644-066 - Cisco Routing and Switching Solutions Specialist

Go back to Cisco

Example Questions

Two different message flows need to receive data from queues on two different MQe Queue Managers. Which of the following would be a valid solution? Which three best describe the Cisco Borderless Network Architecture? (Choose three.) A bank is integrating its account balance inquiry web site with their claims processing applications using Websphere Business Integration Message Broker on AIX. A large number of messages will be processed through this system. The users do not need the information if they cannot get it immediately, but it is important to have high availability for customer satisfaction. What is the best choice and reason for a high availability solution? Your customer needs to send encrypted data among three branch offices. You want to ensure that all devices in a group can successfully exchange encrypted packets. Which transport network augmentation will provide any-to-any IPsec connectivity to ensure that successful packet exchange occurs? Which three apply to Embedded Event Manager (EEM)? (Choose three.) What does not need to be considered when looking into the customer workflow? Which two of the following are unique advantages of the PD/PSE Cisco Catalyst Compact Switches? (Choose two.) Which three of the following are successful examples of strategic IT investments improving operational agility? (Choose three.) Which three of the following are recommended steps for the design phase? (Choose three.) Which of the following is NOT true of namespaces? Which of the following statements best describes the routing vendor landscape? Cisco MediaNet provides multimedia optimization services in a Cisco Borderless Network. Which two of the following statements correctly describe Cisco MediaNet? (Choose two.) A company requires a database lookup and message transformation of a XML request and reply over HTTP. Which of the following Websphere MQ transports and communication models will support this? Which of the following heap sizes is LEAST important to be configured on the Configuration Manager database? A COBOL program sends data to message flow using a particular COBOL copybook. This copybook has been imported into a Message Sets project and a message definition file has been built from it. The program has changed the order of two fields in the data that it sends. To implement these changes, which of the following steps are necessary? Which two statements are true about CVD and SBA? (Choose two.)? Which security feature of a Cisco Catalyst 2960 Series Switch can be used to prevent clients from acquiring an IP address from unauthorized servers? Which two of the following statements correctly describe Cisco WAAS Mobile? (Choose two.) The primary application promotion process at a company moves through four environments: Development; System Test; Staging; Production. How many configuration managers should there be? A primary concern is the real time nature of the statistics that is being gathered. The intent is to use them for problem reporting. Which of the following is MOST appropriate to gather? Due to strict privacy regulations, the hospital for which you are designing a solution needs to be certain that endpoint devices are interrogated for policy compliance. What can be used to assure that this is accomplished? Which is a reliable network auditing methodology for discovering applications on the network and their usage characteristics? Before applying maintenance updates, which of the following is NOT a recommended step? For which of the following WebSphere Business Integration Message Broker transports does the broker provide authentication? Which two statements describe the role of core technologies with regard to business processes? (Choose two.) Which two tools can you use to manage and configure a Cisco Catalyst Express 500 Series Switch? (Choose two.) When implementing source control for files within the Message Brokers Toolkit, which of the following statements is true? Which two of the following statements about the Cisco switching product portfolio are correct? (Choose two.) Application visibility and performance monitoring are important components of an optimized WAN. Which three of the following can be sources for Cisco Prime Network Analysis Module? (Choose three.) A customer has an XA, transactional message flow which updates a database table (A) before propagating the message to a TryCatch node. The Try branch updates another database table (B) and sends the message to the WebSphere MQ Output node which fails. The Catch branch updates a third database table (C). The WebSphere MQ Output at the end of the Catch node works. Which of the following database tables will have been committed? Which of the following statements correctly describes the platform module slot evolution from pre- ISR through ISR to ISR G2? While designing a Cisco Enterprise WAN solution for your customer, you want to allow the usage of routing protocols across the tunnel in order to simplify routing information distribution and failure mitigation. Which transport network augmentation should you use? A banking customer wants strict control of changes to their production environment by isolating their development, test and production environments. This ensures that no changes can be implemented in the production environment by the development or test teams. Only one broker is required for production. Which of the following procedures and minimum broker domain definition provides this control? In order to create an access control list granting access to create execution groups on a broker, it is necessary to have which authorization? A Message Broker Archive (bar) file has been created by a developer for deployment purposes in the development environment. The developer then simply selected his message flow and added it to the bar file without changing any options during the add. The message flow references two subflows. The developer did not add the subflows to the bar file. Which of the following is true? Which two of the following statements are true regarding placement of WAAS? (Choose two.)? A business requirement is to record selected fields from the message data into an audit database table using a database node. These fields will change as the message moves through the message flow requiring the need to record the data twice. While other message flows might have similar audit requirements, the fields that they need to record are likely to be different. What is the MOST appropriate mechanism for reusing this logic? Given a Cisco Catalyst 4500 Series Switch with redundant supervisors, what feature allows phone calls to remain up in the event of a supervisor failure? In a test environment, a Configuration Manager is running on one machine, a broker and Toolkit are running on a development machine and a Broker and Toolkit are running on a third test machine. Both Brokers are registered with the same Configuration Manager. On the development machine, there is a message flow called WCStoSAP assigned to its Broker, and on the test machine there is another message flow called WCStoSAP assigned to its Broker. A change is made to the WCStoSAP message flow on the development machine and saved. The new version is added to the bar file. Both execution groups are then redeployed. The message flows on the development and the test machine are which of the following? When designing a branch office solution for a customer, you want to share the pros and cons of the Internet WAN deployment model. Which are two characteristics of this model? (Choose two.) Which of the following statements regarding the WAAS vendor landscape is not true??. Which three of the following are major trends that fuel the demand for routing and switching? (Choose three.) Which two of the following can be helpful tools for documenting or calculating the cost reduction of a Cisco Borderless Network? (Choose two.)? You are designing a campus network for your customer. You need to provide the customer with uplink connectivity because a single access switch is used to provide connectivity to more than one user group. Which access layer component should you deploy? What are three characteristics of the Cisco Validated Designs (CVDs) architectural selling approach? (Choose three.) What is a characteristic specific to the Cisco Enterprise Branch of One (Teleworker) PIN Architecture? What are three important characteristics of the Cisco Catalyst 2960G-24TC switch? (Choose three.) Which three of the following statements about competitors to Cisco in the switching market are true? (Choose three.) Which WAN type provides the most secure transport? Where are WebSphere Business Integration Message Broker publish/subscribe retained publications stored within the domain topology?