Cisco 642-832 Test, Sale Cisco 642-832 Vce Files With High Quality

Do not you know how to choose the Cisco 642-832 exam dumps? Being worried about the changed questions? Just try Flydumps new version Cisco 642-832 exam dumps. All the new questions and answers were added to the new dumps,visit Flydumps.com to free download Cisco 642-832 !

QUESTION 1
The following commands are issued on a Cisco Router:
Router(configuration)#access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1 Router(configuration)#access-list 199 permit tcp host 172.16.1.1 host 10.1.1.1 Router(configuration)#exit Router#debug ip packet 199
What will the debug output on the console show?
A. All IP packets passing through the router
B. Only IP packets with the source address of 10.1.1.1
C. All IP packets from 10.1.1.1 to 172.16.1.1
D. All IP Packets between 10.1.1.1 and 172.16.1.1
Correct Answer: D Explanation
Explanation/Reference:
Explanation:
In this example, the “debug ip packet” command is tied to access list 199, specifying which IP packets should be debugged. Access list 199 contains two lines, one going from the host with IP address 10.1.1.1 to 172.16.1.1 and the other specifying all TCP packets from host 172.16.1.1 to
10.1.1.1.
QUESTION 2
What level of logging is enabled on a Router where the following logs are seen?
%LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
A. alerts
B. critical
C. errors
D. notifications
Correct Answer: D Explanation
Explanation/Reference:
Explanation:
Cisco routers, switches, PIX and ASA firewalls prioritize log messages into 8 levels (0-7), as shown below: LevelLevel NameDescription 0 Emergencies System is unusable 1 Alerts Immediate action needed 2 Critical Critical conditions 3 Errors Error conditions 4 Warnings Warning conditions 5 Notifications Informational messages 6 Informational Normal but significant conditions 7 Debugging Debugging messages
When you enable logging for a specific level, all logs of that severity and greater (numerically less) will be logged. In this case we can see that logging level of 3 (as seen by the 3 in “LINK-3- UPDOWN”) and level 5 (as seen by the 5 in “LINEPROTO-5-UPDOWN”) are shown, which means that logging level 5 must have been configured. As shown by the table, logging level 5 is Notifications.
QUESTION 3
You have the followings commands on your Cisco Router:
ip ftp username admin ip ftp password backup
You have been asked to switch from FTP to HTTP. Which two commands will you use to replace the existing commands?
A. ip http username admin
B. ip http client username admin
C. ip http password backup
D. ip http client password backup
E. ip http server username admin
F. ip http server password backup Correct Answer: BD
Explanation Explanation/Reference:
Explanation:
Configuring the HTTP Client Perform this task to enable the HTTP client and configure optional client characteristics. The standard HTTP 1.1 client and the secure HTTP client are always enabled. No commands exist to disable the HTTP client. For information about configuring optional characteristics for the HTTPS client, see the HTTPS-HTTP Server and Client with SSL 3.0, Release 12.2(15)T, feature module. SUMMARY STEPS
1.
enable

2.
configure terminal

3.
ip http client cache {ager interval minutes | memory {file file-size-limit | pool pool-size-limit}

4.
ip http client connection {forceclose | idle timeout seconds | retry count | timeout seconds}

5.
ip http client password password

6.
ip http client proxy-server proxy-name proxy-port port-number

7.
ip http client response timeout seconds

8.
ip http client source-interface type number

9.
ip http client username username References:
QUESTION 4
You have 2 NTP servers in your network – 10.1.1.1 and 10.1.1.2. You want to configure a Cisco router to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which commands will you use to configure the router?
A. ntp server 10.1.1.1ntp server 10.1.1.2
B. ntp server 10.1.1.1ntp server 10.1.1.2 primary
C. ntp server 10.1.1.1ntp server 10.1.1.2 prefer
D. ntp server 10.1.1.1 fallbackntp server 10.1.1.2

Correct Answer: C Explanation Explanation/Reference:
Explanation:
Preferred server A router can be configured to prefer an NTP source over another. A preferred server’s responses are discarded only if they vary dramatically from the other time sources. Otherwise, the preferred server is used for synchronization without consideration of the other time sources. Preferred servers are usually specified when they are known to be extremely accurate. To specify a preferred server, use the prefer keyword appended to the ntp server command. The following example tells the router to prefer TimeServerOne over TimeServerTwo: Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#ntp server TimeServerOne prefer Router(config)#ntp server TimeServerTwo Router(config)#^Z
QUESTION 5
The following command is issued on a Cisco Router:
Router(configuration)#logging console warnings
Which alerts will be seen on the console?
A. Warnings only
B. debugging, informational, notifications, warnings
C. warnings, errors, critical, alerts, emergencies
D. notifications, warnings, errors
E. warnings, errors, critical, alerts

Correct Answer: C Explanation
Explanation/Reference:
Explanation:
Cisco routers prioritize log messages into 8 levels (0-7), as shown below: LevelLevel NameDescription 0 Emergencies System is unusable 1 Alerts Immediate action needed 2 Critical Critical conditions 3 Errors Error conditions 4 Warnings Warning conditions 5 Notifications Informational messages 6 Informational Normal but significant conditions 7 Debugging Debugging messages
When you enable logging for a specific level, all logs of that severity and greater (numerically less) will be logged. In this case, when you enable console logging of warning messages (level 4), it will log levels 0-4, making the correct answer warnings, errors, critical, alerts, and emergencies.
QUESTION 6
Which two of the following options are categories of Network Maintenance tasks?
A. Firefighting
B. Interrupt-driven
C. Policy-based
D. Structured
E. Foundational
Correct Answer: BD Explanation

Explanation/Reference:
Explanation:
Proactive Versus Reactive Network Maintenance:
Network maintenance tasks can be categorized as one of the following:
Structured tasks: Performed as a predefined plan.
Interrupt-driven tasks: Involve resolving issues as they are reported.
References:

QUESTION 7
You enabled CDP on two Cisco Routers which are connected to each other. The Line and Protocol status for the interfaces on both routers show as UP but the routers do not see each other a CDP neighbors. Which layer of the OSI model does the problem most likely exist?
A. Physical
B. Session
C. Application
D. Data-Link
E. Network

Correct Answer: D Explanation
Explanation/Reference:
Explanation:

CDP is a protocol that runs over Layer 2 (the data link layer) on all Cisco routers, bridges, access servers,
and switches. CDP allows network management applications to discover Cisco
devices that are neighbors of already known devices, in particular, neighbors running lower-layer,
transparent protocols. With CDP, network management applications can learn the device
type and the SNMP agent address of neighboring devices. This feature enables applications to send
SNMP queries to neighboring devices. In this case, the line protocol is up which means
that the physical layer is operational (layer 1) but the data link layer is not.
References:

QUESTION 8
FCAPS is a network maintenance model defined by ISO. It stands for which of the following ?
A. Fault Management
B. Action Management
C. Configuration Management
D. Protocol Management
E. Security Management
Correct Answer: ACE Explanation

Explanation/Reference:
Explanation:
The FCAPS maintenance model consists of the following: FCAPS Maintenance Tasks:
QUESTION 9
Which three management categories are contained in the FCAPS network maintenance model? (Choose three.)
A. Config
B. Fault
C. Storage
D. Accounting
E. Redundancy
F. Telecommunications

Correct Answer: ABD Explanation
Explanation/Reference:
Explanation:
QUESTION 10
What is the result of configuring the logging console warning command?
A. Messages with a severity level of 4 and higher will be logged to all available TTY lines.
B. Only warning messages will be logged on the console.
C. Warning, error, critical, and informational messages will be logged on the console.
D. Warning, critical, alert, and emergency messages will be logged on the console.
E. The logging console warning command needs to be followed in the configuration with logging buffered byte size to specify the message buffer size for the console.

Correct Answer: D Explanation
Explanation/Reference:
Explanation:
QUESTION 11
Refer to the shown below.
%LINK-3-UPDOWN: Interface Serial0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
What statement is correct regarding the output shown in the graphic?
A. These two log messages will not have a severity level. They are not errors but are just informational messages.
B. The first log message is categorized as a warning message.
C. These messages regarding interface status are normal output and will always be displayed when you exit config mode.
D. The first log message is an error message with a severity level of 3.
E. The second message would be shown if the logging console warning command had been issued.

Correct Answer: D Explanation
Explanation/Reference:
Explanation:
QUESTION 12
Refer to the configuration statements shown in the graphic above. R1(config)#access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1 R1(config)#access-list 199 permit tcp host 172.16.1.1 host 10.1.1.1 R1 (config)#end R1#debug ip packet 199 detail
Which statement reflects what the effect is of this configuration sequence?
A. These commands will generate an error message because you cannot use an access list with any debug commands.
B. These commands will have no effect at all. The debug ip packet command will work as normal and display info for all IP packets.
C. These commands turn on debug ip packet only for packets between hosts 10.1.1.1 and 172.16.1.1.
D. These commands will only work when you specify only one host rather than two. Correct Answer: C

Explanation Explanation/Reference:
Explanation:
QUESTION 13
What is the result if you configure two devices with the ntp server command?
A. Nothing will happen until one of the devices is configured with the prefer parameter.
B. The NTP protocol will determine which server is most reliable and will synchronize to that server.
C. The device with the highest priority will become the active server and the other device will become the backup server.
D. The device with the lowest MAC address will become the active server and the other device will become the backup server.

Correct Answer: B Explanation
Explanation/Reference:
Explanation:
QUESTION 14
A technician is troubleshooting connectivity problems between two routers that are directly connected through a serial line. The technician notices that the serial line is up, but cannot see any neighbors displayed in the output of the show cdp neighbors command.
In which OSI layer is the problem most likely occurring?
A. physical
B. data link
C. network
D. transport
E. application Correct Answer: B

Explanation Explanation/Reference:
Explanation:
QUESTION 15
What are two approaches to maintaining a network?(Choose two.)
A. PPDIOO
B. structured
C. bottoms up
D. interrupt-driven Correct Answer: BD

Explanation Explanation/Reference:
Explanation:
QUESTION 16
Refer to the graphic above.

Which command sequences, shown below, would accomplish the same task as that shown in the graphic? A)

B)
C)
D)
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D

Correct Answer: A Explanation
Explanation/Reference:
Explanation:
QUESTION 17
Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Select two)
A. The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
B. The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
C. The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point, manage authentication to the wireless network, and enable encryption.
D. The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

Correct Answer: BC Explanation
Explanation/Reference:
Explanation:
You can configure your Cisco Aironet Wireless LAN Client Adapter through the Cisco ADU or a third-party tool, such as the Microsoft Wireless Configuration Manager. Because third-party tools may not provide all the functionality available in ADU, Cisco recommends that you use ADU. The Aironet Desktop Utility (ADU) can support only one wireless client adapter as well as Aironet Desktop Utility establish the association between the client adapter and Access Point, allows to authenticate wireless client, allows to configure encryption by setting static WEP, WPA/WPA2 passphrase.
QUESTION 18
At which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?
A. Layer 5
B. Layer 4
C. Layer 3
D. Layer 2
E. Layer 1

Correct Answer: D Explanation
Explanation/Reference:
Explanation:
Spanning-Tree Protocol (STP) is a Layer 2 (L2) protocol designed to run on bridges and switches. The specification for STP is called 802.1d. The main purpose of STP is to ensure that you do not run into a loop situation when you have redundant paths in your network. Loops are deadly to a network.
QUESTION 19
In computer networking a multicast address is an identifier for a group of hosts that have joined a multicast group. Multicast addressing can be used in the Link Layer (OSI Layer 2), such as Ethernet Multicast, as well as at the Internet Layer (OSI Layer 3) as IPv4 or IPv6 Multicast. Which two descriptions are correct regarding multicast addressing?
A. The first 23 bits of the multicast MAC address are 0x01-00-5E. This is a reserved value that indicates a multicast application.
B. The last 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reserved value that indicates a multicast application.
C. To calculate the Layer 2 multicast address, the host maps the last 23 bits of the IP address into the last 24 bits of the MAC address. The high-order bit is set to 0.
D. The first 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reserved value that indicates a multicast application.

Correct Answer: CD Explanation
Explanation/Reference:
Explanation:
The point of this question is the form of multicast MAC address, and the conversion between the multicast
MAC address and IP address.

The multicast MAC address is 6 bytes(48 bits), the first 3 bytes (24 bits) of the multicast MAC address are
0x01-00-5E, the last 3 bytes(24 bits) of the multicast MAC address =0 + 23 bit(the last 23 bit of the IP

address). “0x01-00-5E” is a reserved value that indicates a multicast application.

Ensure that you are provided with only the best and most updated Cisco 642-832 Certification training materials, we also want you to be able to access Cisco 642-832 easily, whenever you want.We provide all our Cisco 642-832 Certification exam training material in PDF format, which is a very common format found in all computers and gadgets. Now we add the latest Cisco 642-832 content and to print and share content.

You may also like...