642-873 - ARCH - Designing Cisco Network Service Architectures Exam
Go back to Cisco
Which two settings must be configured in order to use the GUI to configure Call Admission Control with voice applications? (Choose two.)
QoS must be set to Platinum
WMM must be enabled
Which statement about IDS/IPS design is correct?
An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?
To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?
Which three things can be restricted by the Class of Service in a traditional PBX? (Choose three.)
VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link .How does ERS use the VLAN tag?
indicate destination as a connection identifier
Jitter is an unwanted variation of one or more characteristics of a periodic signal in electronics and telecommunications and _____refers to call issues that cause variations in timing or time of arrival
How does ERS use the VLAN tag?
as a connection identifier to indicate destination
Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?
To which of these does IP multicast send packets?
a subset of hosts
How many channels are defined in the IEEE 802.11b DSSS channel set?
What two choices can you make when redundancy is required from a branch office to a regional office? CareerCert.blogspot.com (Choose two.)
dual Wan links to the regional office
single links - one to the regional office and one to another branch office
You are the Cisco Network Designer in Cisco.com. Which signal and noise values will result in the best phone communication with an access point?
Signal strength 6dBm, noise level 5dBm
Which one is not the feature of the Cisco Unified Wireless Network architecture?
What is the traditional mode for a firewall?
____ dBm is the recommended radius of a cell for a voice-ready wireless network.
Which two of these multicast deployments are most susceptible to attacks from unknown sources? (Choose two.)
A network vulnerability scanner is part of which critical element of network and system security?
Which two of these are characteristics of an IPS device? (Choose two.)
is an active device in the traffic path
traffic arrives on one IPS interface and exits on another
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network? (Choose two.)
between two Layer 2 devices with trunking
between two Layer 2 devices without trunking CareerCert.blogspot.com
Which three objectives would be met by designing Layer 3 switching in the Campus Backbone of a medium size installation? (Choose three.)
scale to a large size
provide a flexible topology with no spanning tree loops
control broadcasts in the backbone
You are the Cisco Network Designer in Cisco.com. Which layer NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?
Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem? (Choose two.)
Employ path MTU discovery.
Set the MTU value to 1400 bytes.
What are two design guidelines for VoIP networks? (Choose two.)
Loss should be no more than 1 percent.
Managed bandwidth is strongly recommended for voice control traffic.
Which two of these are characteristics of multicast routing? (Choose two.)
multicast routing uses RPF.
In multicast routing, the source of a packet is known.
Lafeyette Productions is looking for a new ISP that has improved availability, load balancing, and catastrophe protection. Which type of ISP connectivity solution would be best?
What is the device weight limit per CallManager in a Cisco IP phone configuration?
Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?
use BGP as the CE-PE routing protocol
Which two statements about Network Attached Storage are correct? (Choose two.)
NAS is referred to as captive storage.
Storage devices can be shared between users.
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests?
The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to-router) basis?
Internetwork Performance Monitor
Which routing protocol supports a flexible area structure using routing levels one and two?
Which two of these are recommended practices with trunks? (Choose two.)
use 802.1q encapsulation
set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
Which protocol would provide block access to remote storage over WAN links?
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? (Choose two.)
Service and switch modules are underutilized.
Layer 2 adjacency is required with the servers that use this design.
What four functions does Web Cache Communication Protocol (WCCP) incorporate? (Choose four.)
Which of these is true of a Layer 3 out-of-band NAS deployment?
After authentication and posture assessment, client traffic no longer passes through the NAS.
Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?
Which statement correctly describes a situation in which VRFs are used in the data center?
Partitioning of network resources is enabled.
What are two characteristics of OER? (Choose two.)
Path selection may be based on delay, loss, or jitter.
Automatic load distribution is provided for multiple connections.
Why is STP required when VLANs span access layer switches?
to protect against user-side loops
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?
GRE with IPSec in transport mode
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?
You are the Cisco Network Designer in Cisco.com. Which of these are important when determining CareerCert.blogspot.com how many users a NAS can support?
number of plug-ins per scan
total number of network devices
number of checks in each posture assessment
A security analysis at The Potomac Canal Company recommends installing an IDS appliance and a firewall appliance. These appliances should connect directly into a Layer 3 switch. A load balancer and SSL termination have also been recommended.Potomac's management have expressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of your design proposal? (Choose two.)
Using integrated blades would only require two devices.
Putting all security devices in a single chassis provides a single point of failure.
When is the site-to-site remote access model appropriate? (Choose one.)
for a group of users in the same vicinity sharing a connection
Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
loop-free inverted U
Which of these recommendations is most appropriate for the Cisco Campus Architecture?
Utilize Layer 3 switching.
Which three are used in configuring Call Manager dial plans? (Choose three.)
Which of these recommended designs provides the highest availability?
map the Layer 2 VLAN number to the Layer 3 subnet