Cisco 640-864 Exam Practice PDF,High Pass Rate Cisco 640-864 Practice For Sale
Because Cisco 640-864 exam has changed recently,Flydumps presents the new version of Cisco 640-864 practice test, which helps candidates to pass the Cisco 640-864 exam easily.The exam dumps covers all aspect of Cisco 640-864 exam.You can visit our website to free Cisco 640-864 download the New Version VCE Player.
QUESTION 130
A network is being designed to meet the requirements listed.
Within the enterprise network:
All routers are Cisco 3800 Series routers running the latest Cisco IOS release.
The fastest convergence time possible is required.
Unequal cost load-balancing is required.
For Internet connections:
A single link is used to connect to a single ISP.
Which two routing protocols should be used?(Choose two.)
A. Use Internal BGP as the IGP within the enterprise.
B. Use Static (Default) routing between the enterprise and the ISP.
C. Use OSPF as the IGP within the enterprise.
D. Use EIGRP as the IGP within the enterprise.
E. Use EIGRP between the enterprise and the ISP.
F. Use External BGP between the enterprise and the ISP.
Correct Answer: BD
QUESTION 131
Which two statements best describe Cisco Wireless LAN Guest Access in a Cisco Unified Wireless Network? (Choose two.)
A. Dedicated guest VLANs are only extended to the wireless controllers in the network to ensure path isolation.
B. Guest tunnels have limitations on which wireless controllers can originate the tunnel.
C. Dedicated guest VLANs are extended throughout the network to the access points for path isolation.
D. Guest tunnels can originate and terminate on any wireless controller platform.
E. Guest tunnels have limitations on which wireless controllers can terminate the tunnel.
F. Dedicated guest access in the DMZ extends from the origination to the termination controllers without dedicated guest VLANs.
Correct Answer: EF
QUESTION 132
For which technology is IPsec required for a site-to-site enterprise WAN/MAN architecture?
A. self-deployed MPLS
B. ATM
C. Frame Relay
D. SP MPLS VPN
E. ISP Service
Correct Answer: E
QUESTION 133
Refer to the exhibit. Which statement accurately represents the characteristics of the core layer in this design?
A. Access lists should be used in the core to perform packet manipulation.
B. QoS should be performed only in the core.
C. Load balancing should never be implemented or used in the core.
D. It is acceptable to use a partial mesh in the core if it is connected to each device by multiple paths.
E. Policy-based traffic control is implemented in the core to enable prioritization, ensuring the best performance for all time-critical applications.
Correct Answer: D
QUESTION 134
What does Cisco recommend as the foundation of any deployed security solution?
A. Customer needs
B. Security audit
C. Service-level agreement
D. Corporate security policy
Correct Answer: D
QUESTION 135
What is the administrative distance of eBGP routes?
A. 200
B. 100
C. 20
D. 110
Correct Answer: C
QUESTION 136
Which name is for the Cisco product that provides centralized, policy-based security management?
A. IDS
B. Out-of-band management
C. AAA
D. CSPM
Correct Answer: D QUESTION 137
Which statement represents a likely starting point for planning network changes?
A. Protocol assessment “Pass Any Exam. Any Time.” – www.actualtests.com 58
B. Determining the design requirements
C. Determining the business needs
D. Determining the application requirements
Correct Answer: C QUESTION 138
What does IGMP stand for?
A. Internet Group Management Protocol
B. Interior Gateway Routing Protocol
C. Interior Group Management Protocol
D. Interior Gateway Media Protocol
Correct Answer: A QUESTION 139
DRAG DROP
A.
B.
C.
D.
Correct Answer:
QUESTION 140
ISDN is short for Integrated Services Digital Network. Under what category of WAN technologies does ISDN belong?
A. Cell-switched
B. Circuit-switched
C. Packet-switched
D. Leased lines
Correct Answer: B QUESTION 141
As a network engineer, can you tell me accounting management on a network-management system allows a network manager to perform which function?
A. Assess the network’s effectiveness and throughput
B. Charge back to users for network resources
C. Performance management
D. Identify problem areas in the network
Correct Answer: B QUESTION 142
Which address type is 225.10.1.1?
A. Unicast
B. Anycast
C. Multicast
D. Broadcast
Correct Answer: C QUESTION 143
What is the length of the key used with Triple Data Encryption Standard (3DES)?
A. 64 bits
B. 168 bits
C. 128 bits
D. 56 bits
Correct Answer: B QUESTION 144
Refer to the exhibit.
“Pass Any Exam. Any Time.” – www.actualtests.com 61
Which layer is the distribution layer?
A. Layer A
B. Layer B
C. Layer C
D. Layers A and B form a consolidated core and distribution layer
Correct Answer: B
QUESTION 145
A wireless LAN or WLAN is a wireless local area network, which is the linking of two or more computers or devices without using wires. How are wireless LANs identified?
A. Service Set Identifier (SSID)
B. Internet Group Management Protocol (IGMP)
C. IP network
D. Wired Equivalent Privacy (WEP) key
Correct Answer: A
QUESTION 146
Observe the following options, what is the hierarchy for IPv6 aggregatable addresses?
A. Global, site, loop “Pass Any Exam. Any Time.” – www.actualtests.com 62
B. Multicast, anycast, unicast
C. Public, site, interface
D. Internet, site, interface
Correct Answer: C QUESTION 147
Which IGP protocol is a common choice to EIGRP and OSPF as a routing protocol for large networks?
A. RIPv2
B. IS-IS
C. IGRP
D. OSPFv2
Correct Answer: B
QUESTION 148
Which type of routing protocol will be used when connecting to an Internet service provider?
A. Classless routing protocol
B. Exterior gateway protocol
C. Interior gateway protocol
D. Classful routing protocol
Correct Answer: B
QUESTION 149
Which routing protocol is classful?
A. Intermediate System-to-Intermediate System (IS-IS) and OSPF
B. Routing Information Protocol Version 1 (RIPv1) and RIPv2
C. IGRP and RIPv1
D. Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF)
Correct Answer: C
QUESTION 150
Which attack type would you expect on segments that have many servers for some well-known applications?
A. Trojan horses
B. DoS attacks
C. Application-layer attacks
D. Password attacks
Correct Answer: C
Cisco 640-864 tests containing questions that cover all sides of tested subjects that help our members to be prepared and keep high level of professionalism. The main purpose of Cisco 640-864 exam is to provide high quality test that can secure and verify knowledge, give overview of question types and complexity that can be represented on real exam certification