Adobe certification Adobe
Apple certification Apple
Avaya certification Avaya
Check Point certification Check Point
Cisco certification Cisco
Citrix certification Citrix
CIW certification CIW
CompTIA certification CompTIA
CWNP certification CWNP
EC-Council certification EC-Council
EMC certification EMC
Exin certification Exin
F5 certification F5
Fortinet certification Fortinet
GIAC certification GIAC
Hitachi certification Hitachi
HP certification HP
IBM certification IBM
Isaca certification Isaca
ISC certification ISC
ISEB certification ISEB
Juniper certification Juniper
LPI certification LPI
Microsoft certification Microsoft
Oracle certification Oracle
PMI certification PMI
Riverbed certification Riverbed
SAP certification SAP
Sun certification Sun
Sybase certification Sybase
Symantec certification Symantec
VMware certification VMware
All Exams

Cisco 642-873 Exam - PassITexam.com

Free 642-873 Sample Questions:

1. Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Answer: B

2. Which of these is a Layer 2 transport architecture that provides packet-based transmission optimized for data based on a dual (counter-rotating) ring topology?
A. DTP
B. RPR
C. SDH
D. CWDM
E. DWDM
Answer: B

3. Which three of these are elements of the Cisco Unified Wireless Network architecture? (Choose three)
A. cell phones
B. remote access
C. mobility services
D. network management
E. network unification
F. network decentralization
Answer: C, D, E

4. Which three Layer 2 access designs have all of their uplinks in an active state? (Choose three.)
A. Flex Links
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Answer: B, C, E

5. Which of these terms refers to call issues that cause variations in timing or time of arrival?
A. queuing
B. jitter
C. packet loss
D. digitized sampling
E. signal-to-noise ratio ratio
Answer: B

6. Which two of these are characteristics of an IDS sensor? (Choose two.)
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IDS interface and exits on another
E. has a promiscuous interface that is used to monitor the network
Answer: A, E

7. In base e-Commerce module designs, where should firewall perimeters be placed?
A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
Answer: A

8. In which two locations in an enterprise network can an IPS sensor be placed? (Choose two.)
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking
Answer: C, D

9. What is a virtual firewall?
A. another name for a firewall deployed in routed mode
B. another name for a firewall deployed in transparent mode
C. a separation of multiple firewall security contexts on a single firewall
D. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E. a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
Answer: C

10. In a VoWLAN deployment, what is the recommended separation between cells with the same channel?
A. 19 dBm
B. 7 dBm
C. 10 dBm
D. 6 dBm
E. 5 dbm to 10 dBm
Answer: A

11. Why is STP required when VLANs span access layer switches?
A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology
Answer: B

12. Which site-to-site VPN solution allows Cisco routers, PIX Firewalls, and Cisco hardware clients to act as remote VPN clients in order to receive predefined security policies and configuration parameters from the VPN headend at the central site?
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
Answer: A

13. Which two design concerns must be addressed when designing a multicast implementation? (Choose two.)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
Answer: A, F

14. Which two of these are recommended practices with trunks? (Choose two.)
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
Answer: B, E

15. For acceptable voice calls, the packet error rate should be no higher than what value?
A. 0.1%
B. 1%
C. 2.5%
D. 25%
Answer: B

16. Which of these statements is true of clientless end-user devices?
A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required in order to assign IP addresses.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.
Answer: A

17. Which statement is correct regarding NBAR and NetFlow?
A. NetFlow uses five key fields for the flow.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.
E. NetFlow examines data in Layers 2 through 4.
Answer: B

18. What is meant by the term "firewall sandwich"?
A. multiple layers of firewalling
B. a method of operating firewalls from multiple vendors
C. firewall connections in either an active or standby state
D. an architecture in which all traffic between firewalls goes through application-specific servers
E. an architecture in which all traffic between firewalls goes through application-specific gateways
Answer: A

19. When BGP tuning is used, how is packet flow into the e-commerce module controlled?
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
Answer: D