Do you found the Cisco Certification 642-067 exam Guide ?
Answer / gemxia
Examkiller Cisco Certification exam:
Exam : Cisco 642-067
Title : Advanced Routing and Switching for Field Engineers
Version : v11.21
1. Why is it appropriate to use conditional label
advertising when deploying MPLS?
Select the best response.
A. to make CEF tables smaller
B. to enable label switching on the frame mode interface
C. to restrict MPLS availability to predefined time periods
D. to restrict label switching to a limited number of
networks
E. to restrict end users from seeing the routers in the
MPLS network
Answer: D
2. Which three of the following steps are mandatory when
configuring MPLS on Cisco IOS? (Choose three.)
Select 3 response(s).
A. start LDP
B. enable CEF switching
C. configure the MPLS ID
D. disable IP TTL propagation
E. configure conditional label advertising
F. enable label switching on frame mode interfaces
Answer: ABF
3. How are RIP routing contexts implemented in MPLS VPN?
Select the best response.
A. RIP does not support routing contexts
B. routing contexts are implemented in a single routing
process
C. routing contexts are implemented using multiple routing
processes
D. routing contexts are implemented as several instances of
a single routing process
E. routing contexts are implemented as a single instance of
several routing processes
Answer: D
4. Which two of the following statements are true about
HSRP load sharing? (Choose two)
Select 2 response(s).
A. It is achieved by using more than one HSRP group.
B. It is done in regards to either round robin or weight
basis.
C. It is used to offload the active router in a certain
HSRP group.
D. Single group HSRP is used to achieve more efficient link
utilization.
E. The return traffic is influenced by HSRP load sharing
configuration.
Answer: AC
5. Which of the following statements about authentication
responses and conditions is true? (Choose two.)
Select 2 response(s).
A. When a router receives a failure response, it stops
querying authentication methods.
B. When a router receives an error response, it stops
querying authentication methods.
C. If the router receives a failure response from an
authentication method, it queries the next method.
D. The router does not differentiate between failure and
error responses; the authentication process is always
interrupted.
E. If it receives no response from the authentication
method, a router will determine the error condition on its
own; the router also has the option to proceed to the next
method in a list if configured accordingly.
Answer: AE
6. When you issue the logging trap informational command,
what happens?
Select the best response.
A. An information trap is sent to the SNMP server.
B. Informational and debug messages are logged to the
syslog server.
C. All messages are sent to the logging host, where
selections are made.
D. All messages from emergencies to informational are sent
to the logging host.
Answer: D
7. Refer to the exhibit. This shows the NetFlow statistics
for a router. You are analyzing the traffic pattern and you
are interested in the percentage of
packets between 32 and 64 bytes in size and the number of
flows in progress. Which of these identifies both numbers
correctly?151011172.gif
Select the best response.
A. 69.4%, 4061
B. 24.9%, 980
C. 69.4%, 35
D. 6.94%, 980
E. cannot be determined from this output
Answer: C
8. What will happen if you issue the redundancy force-
switchover command on a Catalyst 6500 Series Switch with
redundant supervisor modules?
Select the best response.
A. reset of the primary supervisor
B. manual switchover from standby to active supervisor
C. manual switchover from active to standby supervisor
D. automatic switchover from active to standby on primary
supervisor failure
Answer: C
9. You are considering deploying the Cisco SSL VPN AIM
module in a Cisco 1800 Series Router. Which benefit should
you expect?
Select the best response.
A. to improve performance exclusively for SSL VPN
applications
B. to improve performance up to 300% for both IPsec and SSL
VPN applications
C. to improve performance for both IPsec and SSL VPN
applications with IPsec encryption taking place in hardware
D. to improve performance up to 200% for both IPsec and SSL
VPN applications with encryption taking place in hardware
E. to improve performance up to 300% for both IPsec and SSL
VPN applications with SSL encryption taking place in
hardware
Answer: D
10. During which phase is a proposal developed and
delivered?Select the best response.
A. Prepare
B. Plan
C. Design
D. Operate
Answer: A
http://www.examkiller.net
| Is This Answer Correct ? | 2 Yes | 1 No |
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down
What is the command to manually enter a static route? A.) IP route network B.) IP route C.) IP route < destination network> D.) IP route
What is the correct command line syntax for configuring a port on a 7000 or 7500 series Cisco router with a VIP card? A.) port B.) port adapter/port C.) You can't put a VIP card in a 7000 or 7500 router. D.) slot/port-adapter/port E.) slot/port F.) slot
What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless
Can you explain the difference between trusted and untrusted networks?
Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.
what is native vlan any one explain sooraj
How many collision domains are in switch?
Which switching technology can reduce the size of a broadcast domain? A.) Cut-Through B.) Store-and-Forward C.) Spanning Tree Protocol D.) RARP E.) ARP F.) VLAN
Which of the following is an example of the Network Layer? A.) LLC B.) SQL C.) Token Ring D.) IPX E.) SPX
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward