Download New Updated (Spring 2015) Cisco 642-813 Actual Tests 31-40

By | April 28, 2015




During the implementation of a voice solution, which two required items are configured at an access layer switch that will be connected to an IP phone to provide VoIP communication?

(Choose two.)


A.        allowed codecs

B.        untagged VLAN

C.        auxiliary VLAN

D.        Cisco Unified Communications Manager IP address

E.         RSTP


Correct Answer: BC






Which two statements best describe Cisco IOS IP SLA? (Choose two.)


A.       only implemented between Cisco source and destination-capable devices

B.       statistics provided by syslog, CLI, and SNMP

C.       measures delay, jitter, packet loss, and voice quality

D.      only monitors VoIP traffic flows

E.       provides active monitoring


Correct Answer: CE




Which two items best describe a Cisco IOS IP SLA responder? (Choose two.)


A.        required at the destination to implement Cisco IOS IP SLA services

B.        improves measurement accuracy

C.        required for VoIP jitter measurements

D.        provides security on Cisco IOS IP SLA messages via LEAP or EAP-FAST authentication

E.         responds to one Cisco IOS IP SLA operation per port

F.         stores the resulting test statistics


Correct Answer: BC




Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancy using NSF? (Choose two.)


A.        supported by RIPv2, OSPF, IS-IS, and EIGRP

B.        uses the FIB table

C.        supports IPv4 and IPv6 multicast

D.        prevents route flapping

E.         independent of SSO

F.         NSF combined with SSO enables supervisor engine load balancing


Correct Answer: BD




You are tasked with designing a security solution for your network. What information should be gathered before you design the solution?


A.        IP addressing design plans, so that the network can be appropriately segmented to mitigate potential network threats

B.        a list of the customer requirements

C.        detailed security device specifications

D.        results from pilot network testing


Correct Answer: B




Which two components should be part of a security implementation plan? (Choose two.)


A.        detailed list of personnel assigned to each task within the plan

B.        a Layer 2 spanning-tree design topology

C.        rollback guidelines

D.        placing all unused access ports in VLAN 1 to proactively manage port security

E.         enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis


Correct Answer: BC




When creating a network security solution, which two pieces of information should you have obtained previously to assist in designing the solution? (Choose two.)


A.        a list of existing network applications currently in use on the network

B.        network audit results to uncover any potential security holes

C.        a planned Layer 2 design solution

D.        a proof-of-concept plan

E.         device configuration templates


Correct Answer: AB




What action should you be prepared to take when verifying a security solution?


A.        having alternative addressing and VLAN schemes

B.        having a rollback plan in case of unwanted or unexpected results

C.        running a test script against all possible security threats to insure that the solution will mitigate all potential threats

D.        isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system


Correct Answer: B


When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?


A.        No more than one secure MAC address should be set.

B.        The default is set.

C.        The IP phone should use a dedicated port, therefore only one MAC address is needed per


D.        No value is needed if the switchport priority extend command is configured.

E.         No more than two secure MAC addresses should be set.


Correct Answer: E




Refer to the exhibit. From the configuration shown, what can be determined?




A.        The sticky addresses are only those manually configured MAC addresses enabled with the

sticky keyword.

B.        The remaining secure MAC addresses are learned dynamically, converted to sticky secure

MAC addresses, and added to the running configuration.

C.        A voice VLAN is configured in this example, so port security should be set for a maximum of


D.        A security violation restricts the number of addresses to a maximum of 10 addresses per

access VLAN and voice VLAN. The port is shut down if more than 10 devices per VLAN

attempt to access the port.


Correct Answer: B


Free VCE & PDF File for Cisco 642-813 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …