644-066 - Cisco Routing and Switching Solutions Specialist
Go back to Cisco
Two different message flows need to receive data from queues on two different MQe Queue Managers. Which of the following would be a valid solution?
Specify the queue name and queue manager name for the appropriate queue manager and the config file for the broker's queue manager in both flows in the MQe Input node in each message flow and deploy the flows to the same execution group.
Which three best describe the Cisco Borderless Network Architecture? (Choose three.)
Infrastructure and network services are the basis for user services.
A Cisco Borderless Network is based on a common network infrastructure.
A Cisco Borderless Network Architecture provides borderless network services.
A bank is integrating its account balance inquiry web site with their claims processing applications using Websphere Business Integration Message Broker on AIX. A large number of messages will be processed through this system. The users do not need the information if they cannot get it immediately, but it is important to have high availability for customer satisfaction. What is the best choice and reason for a high availability solution?
Place the Brokers' queue managers and the data source queue managers in a WebSphere MQ cluster because of the need for timely delivery.
Your customer needs to send encrypted data among three branch offices. You want to ensure that all devices in a group can successfully exchange encrypted packets. Which transport network augmentation will provide any-to-any IPsec connectivity to ensure that successful packet exchange occurs?
Which three apply to Embedded Event Manager (EEM)? (Choose three.)
EEM monitors specific events.
EEM automates operational management in real time.
EEM can invoke predefined actions to correct, take remedial action, and report events.
What does not need to be considered when looking into the customer workflow?
How many different switch products are in use at the customer network?
Which two of the following are unique advantages of the PD/PSE Cisco Catalyst Compact Switches? (Choose two.)
Due to the fanless design?
They diminish the power infrastructure by supporting PoE+ input and PoE output at the same time.?
Which three of the following are successful examples of strategic IT investments improving operational agility? (Choose three.)
A company offers mobile email to its employees, who can then react faster to requests.
A company implements collaboration solutions, which simplified information exchange.
A company changes its security strategy from "lock down" to "secure access from anywhere", so that users are "always-on" and can easily work remotely.
Which three of the following are recommended steps for the design phase? (Choose three.)
Proof of concept?
Which of the following is NOT true of namespaces?
If enabled for the message set, 'xmlns' attributes from an input XML document are stored in the tree.
Which of the following statements best describes the routing vendor landscape?
Larger competitors to Cisco include Juniper Networks, Riverbed, and Huawei.
Cisco MediaNet provides multimedia optimization services in a Cisco Borderless Network. Which two of the following statements correctly describe Cisco MediaNet? (Choose two.)
Cisco MediaNet Performance Monitor collects performance metrics of video traffic as flexible netflow records which can be processed by any netflow collector, such as Cisco Prime Assurance Manager.?
Cisco MediaNet Mediatrace allows real-time troubleshooting by providing details about every hop of the end-to-end path of your mediastream.?
A company requires a database lookup and message transformation of a XML request and reply over HTTP. Which of the following Websphere MQ transports and communication models will support this?
Point-to-point using the WebSphere MQ Web Services (HTTP) Transport method.
Which of the following heap sizes is LEAST important to be configured on the Configuration Manager database?
Logging Heap Size
A COBOL program sends data to message flow using a particular COBOL copybook. This copybook has been imported into a Message Sets project and a message definition file has been built from it. The program has changed the order of two fields in the data that it sends. To implement these changes, which of the following steps are necessary?
Reorder the fields under the complex type in the mxsd file. Remove the old message set file from the bar file and add the new one. Redeploy the bar file.
Which two statements are true about CVD and SBA? (Choose two.)?
The SBA toolset includes Partner Enablement Assets and EcoPartner Guides.
CVDs are end-to-end designs which are well-tested and fully documented.
Which security feature of a Cisco Catalyst 2960 Series Switch can be used to prevent clients from acquiring an IP address from unauthorized servers?
Which two of the following statements correctly describe Cisco WAAS Mobile? (Choose two.)
One Cisco WAAS Mobile server can serve up to 10,000 concurrent mobile users.?
The Cisco WAAS Mobile Server is based on a UCS-C series server and provides up to 200 Mb/s WAN throughput.?
The primary application promotion process at a company moves through four environments: Development; System Test; Staging; Production. How many configuration managers should there be?
Four because a different deployed version of the code in each environment must be maintained.
A primary concern is the real time nature of the statistics that is being gathered. The intent is to use them for problem reporting. Which of the following is MOST appropriate to gather?
Snapshot publishing statistics with a destination of xml.
Due to strict privacy regulations, the hospital for which you are designing a solution needs to be certain that endpoint devices are interrogated for policy compliance. What can be used to assure that this is accomplished?
network access control
Which is a reliable network auditing methodology for discovering applications on the network and their usage characteristics?
Conduct a network usage study over a given period of time.
Before applying maintenance updates, which of the following is NOT a recommended step?
Remove the previous version since CSDs are cumulative.
For which of the following WebSphere Business Integration Message Broker transports does the broker provide authentication?
WebSphere MQ Real-time Transport (JMS/IP)
Which two statements describe the role of core technologies with regard to business processes? (Choose two.)
An end-to-end borderless network architecture builds the foundation for integrating people and tasks in changing market environments
In order to react to market changes, operations and processes have to be modified as well. The network infrastructure has to match the changed requirements.
Which two tools can you use to manage and configure a Cisco Catalyst Express 500 Series Switch? (Choose two.)
Cisco Network Assistant
Device Manager with embedded GUI
When implementing source control for files within the Message Brokers Toolkit, which of the following statements is true?
Any source control system may be used that provides an Eclipse plug-in.
Which two of the following statements about the Cisco switching product portfolio are correct? (Choose two.)
The Cisco Catalyst 3750 v2 and Cisco Catalyst 3750-X are stackable.?
The Cisco Catalyst 2000 series support PoE and PoE+, but they do not support 60 W per port like the Cisco Catalyst 3000 and Cisco Catalyst 4000 series.?
Application visibility and performance monitoring are important components of an optimized WAN. Which three of the following can be sources for Cisco Prime Network Analysis Module? (Choose three.)
WAAS Flow Agent?
IOS Performance Agent?
A customer has an XA, transactional message flow which updates a database table (A) before propagating the message to a TryCatch node. The Try branch updates another database table (B) and sends the message to the WebSphere MQ Output node which fails. The Catch branch updates a third database table (C). The WebSphere MQ Output at the end of the Catch node works. Which of the following database tables will have been committed?
Database tables A and C.
Which of the following statements correctly describes the platform module slot evolution from pre- ISR through ISR to ISR G2?
NM and NME can be used in the ISR G2 via an adapter. NME-X is not supported on ISR G2.?
While designing a Cisco Enterprise WAN solution for your customer, you want to allow the usage of routing protocols across the tunnel in order to simplify routing information distribution and failure mitigation. Which transport network augmentation should you use?
GRE over IPsec
A banking customer wants strict control of changes to their production environment by isolating their development, test and production environments. This ensures that no changes can be implemented in the production environment by the development or test teams. Only one broker is required for production. Which of the following procedures and minimum broker domain definition provides this control?
Define three broker domains, each with one Configuration Manager, one User Name Server and one Broker. Move new or modified resources between the domains using export files.
In order to create an access control list granting access to create execution groups on a broker, it is necessary to have which authorization?
Administrators group membership on the Configuration Manager
A Message Broker Archive (bar) file has been created by a developer for deployment purposes in the development environment. The developer then simply selected his message flow and added it to the bar file without changing any options during the add. The message flow references two subflows. The developer did not add the subflows to the bar file. Which of the following is true?
This bar file can be deployed to a System Test environment as long as all resources (queues, database tables, subflows, etc.) required by the message flow are present in the System Test environment.
Which two of the following statements are true regarding placement of WAAS? (Choose two.)?
All WAE appliance models support inline deployment. Fail-to-wire capabilities ensure that traffic continues to flow through the system in case of a hardware or software failure. ?
Off-path interception of traffic can be achieved by policy-based routing or WCCP v2 interception.?
A business requirement is to record selected fields from the message data into an audit database table using a database node. These fields will change as the message moves through the message flow requiring the need to record the data twice. While other message flows might have similar audit requirements, the fields that they need to record are likely to be different. What is the MOST appropriate mechanism for reusing this logic?
Create a database ESQL module in the ESQL file for the message flow and point both database nodes to the same module.
Given a Cisco Catalyst 4500 Series Switch with redundant supervisors, what feature allows phone calls to remain up in the event of a supervisor failure?
In a test environment, a Configuration Manager is running on one machine, a broker and Toolkit are running on a development machine and a Broker and Toolkit are running on a third test machine. Both Brokers are registered with the same Configuration Manager. On the development machine, there is a message flow called WCStoSAP assigned to its Broker, and on the test machine there is another message flow called WCStoSAP assigned to its Broker. A change is made to the WCStoSAP message flow on the development machine and saved. The new version is added to the bar file. Both execution groups are then redeployed. The message flows on the development and the test machine are which of the following?
The same, because they are deployed from the same bar file.
When designing a branch office solution for a customer, you want to share the pros and cons of the Internet WAN deployment model. Which are two characteristics of this model? (Choose two.)
It provides the most cost savings.
It is the least secure of the three deployment models.
Which of the following statements regarding the WAAS vendor landscape is not true??.
Bluecoat is number two in the WAAS market.?
Which three of the following are major trends that fuel the demand for routing and switching? (Choose three.)
Which two of the following can be helpful tools for documenting or calculating the cost reduction of a Cisco Borderless Network? (Choose two.)?
Report of Total Economic Impact of Cisco Borderless Networks
Cisco Borderless Networks ROI Benefits Calculator
You are designing a campus network for your customer. You need to provide the customer with uplink connectivity because a single access switch is used to provide connectivity to more than one user group. Which access layer component should you deploy?
IEEE 802.1Q trunks
What are three characteristics of the Cisco Validated Designs (CVDs) architectural selling approach? (Choose three.)
This selling approach is based on customer requirements.
Integrated solutions are aligned to customer buying patterns.
The PINs have been pushed out to partners and have been well-received.
What is a characteristic specific to the Cisco Enterprise Branch of One (Teleworker) PIN Architecture?
Cisco Unified Communications provides cost-effective access to a centralized system with voice and unified messaging services.
What are three important characteristics of the Cisco Catalyst 2960G-24TC switch? (Choose three.)
does not support 802.3af PoE
uses the GBIC/SFP form factor for dual-purpose ports
provides a maximum forwarding bandwidth of 32 Gbps
Which three of the following statements about competitors to Cisco in the switching market are true? (Choose three.)
Cisco has a market share of about 70% in the Layer 2 and Layer 3 managed switch market.
Most of the competitors offer me-too point products only; they lack an overall solution framework similar to the Cisco Borderless Network.?
Which WAN type provides the most secure transport?
IPsec over MPLS VPN
Where are WebSphere Business Integration Message Broker publish/subscribe retained publications stored within the domain topology?
In the broker's database.