Download New Updated (Spring 2015) Cisco 640-864 Actual Tests 71-80

By | April 27, 2015




Which two statements about IPv6 addresses are true? (Choose two.)


A.      Two colons (::) are used to represent successive hexadecimal fields of zeros.

B.      Leading zeros are required.

C.      Two colons (::) are used to separate fields.

D.      A single interface will have multiple IPv6 addresses of different types.


Correct Answer: AD




Which three security measures can be used to mitigate DoS attacks that are directed at exposed hosts within the E-Commerce module? (Choose three.)


A.      Use NIDSs and HIPSs to detect signs of attack and to identify potentially successful breaches.

B.      Partition the exposed hosts into a separate LAN or VLAN.

C.      Use LAN switch VTP pruning to separate hosts on the same segment.

D.      Use a VPN concentrator (IPSec) to protect and verify each connection to the exposed host or hosts.

E.       Use firewalls to block all unnecessary connections to the exposed hosts.


Correct Answer: ABE







Which technology can ensure data confidentiality, data integrity, and authentication across a public IP network?


A.      VSANs

B.      VPDNs

C.      VLANs

D.      GRE

E.       IPsec


Correct Answer: E




Which statement best describes Call Admission Control?


A.      It extends QoS capabilities to protect voice from excessive data traffic.

B.      It protects voice from voice.

C.      It provides endpoint registration control.

D.      It provides endpoint bandwidth control.


Correct Answer: B




A customer wishes to implement VoIP using centralized call-processing. In addition, the customer wishes to have voice quality and good bandwidth utilization. Which codec would you suggest?


A.      G.711

B.      G.729

C.      G.726

D.      G.723.1


Correct Answer: B




Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three.)


A.      server statistics

B.      network audit

traffic analysis

D.      visual inventory

E.       staff input


Correct Answer: BCE




Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer’s existing network?


A.      NetMon

B.      MRTG

C.      SNMP MIB compiler

D.      NetFlow


Correct Answer: D




Which statement identifies a benefit obtained when using a top-down network design plan?


A.      provides a more detailed picture of the desired network

B.      facilitates design based on previous experience

C.      is less time-consuming than using a bottom-up approach

D.      allows quick responses to design requests

E.       incorporates customer organizational requirements


Correct Answer: E




Lightweight access points are being deployed in remote locations where others are already operational. The new access points are in a separate IP subnet from the wireless controller. OTAP has not been enabled at any locations. Which two methods can the AP use to locate a wireless controller? (Choose two.)


A.      NV-RAM IP address

B.      master

C.      primary, secondary, tertiary

D.      DHCP

E.       local subnet broadcast

F.       DNS


Correct Answer: DF



Which Cisco security solution can quarantine and prevent non-compliant end stations from accessing the network until they achieve security policy compliance?


A.      Cisco Security Monitoring, Analysis, and Response System

B.      Adaptive Security Appliance

C.      Network Admission Control

D.      Network Intrusion Prevention System

E.       Cisco Secure Connectivity

F.       Access Control Server


Correct Answer: C


Free VCE & PDF File for Cisco 640-864 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …