Microsoft Windows Vista Community Forums - Vistaheads
Recommended Download



Welcome to the Microsoft Windows Vista Community Forums - Vistaheads, YOUR Largest Resource for Windows Vista related information.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so , join our community today!

If you have any problems with the registration process or your account login, please contact us.

Driver Scanner

CISCO 642-812 Exam Park01

Networking






Speedup My PC
Reply
  #1 (permalink)  
Old 10-24-2008
 

Join Date: Oct 2008
Posts: 0
willstivens is on a distinguished road
Thanks: 0
Thanked 0 Times in 0 Posts
CISCO 642-812 Exam Park01
CISCO 642-812 Exam Park01

1. Which three statements about the Multiple Spanning Tree (MST) protocol (IEEE 802.1s) are true? (Choose
three.)
A. An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST
regions.
B. All switches in an MST region, except distribution layer switches, should have their priority lowered from

the
default value 32768.
C. All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration
revision numbers.
D. Enabling MST with the spanning-tree mode mst global configuration command also enables RSTP.
E. To verify the MST configuration, the show pending command can be used in MST configuration mode.
F. When RSTP and MSTP are configured, UplinkFast and BackboneFast must also be enabled.
Answer: ADE


2. A client is searching for an access point (AP). What is the correct process order that the client and access

point
go through to create a connection?
A. probe request/response, authentication request/response, association request/response
B. association request/response, authentication request/response, probe request/response
C. probe request/response, association request/response, authentication request/response
D. association request/response, probe request/response, authentication request/response
Answer: A


3. Which three features are part of the Cisco Compatible Extensions program? (Choose three.)
A. security
B. routing and switching
C. VLAN and QoS
D. analog and digital voice
E. accounting
F. mobility
Answer: ACF


4. Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the
cisco-ccie.vicp.cc
command spanning-tree mode rapid-pvst issued on them. What will be the result?
A. Switches S1 and S3 will be able to exchange traffic but neither will be able to exchange traffic with Switch

S2
B. Switches S1, S2, and S3 will be able to pass traffic between themselves. However, if there is a topology

change,
Switch S2 will not receive notification of the change.
C. Switches S1, S2, and S3 will be able to pass traffic between themselves.
D. IEEE 802.1D and IEEE 802.1w are incompatible. All three switches must use the same standard or no traffic
will pass between any of the switches.
Answer: C


5. What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A. Place unused ports in a common VLAN.
B. Implement private VLANs.
C. Implement DHCP snooping.
D. Implement port security.
E. Implement VLAN access maps.
Answer: DE


6. Which statement is true about IP telephony calls?
A. A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and Layer 2
link header.
B. The voice carrier stream uses H.323 to set up, maintain, and tear down call endpoints.
C. Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice samples.
cisco-ccie.vicp.cc
D. The sum of bandwidth necessary for each major application, including voice, video, and data, should not
exceed 75 percent of the total available bandwidth for each link.
Answer: D


7. Examine the router output above. Which two items are correct? (Choose two.)
A. Router A will assume the active state if its priority is the highest.
B. If Ethernet 0/2 goes down, the standby router will take over.
C. When Ethernet 0/3 of RouterA comes back up, the priority will become 105. D.
The local IP address of Router A is 10.1.0.6.
E. The local IP address of Router A is 10.1.0.20.
Answer: AC


8. In the use of 802.1X access control, which three protocols are allowed through the switch port before
authentication takes place? (Choose three.)
A. STP
B. CDP
C. EAP MD5
D. TACACS+
E. EAP-over-LAN
F. protocols not filtered by an ACL
Answer: ABE
cisco-ccie.vicp.cc


9. Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For
security reasons, the servers should not communicate with each other, although they are located on the same
subnet. The servers do need, however, to communicate with a database server located in the inside network. What
configuration will isolate the servers from each other?
A. The switch ports 3/1 and 3/2 will be defined as secondary VLAN isolated ports. The ports connecting to the
two firewalls will be defined as primary VLAN promiscuous ports.
B. The switch ports 3/1 and 3/2 will be defined as secondary VLAN community ports. The ports connecting to the
two firewalls will be defined as primary VLAN promiscuous ports.
C. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as primary VLAN
promiscuous ports.
D. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as primary VLAN
community ports.
Answer: A


10. Refer to the exhibit. Which two Lightweight Access Point statements are true? (Choose two.)
cisco-ccie.vicp.cc
A. An AP that has been upgraded from an autonomous AP to lightweight AP will only function in conjunction
with a Cisco Wireless LAN controller.
B. Autonomous APs receive control and configuration information from a WLAN controller.
C. LWAPP increases the amount of processing within the APs, enabling them to support filtering and policy
enforcement features.
D. Real time events such as authentication, security management, and mobility are handled by the lightweight

AP.
E. Lightweight APs require local configurations using local management. F.
WLAN controllers provide a single point of management.
Answer: AF


11. Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct
the phone to override the incoming CoS from the PC before forwarding the packet to the switch?
A. switchport priority extend none
B. switchport priority extend trust
C. switchport priority extend cos 2
D. switchport priority extend cos 11
E. mls qos cos 2
cisco-ccie.vicp.cc
F. mls qos cos 2 override
Answer: C


12. Which two Lightweight Access Point Protocol (LWAPP) statements are true? (Choose two.)
A. Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
B. Control traffic is encapsulated in TCP packets with a source port of 1024 and a destination port of 12223.
C. Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.
D. Data traffic is encapsulated in TCP packets with a source port of 1024 and destination port of 12223.
E. Layer 3 LWAPP is a UDP / IP frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.
F. LWAPP is a proprietary protocol, and because of its very high overhead it is not widely adopted .
Answer: AE


13. When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather
information?
A. The attacking station uses DTP to negotiate trunking with a switch port and captures all traffic that is

allowed
on the trunk
B. The attacking station tags itself with all usable VLANs to capture data that is passed through the switch,

regardless
of the VLAN to which the data belongs.
C. The attacking station will generate frames with two 802.1Q headers to cause the switch to forward the frames
to a VLAN that would be inaccessible to the attacker through legitimate means.
D. The attacking station uses VTP to collect VLAN information that is sent out and then tags itself with the

domain
information in order to capture the data.
Answer: A


14. Refer to the exhibit. Switch S1 has been configured with the command spanning-tree mode rapid-pvst. Switch
S3 has been configured with the command spanning-tree mode mst. Switch S2 is running the IEEE 802.1D
instance of Spanning-Tree. What will be the result?
cisco-ccie.vicp.cc
A. IEEE 802.1w, and IEEE 802.1s are compatible. IEEE 802.1d is incompatible. Switches S1 and S3 will be able
to pass traffic between themselves. Neither will be able to pass traffic to Switch S2.
B. Switches S1, S2, and S3 will be able to pass traffic between themselves.
C. Switches S1, S2, and S3 will be able to pass traffic between themselves. However, if there is a topology

change,
Switch S2 will not receive notification of the change.
D. IEEE 802.1d, IEEE 802.1w, and IEEE 802.1s are incompatible. All three switches must use the same standard
or no traffic will pass between any of the switches.
Answer: B


15. The network operations center has received a call stating that users in VLAN 107 are unable to access

resources
through Router 1. From the information contained in the graphic, what is the cause of this problem?
cisco-ccie.vicp.cc
A. VLAN 107 does not exist on switch A.
B. VTP is pruning VLAN 107
C. VLAN 107 is not configured on the trunk
D. spanning tree is not enabled on VLAN 107
Answer: B


cisco-ccie.vicp.cc
Reply With Quote
Sponsored Links
  #2 (permalink)  
Old 03-20-2009
 

Join Date: Mar 2009
Posts: 3
flexyx is on a distinguished road
Thanks: 0
Thanked 0 Times in 0 Posts
Re: CISCO 642-812 Exam Park01
sisco exam really hard
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
Just passed Security+ exam workzrowan Networking 1 06-30-2008 21:21
Off the wire: Job exam piracy rising Steve Security News 0 12-27-2007 02:00
Windows Vista 70-620 Exam =?Utf-8?B?bWFqb3Jn?= microsoft.public.windows.vista.general 4 03-02-2007 18:31




All times are GMT +1. The time now is 01:42.




Driver Scanner - Free Scan Now

Vistaheads.com is part of the Heads Network. See also XPHeads.com , Win7Heads.com and Win8Heads.com.


Design by Vjacheslav Trushkin for phpBBStyles.com.
Powered by vBulletin® Version 3.6.7
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Search Engine Optimization by vBSEO 3.6.0 RC 2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120