Do you found the Cisco Certification 642-067 exam Guide ?
Answer / gemxia
Examkiller Cisco Certification exam:
Exam : Cisco 642-067
Title : Advanced Routing and Switching for Field Engineers
Version : v11.21
1. Why is it appropriate to use conditional label
advertising when deploying MPLS?
Select the best response.
A. to make CEF tables smaller
B. to enable label switching on the frame mode interface
C. to restrict MPLS availability to predefined time periods
D. to restrict label switching to a limited number of
networks
E. to restrict end users from seeing the routers in the
MPLS network
Answer: D
2. Which three of the following steps are mandatory when
configuring MPLS on Cisco IOS? (Choose three.)
Select 3 response(s).
A. start LDP
B. enable CEF switching
C. configure the MPLS ID
D. disable IP TTL propagation
E. configure conditional label advertising
F. enable label switching on frame mode interfaces
Answer: ABF
3. How are RIP routing contexts implemented in MPLS VPN?
Select the best response.
A. RIP does not support routing contexts
B. routing contexts are implemented in a single routing
process
C. routing contexts are implemented using multiple routing
processes
D. routing contexts are implemented as several instances of
a single routing process
E. routing contexts are implemented as a single instance of
several routing processes
Answer: D
4. Which two of the following statements are true about
HSRP load sharing? (Choose two)
Select 2 response(s).
A. It is achieved by using more than one HSRP group.
B. It is done in regards to either round robin or weight
basis.
C. It is used to offload the active router in a certain
HSRP group.
D. Single group HSRP is used to achieve more efficient link
utilization.
E. The return traffic is influenced by HSRP load sharing
configuration.
Answer: AC
5. Which of the following statements about authentication
responses and conditions is true? (Choose two.)
Select 2 response(s).
A. When a router receives a failure response, it stops
querying authentication methods.
B. When a router receives an error response, it stops
querying authentication methods.
C. If the router receives a failure response from an
authentication method, it queries the next method.
D. The router does not differentiate between failure and
error responses; the authentication process is always
interrupted.
E. If it receives no response from the authentication
method, a router will determine the error condition on its
own; the router also has the option to proceed to the next
method in a list if configured accordingly.
Answer: AE
6. When you issue the logging trap informational command,
what happens?
Select the best response.
A. An information trap is sent to the SNMP server.
B. Informational and debug messages are logged to the
syslog server.
C. All messages are sent to the logging host, where
selections are made.
D. All messages from emergencies to informational are sent
to the logging host.
Answer: D
7. Refer to the exhibit. This shows the NetFlow statistics
for a router. You are analyzing the traffic pattern and you
are interested in the percentage of
packets between 32 and 64 bytes in size and the number of
flows in progress. Which of these identifies both numbers
correctly?151011172.gif
Select the best response.
A. 69.4%, 4061
B. 24.9%, 980
C. 69.4%, 35
D. 6.94%, 980
E. cannot be determined from this output
Answer: C
8. What will happen if you issue the redundancy force-
switchover command on a Catalyst 6500 Series Switch with
redundant supervisor modules?
Select the best response.
A. reset of the primary supervisor
B. manual switchover from standby to active supervisor
C. manual switchover from active to standby supervisor
D. automatic switchover from active to standby on primary
supervisor failure
Answer: C
9. You are considering deploying the Cisco SSL VPN AIM
module in a Cisco 1800 Series Router. Which benefit should
you expect?
Select the best response.
A. to improve performance exclusively for SSL VPN
applications
B. to improve performance up to 300% for both IPsec and SSL
VPN applications
C. to improve performance for both IPsec and SSL VPN
applications with IPsec encryption taking place in hardware
D. to improve performance up to 200% for both IPsec and SSL
VPN applications with encryption taking place in hardware
E. to improve performance up to 300% for both IPsec and SSL
VPN applications with SSL encryption taking place in
hardware
Answer: D
10. During which phase is a proposal developed and
delivered?Select the best response.
A. Prepare
B. Plan
C. Design
D. Operate
Answer: A
http://www.examkiller.net
| Is This Answer Correct ? | 2 Yes | 1 No |
What is the difference between an igp and an egp?
Explain the difference between switch & hub?
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
Which memory component on a Cisco router contains the dynamic system configuration? ROM NVRAM Flash RAM/DRAM
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Why ip address called logical address?
Define the igp (interior gateway protocol)?
Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot C.) Boot mode D.) Privileged exec mode
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see "Set DF bit in IP header? [yes] :" What would happen if you answered no at the prompt. A. This lets the router fragment the packet. B. It tells the router not to fragment the packet. C. This lets the router direct the packet to the destination it finds in its routing table. D. It tell the router to send the packet to the next hop router.
In static route, what is the difference between next hop ip address and local interface address, except the Administrative Distance.
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC