642-873 - ARCH - Designing Cisco Network Service Architectures Exam

Go back to Cisco

Example Questions

Which two settings must be configured in order to use the GUI to configure Call Admission Control with voice applications? (Choose two.) Which statement about IDS/IPS design is correct? One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer? To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE? Which three things can be restricted by the Class of Service in a traditional PBX? (Choose three.) VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link .How does ERS use the VLAN tag? Jitter is an unwanted variation of one or more characteristics of a periodic signal in electronics and telecommunications and _____refers to call issues that cause variations in timing or time of arrival How does ERS use the VLAN tag? Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames? To which of these does IP multicast send packets? How many channels are defined in the IEEE 802.11b DSSS channel set? What two choices can you make when redundancy is required from a branch office to a regional office? CareerCert.blogspot.com (Choose two.) You are the Cisco Network Designer in Cisco.com. Which signal and noise values will result in the best phone communication with an access point? Which one is not the feature of the Cisco Unified Wireless Network architecture? What is the traditional mode for a firewall? ____ dBm is the recommended radius of a cell for a voice-ready wireless network. Which two of these multicast deployments are most susceptible to attacks from unknown sources? (Choose two.) A network vulnerability scanner is part of which critical element of network and system security? Which two of these are characteristics of an IPS device? (Choose two.) Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network? (Choose two.) Which three objectives would be met by designing Layer 3 switching in the Campus Backbone of a medium size installation? (Choose three.) You are the Cisco Network Designer in Cisco.com. Which layer NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment? Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem? (Choose two.) What are two design guidelines for VoIP networks? (Choose two.) Which two of these are characteristics of multicast routing? (Choose two.) Lafeyette Productions is looking for a new ISP that has improved availability, load balancing, and catastrophe protection. Which type of ISP connectivity solution would be best? What is the device weight limit per CallManager in a Cisco IP phone configuration? Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links? Which two statements about Network Attached Storage are correct? (Choose two.) Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests? The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to-router) basis? Which routing protocol supports a flexible area structure using routing levels one and two? Which two of these are recommended practices with trunks? (Choose two.) Which protocol would provide block access to remote storage over WAN links? Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? (Choose two.) What four functions does Web Cache Communication Protocol (WCCP) incorporate? (Choose four.) Which of these is true of a Layer 3 out-of-band NAS deployment? Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site? Which statement correctly describes a situation in which VRFs are used in the data center? What are two characteristics of OER? (Choose two.) Why is STP required when VLANs span access layer switches? To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic? In a VoWLAN deployment, what is the recommended separation between cells with the same channel? You are the Cisco Network Designer in Cisco.com. Which of these are important when determining CareerCert.blogspot.com how many users a NAS can support? A security analysis at The Potomac Canal Company recommends installing an IDS appliance and a firewall appliance. These appliances should connect directly into a Layer 3 switch. A load balancer and SSL termination have also been recommended.Potomac's management have expressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of your design proposal? (Choose two.) When is the site-to-site remote access model appropriate? (Choose one.) Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.) Which of these recommendations is most appropriate for the Cisco Campus Architecture? Which three are used in configuring Call Manager dial plans? (Choose three.) Which of these recommended designs provides the highest availability?