Do you found the Cisco Certification 642-067 exam Guide ?
Answer / gemxia
Examkiller Cisco Certification exam:
Exam : Cisco 642-067
Title : Advanced Routing and Switching for Field Engineers
Version : v11.21
1. Why is it appropriate to use conditional label
advertising when deploying MPLS?
Select the best response.
A. to make CEF tables smaller
B. to enable label switching on the frame mode interface
C. to restrict MPLS availability to predefined time periods
D. to restrict label switching to a limited number of
networks
E. to restrict end users from seeing the routers in the
MPLS network
Answer: D
2. Which three of the following steps are mandatory when
configuring MPLS on Cisco IOS? (Choose three.)
Select 3 response(s).
A. start LDP
B. enable CEF switching
C. configure the MPLS ID
D. disable IP TTL propagation
E. configure conditional label advertising
F. enable label switching on frame mode interfaces
Answer: ABF
3. How are RIP routing contexts implemented in MPLS VPN?
Select the best response.
A. RIP does not support routing contexts
B. routing contexts are implemented in a single routing
process
C. routing contexts are implemented using multiple routing
processes
D. routing contexts are implemented as several instances of
a single routing process
E. routing contexts are implemented as a single instance of
several routing processes
Answer: D
4. Which two of the following statements are true about
HSRP load sharing? (Choose two)
Select 2 response(s).
A. It is achieved by using more than one HSRP group.
B. It is done in regards to either round robin or weight
basis.
C. It is used to offload the active router in a certain
HSRP group.
D. Single group HSRP is used to achieve more efficient link
utilization.
E. The return traffic is influenced by HSRP load sharing
configuration.
Answer: AC
5. Which of the following statements about authentication
responses and conditions is true? (Choose two.)
Select 2 response(s).
A. When a router receives a failure response, it stops
querying authentication methods.
B. When a router receives an error response, it stops
querying authentication methods.
C. If the router receives a failure response from an
authentication method, it queries the next method.
D. The router does not differentiate between failure and
error responses; the authentication process is always
interrupted.
E. If it receives no response from the authentication
method, a router will determine the error condition on its
own; the router also has the option to proceed to the next
method in a list if configured accordingly.
Answer: AE
6. When you issue the logging trap informational command,
what happens?
Select the best response.
A. An information trap is sent to the SNMP server.
B. Informational and debug messages are logged to the
syslog server.
C. All messages are sent to the logging host, where
selections are made.
D. All messages from emergencies to informational are sent
to the logging host.
Answer: D
7. Refer to the exhibit. This shows the NetFlow statistics
for a router. You are analyzing the traffic pattern and you
are interested in the percentage of
packets between 32 and 64 bytes in size and the number of
flows in progress. Which of these identifies both numbers
correctly?151011172.gif
Select the best response.
A. 69.4%, 4061
B. 24.9%, 980
C. 69.4%, 35
D. 6.94%, 980
E. cannot be determined from this output
Answer: C
8. What will happen if you issue the redundancy force-
switchover command on a Catalyst 6500 Series Switch with
redundant supervisor modules?
Select the best response.
A. reset of the primary supervisor
B. manual switchover from standby to active supervisor
C. manual switchover from active to standby supervisor
D. automatic switchover from active to standby on primary
supervisor failure
Answer: C
9. You are considering deploying the Cisco SSL VPN AIM
module in a Cisco 1800 Series Router. Which benefit should
you expect?
Select the best response.
A. to improve performance exclusively for SSL VPN
applications
B. to improve performance up to 300% for both IPsec and SSL
VPN applications
C. to improve performance for both IPsec and SSL VPN
applications with IPsec encryption taking place in hardware
D. to improve performance up to 200% for both IPsec and SSL
VPN applications with encryption taking place in hardware
E. to improve performance up to 300% for both IPsec and SSL
VPN applications with SSL encryption taking place in
hardware
Answer: D
10. During which phase is a proposal developed and
delivered?Select the best response.
A. Prepare
B. Plan
C. Design
D. Operate
Answer: A
http://www.examkiller.net
| Is This Answer Correct ? | 2 Yes | 1 No |
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
You have powered on a new router and you want to create an initial configuration. Which mode should you use? A. copy mode B. user mode C. setup mode D. startup mode
Identify the command that displays ethernet0/1 interface status? A.) show interface ethernet0/1 B.) show interface ethernet e0/1 C.) show interface ethernet0.1 D.) show ethernet0/1
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
What is difference between fast ethernet and ethernet port?
13 Answers Bank of Baroda, Bank Of India,
Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable
When ip confliction accord in subnet which ip assigned automatically and what it called?
Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor
Which OSI layer handles physical addresses and network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network