshared key for remote device authentication.
In which of these phases is a customer's network assessed to determine its system readiness?
Which statement correctly describes the keyswitch model of deployment for call processing?
All IP Phones are able to answer any incoming PSTN call on any line.
You are troubleshooting OSPF neighbor establishment problems, which are occurring over Frame Relay interfaces that use the default OSPF network type. What should you verify in the router configuration?
the frame-relay map statement on the Frame Relay interface
Which critical issue should you account for when implementing an integrated network security management design?
all network devices are time-synchronized
Which benefit can be obtained by using the change management service component in the operate phase?
reduced operating costs, due to a consistent framework for making necessary changes in an efficient and accountable manner
A customer with a small enterprise network of 15 remote sites is trying to optimize its VPN by migrating some remote sites using Frame Relay connections to the Internet to using cable connections to the Internet. Minimizing costs is one of the customer's highest priorities. Only a moderate amount of IP traffic is passing through the network, most of which is from the remote sites to the central site. IPSec should be used to provide VPN functionality and basic confidentiality is desired. Based on the traffic patterns, which topology would be the easiest for this customer to set up and manage?
A company needs to provide site-to-site VPN, remote access VPN, and firewall protection. Which device best supports all three functions?
You have just configured and enabled the Cisco IOS Firewall feature set from a remote location using the Cisco Router and Security Device Manager (SDM) Firewall wizard. You later want to double-check your configuration using Cisco SDM. However, you find that you can no longer connect to the Cisco IOS Firewall using Cisco SDM. What is the probable cause of this failure?
You have been locked out via access lists that have been applied to the router as a result of your Cisco SDM configuration.
Which of these is the best definition of the Cisco Lifecycle Services approach?
It defines the minimum set of services required to successfully deploy and operate a set of Cisco technologies.
After configuring VTP, you no longer receive updates as expected. Which command can you use to verify the number of VTP advertisements being transmitted?
show vtp counters
Users logging into Cisco Router and Security Device Manager should be authenticated using the Cisco ISR local user database. Currently, none of the users can access Cisco Router and Security Device Manager via HTTP. You should check the configuration of which command or commands when attempting to resolve this problem?
ip http authentication local
Which two statements best describe the wireless implementation of Cisco Aironet root and non-root bridging? (Choose two.)
WGB can be used with an access point if the distance is less than one mile.
Up to 17 non-root bridges can associate to a root bridge.
Which interface on the Cisco UC520 is assigned an IP address either statically or through DHCP?
You are configuring a VLAN and the switch you are using requires that you do so within the VLAN database. Which command allows you to enter the VLAN database?
Switch# vlan database
A concern has been expressed that the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration statements can be used to mitigate VLAN hopping? (Choose two.)
switchport access vlan
switchport mode access
Which two statements are correct about OSPF in a multiarea environment? (Choose two.)
OSPF ABR routers are needed only at the boundary of another OSPF area.
OSPF uses wildcard masks in the network statements but subnet masks in the area range statements.
What are two configurable options for Call Control on the Cisco UC520? (Choose two.)
Which implement phase service component consists of explaining the benefits and limitations of purchased support options to a customer and ensuring that the customer understands operational processes and responsibilities?
Post Implementation Support Handoff Meeting
Which Cisco Catalyst Express 520 feature optimizes quality of service?
How many voice expansion slots are provided by the Cisco UC520?
Which of these is an accurate list of Cisco Lifecycle Services phases?
prepare, plan, design, implement, operate, and optimize
Which two are benefits of installing Cisco Monitor Director at an SMB site for the partner selling the solution? (Choose two.)
monthly recurring revenue model
automated monthly reporting on system performance
Which command can be used to verify that RIPv2 is running on a router?
show ip protocols
Which two features are only supported when using the Cisco Router and Security Device Manager (SDM) Advanced Firewall wizard and not supported when using the Cisco SDM Basic Firewall wizard? (Choose two.)
custom inspection rules
Which network management tool is designed to allow businesses to manage up to 40 devices?