Day: September 21, 2016

Cisco 642-384 Exam Questions Answers, 100% Pass Guarantee Cisco 642-384 Certification Download Guaranteed SuccessCisco 642-384 Exam Questions Answers, 100% Pass Guarantee Cisco 642-384 Certification Download Guaranteed Success

Welcome to download the newest Pass4itsure 70-470 dumps

FLYDUMPS Cisco 642-384 is to start from the basics, then gradually deepening the focus on the content of the curriculum, which generally takes a lot of study time. You are probably also hesitant; after all, to participate in the Cisco 642-384 exam, it takes a lot of time and money. However, once choose FLYDUMPS Cisco 642-384 exam sample questions, you can save both time and money in your Cisco 642-384 exam. FLYDUMPS provide a convenient way to learn. FLYDUMPS Cisco 642-384 exam sample questions can help you quickly through Cisco 642-384 exam. By way of simulation questions, FLYDUMPS Cisco 642-384 exam sample questions help you understand all test points, and includes multiple-choice questions and experimental operation part of the Cisco 642-384 exam.

QUESTION 132
Which command assigns a cost value of “17” to a switch port?
A. spanning-tree interfacefastethernet 5/8 17
B. spanning-treeportcost 17
C. spanning-treeportcost 17
D. spanning-treevlan 1 cost 17

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 133
You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted interface. You suspect that the rule may be blocking necessary traffic onto the network. What must you do to delete that rule when using Cisco Router and Security Device Manager?
A. Select ACL Editor > Access Rules to delete the rule.
B. You must remove the association between the rule and the interface before deleting the rule
C. You must delete the associated access list on the interface, then reconfigure the access list as required, and then reapply the access group to the proper interface.
D. Go to the Edit Firewall Policy tab to delete the rule.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 134
A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling and both radios set at 20 mW. The wireless bridges are not able to establish or maintain a link.
What is needed to successfully complete this link?
A. An amplifier needs to be installed at one of the sites.
B. The antenna must be raised high enough to clear the trees
C. Lower loss cabling needs to be used to bring the EIRP into legal limits.
D. Due to the trees, a 21-dBi dish needs to be used for its narrower beam width.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 135
You connect via Telnet to a Cisco access point and enter the command show dot11 link test. Which output might you obtain?
A. signal-to-noise ratio
B. incoming and outgoing signal strength
C. TX packets dropped
D. RX packets per second

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 136
Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the sitE.to-site VPN between Router A and Router B.
What is the mostly likely cause of this fault?

A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150-199).
B. The IKE encryption methods on the two routers are different
C. the IPSec policy map names on the two routers are different.
D. the IPSec rules on the two routers are not permitting the Answer: interesting traffic.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 137
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.

How many active VPN clients are currently connected to the 1841 ISR router?
A. 0
B. 1
C. 2
D. 3
E. 4
F. 5

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 138
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.

Which IP address or address range will be used when allocating an internal IP address to the VPN clients
for the “test” VPN group?________________________________________________________________________
A. 10.1.1.100 to 10.1.1.200 I
B. 10.1-1.2 to 10.1.1.254
C. 192.168.1.1 to 192.168.1.100
D. 192.168.1.2 to 192.168.1.254
E. 192.168.1.1
F. 192.168.1.2

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 139
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.

Which authentication method is used by the test” VPN group?
A. RSA Encrypted Nounce
B. RSA Digital Signature
C. PrE.Shared Key
D. Digital Certificate
E. DH2

Correct Answer: C Section: (none) Explanation
Explanation/Reference: QUESTION 140
You are the network consultant. You have a customer with a small network of 15 remote sites is trying to optimize its VPN by migrating some remote sites using Frame Relay connections to the Internet to using cable connections to the Internet. The keypoint for your customer is to save money. Only a moderate amount of IP traffic is passing through the network, most of which is from the remote sites to the central site. IPSec should be used to provide VPN functionality and basic confidentiality is desired..Considering the above requirements. Which solution would be the easiest for this customer to set up and manage?
A. point-to-point
B. partial mesh
C. point-to-multipoint
D. hub-and-spoke

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 141
In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?
A. The WCS sends excessive traffic to the rogue thus overloading the access point.
B. The rogue MAC address is used to spoof broadcastdeassociation packets.
C. The rogue MAC address is used to spoof broadcastdeauthentication packets.
D. The WCS sends out excessive signals on the same channel when the rogue is detected.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 142
With industry-leading services and performance, the Cisco Catalyst 6500 Series Switch is Cisco’s flagship switching solution. It delivers the most comprehensive feature sets for core, distribution, wiring closet, data center, enterprise WAN routing, and Metro-Ethernet deployments. Which layer you think is recommended that the Cisco Catalyst 6500 Series WLSM be placed?
A. core
B. distribution
C. access
D. presentation

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 143
The Cisco Lifecycle Services approach defines the activities needed to help you successfully deploy and operate Cisco technologies and optimize their performance throughout the lifecycle of your network. Which statement is an accurate list of Cisco Lifecycle Services phases?
A. initiation, prepare, plan, design, implement, operate, and optimize
B. site assessment, risk assessment, solution selection and acquisition, testing, and operations
C. prepare, plan, design, implement, operate, and optimize
D. deployment, testing, implementation, and production

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 144
Which IP address or address range will be used when allocating an internal ip address to the VPN client for the test

A. 120.1.1.100 to 10.1.1.200
B. 10.1.1.2 to 10.1.1.254
C. 192.1681.1 to 192.1681.1.100
D. 192.1681.2 to 192.1681.1.254

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 145
Which authentication method is used by the test VPN group?

A. RSA EncryptedNounce
B. RSA Digital Signature
C. Pre-shared key
D. DH2

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 146
A network administrator is troubleshooting an EIGRP connection between RA and RB. Given the debug output on RA, which two statements are true?(Choose two)
A. RA received a hello packet with mismatched hello timers.
B. RA received a hello packet with mismatched metric-calculation mechanisms.
C. RA will form an adjacency with RB.
D. RAwill not form an adjacency with RB.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 147
You are the network administrator. There is one Gigabit Ethernet port on the Cisco CE520 used in the Smart Business Communications System. Which port role assignment would you make for?
A. Cisco Express 520
B. Cisco UC520
C. Cisco CE520
D. Cisco 871W

Correct Answer: B Section: (none) Explanation Explanation/Reference:
QUESTION 148
Refer to the exhibit. CK-SA and CK-SC are running PVST+ STP, and CK-SB is running 802.1 Q STP. If the BPDU of the root in VLAN 1 is better than the BPDU of the root in VU\N 2, then there is no blocking port in the VLAN 2 topology. The BPDU of VU\N 2 never makes a “full circle” around the topology; it is replaced by the VLAN 1 BPDU on the CK-SB-CK-SC link, because CK-SB runs only one STP merged with VU\N 1 STP of PVST+. Thus, there is a forwarding loop.

What does PVST+ do to correct this?
A. CK-SA sends PVST+ BPDUs ofVLAU 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
B. CK-SB sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SA) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
C. CK-SC sends PVST+BPDUsofVU\N 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SAwill put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
D. CK-SA sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SB) towards CK-SB. CK-SA will put port CK-C-CK-B into a type-inconsistent state, which prevents the loop.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 149
A wireless autonomous 1200 access point running core feature set in root mode has its SSID set to Factory_floor and provides connection to a repeater access point with its SSID set to factory_floor, if the root-mode access point is using channel 11 which channel will the repeater access point use?
A. channel 11
B. channel 1 or 6
C. anynonoverlapping channel
D. The root access point and the repeater will negotiate this setting

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 150
The VPN server uses a preshared key for remote device authentication
A. TRUE
B. FALSE

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 151
A customer with a large enterprise network wants to allow employees to work from home over the Internet. The customer anticipates a large amount of traffic, predominantly toward the central site. The customer also requires a VPN using strong user authentication and encryption to protect highly sensitive data. Which solution best meets this customer’s requirements?
A. remote-access VPN with software encryption
B. remote-access VPN with hardware encryption
C. site-to-site VPN with hub-and-spoke tunnels using 3DES and pre-shared secrets
D. site-to-site Cisco Easy VPN

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 152
The tables contain information from the Cisco Router and Security Device Manager configurations of RA and RB. Traffic between PC1 and PC2 is not successfully establishing the site-to-site VPN between -RA and -RB. What is the mostly likely cause of this fault?
A. RAis using a standard IP ACL (100-149) while RB is using a Turbo ACL(150-199).
B. The IPSec encryption methods used by each router do not match.
C. The D-H Group settings on the two routers are the same.
D. The IPSec rules on the two routers are not permitting the correct interesting traffic.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 153
You are the network consultant. When will you assess a customer’s current network infrastructure?
A. plan
B. design
C. operate
D. optimize

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 154
A client is experiencing lower throughput and more packet retransmits is one area of the wireless network. At these times, the client utility shows high signal strength but low signal quality. What may be causing this issue?
A. The client does not support Cisco Compatible Extensions version 2.
B. Diversity is not enabled in the access point.
C. The WDS is failing to register the client card in the WLSM.
D. The channel is set incorrectly in the access point or in the client configuration.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 155
Which statement is correct about the current address translation configurations on the security appliance?
A. Dynamic NAT is used to translate the 10.0.1.100 host on the inside interface to a global address of
192.168.1.1
B. Port AddressTranslation(PAT) is used to translate any host on the inside interface to the 192.168.1.100 global address.
C. Static NAT is used to translate the 172.16.1.2 host on thedmzl interface to a global address of
192.168.1.102
D. Dynamic NAT is used to translate any host ondmzl and dmz2 interfaces to a mapped address from the address from the address pool of 192.168.1.110 to 192.168.1.250

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 156
VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted to the trunking encapsulation protocol (802.1 q or ISL).You worry about the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration can be used to mitigate VLAN hopping? (Choose two.)
A. switchporttrunk encapsulation
B. switchport mode trunk
C. switchport access vlan
D. switchport mode access

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 157
CiscoWorks SNMS is a part of the CiscoWorks family of products for managing small to large networks. CiscoWorks SIMMS is a new Web-based network management solution for small to medium-sized businesses, with 40 or fewer Cisco internetworking devices such as switches, routers, hubs, and access servers. CiscoWorks SNMS can also monitor third-party IT assets such as servers, applications, services, and printers A Public Switched Telephone Network (PSTN) trunk is typically the voice interconnect between any business and the outside world. Which network management tool is designed to allow businesses to manage up to 40 devices?
A. CiscoWorks Unrestricted
B. CiscoWorks WAN Management
C. CiscoWorks LAN Management
D. CiscoWorks SNMS

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 158
Which statement is correct about the information in the Cisco Adaptive Security Device Manager General and License Information screen?
A. The security appliance supports active/active failover only.
B. The security appliance supports 3DES-AES only.
C. The managed device is a Cisco ASA 5540 Security Appliance with VPN premium license enabled.
D. The managed device is Cisco PIX515E Security Appliance.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 159
Which three are different types of STP inconsistencies in a Layer 2 network?(Choose three)
A. MAC inconsistency
B. Root inconsistency
C. EtherChannel inconsistency
D. type inconsistency

Correct Answer: BCD Section: (none) Explanation Explanation/Reference:
QUESTION 160
According to the error log, VLAN 1 is where the BPDU was received, and VLAN 2 is where the BPDU originated. When inconsistency is detected, what happens?
A. VLAN 1 is blocked, while VLAN 2 is forwarding
B. VLAN1 is blocked, while VLAN 2 is listening
C. Both VLANs are listening on the port from which this BPDU is send
D. Both VLANs are blocked on the port from which this BPDU is received

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 161
Which is the current configured default gateway IP address on the security appliance?
A. 172.16.10.1
B. 172.16.1.1
C. 192.168.1.2
D. 10.0.1.1

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 162
Which statement is true about a Cisco Aironet 350 Series wireless client when its green LED appears to be off and its amber LED is blinking?
A. The client adapter is scanning for a network.
B. The client adapter is in ad hoc mode.
C. The client adapter is performing a self-test.
D. The client adapter is in power-save mode.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 163
You are the Cisco Configuration Assistant. Your IT Manager tells you 802.11b telephone can receive an audio signal from an access point, but cannot send audio. What is the most likely reason?
A. The value of RSSI telephone is greater than 30.
B. The access point only receives 802.11g data rates.
C. The security settings in the telephone mismatch the access point.
D. The telephone transmit power is significantly lower than the t the access point

Correct Answer: D Section: (none) Explanation
Explanation/Reference:

Flydumps.com provides you with the most reliable practice exams to master Cisco 642-384 Certification. Our Microsoft questions and answers are certified by the senior lecturer and experienced technical experts in the Microsoft field. These test questions provide you with the experience of taking the Cisco 642-384 actual test.

Welcome to download the newest Pass4itsure CISSP-ISSEP dumps:

https://www.pass4itsure.com/issep.html

http://www.i-tec.org/avaya-3102-certification-exam-best-quality-avaya-3102-exam-dumps-with-the-knowledge-and-skills/

Cisco 642-384 Exam, New Updated Cisco 642-384 Dump Is Your Best ChoiceCisco 642-384 Exam, New Updated Cisco 642-384 Dump Is Your Best Choice

Welcome to download the newest Pass4itsure ITILFND dumps:

You just need the right Cisco 642-384 Exam and you’ll be continuing your journey when it comes to achievement. Even though there are plenty of internet websites that accomplish this, but many are often false as well as outdated. For that reason, take care too essential with your number of the website. FLYDUMPS Cisco 642-384 exam sample questions test out generator data, questions, the actual test out responses along with other products to offer you an in depth in addition to rational stories Cisco 642-384 test desired goals, giving an absolute test out conditions, these Cisco 642-384 study materials provide this particular expertise on your the genuine Cisco 642-384 exam sample questions test out features in the solutions examiner.

QUESTION 139
You connect via Telnet to a Cisco access point and enter the command show dot11 link test. Which output might you obtain?
A. signal-to-noise ratio
B. incoming and outgoing signal strength
C. TX packets dropped
D. RX packets per second

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 140
Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the sitE.to-site VPN between Router A and Router B.
What is the mostly likely cause of this fault?

A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150-199). ”
B. The IKE encryption methods on the two routers are different
C. the IPSec policy map names on the two routers are different.
D. the IPSec rules on the two routers are not permitting the Answer: interesting traffic.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 141
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.

How many active VPN clients are currently connected to the 1841 ISR router?
A. 0
B. 1
C. 2
D. 3
E. 4
F. 5

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 142
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the
tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.

Which IP address or address range will be used when allocating an internal IP address to the VPN clients for the “test” VPN group?________________________________________________________________________
A. 10.1.1.100 to 10.1.1.200 I
B. 10.1-1.2 to 10.1.1.254
C. 192.168.1.1 to 192.168.1.100
D. 192.168.1.2 to 192.168.1.254
E. 192.168.1.1
F. 192.168.1.2

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 143
This item consists of one or more multiple choice type questions that you must answer. To answer these questions, you need to use a GUI tool that becomes fully accessible by the use of the labs you see below these directions. The tabs have up and down arrows to signal the direction that the tabbed window may be dragged lo expose or hide the GUI tool. When you are done using the GUI tool, you may drag the tab down to continue answering questions. To advance to the next question in the series, click on the numbered button to the left of each question. Make sure that you have answered all the questions before continuing to the next item.

Which authentication method is used by the test” VPN group?
A. RSA Encrypted Nounce
B. RSA Digital Signature
C. PrE.Shared Key
D. Digital Certificate
E. DH2

Correct Answer: C Section: (none) Explanation Explanation/Reference:
QUESTION 144
You are the network consultant. You have a customer with a small network of 15 remote sites is trying to optimize its VPN by migrating some remote sites using Frame Relay connections to the Internet to using cable connections to the Internet. The keypoint for your customer is to save money. Only a moderate amount of IP traffic is passing through the network, most of which is from the remote sites to the central site. IPSec should be used to provide VPN functionality and basic confidentiality is desired..Considering the above requirements. Which solution would be the easiest for this customer to set up and manage?
A. point-to-point
B. partial mesh
C. point-to-multipoint
D. hub-and-spoke

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 145
In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

A. The WCS sends excessive traffic to the rogue thus overloading the access point.
B. The rogue MAC address is used to spoof broadcastdeassociation packets.
C. The rogue MAC address is used to spoof broadcastdeauthentication packets.
D. The WCS sends out excessive signals on the same channel when the rogue is detected.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 146
With industry-leading services and performance, the Cisco Catalyst 6500 Series Switch is Cisco’s flagship switching solution. It delivers the most comprehensive feature sets for core, distribution, wiring closet, data center, enterprise WAN routing, and Metro-Ethernet deployments. Which layer you think is recommended that the Cisco Catalyst 6500 Series WLSM be placed?
A. core
B. distribution
C. access
D. presentation

Correct Answer: B Section: (none) Explanation
Explanation/Reference: QUESTION 147
The Cisco Lifecycle Services approach defines the activities needed to help you successfully deploy and operate Cisco technologies and optimize their performance throughout the lifecycle of your network. Which statement is an accurate list of Cisco Lifecycle Services phases?
A. initiation, prepare, plan, design, implement, operate, and optimize
B. site assessment, risk assessment, solution selection and acquisition, testing, and operations
C. prepare, plan, design, implement, operate, and optimize
D. deployment, testing, implementation, and production

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 148
Which IP address or address range will be used when allocating an internal ip address to the VPN client for the test
A. 120.1.1.100 to 10.1.1.200
B. 10.1.1.2 to 10.1.1.254
C. 192.1681.1 to 192.1681.1.100
D. 192.1681.2 to 192.1681.1.254

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 149
Which authentication method is used by the test VPN group?

A. RSA EncryptedNounce
B. RSA Digital Signature
C. Pre-shared key
D. DH2

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 150

A network administrator is troubleshooting an EIGRP connection between RA and RB. Given the debug output on RA, which two statements are true?(Choose two)
A. RA received a hello packet with mismatched hello timers.
B. RA received a hello packet with mismatched metric-calculation mechanisms.
C. RA will form an adjacency with RB.
D. RAwill not form an adjacency with RB.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 151
You are the network administrator. There is one Gigabit Ethernet port on the Cisco CE520 used in the Smart Business Communications System. Which port role assignment would you make for?
A. Cisco Express 520
B. Cisco UC520
C. Cisco CE520
D. Cisco 871W
Correct Answer: B Section: (none) Explanation

Explanation/Reference:
QUESTION 152
Refer to the exhibit. CK-SA and CK-SC are running PVST+ STP, and CK-SB is running 802.1 Q STP. If the BPDU of the root in VLAN 1 is better than the BPDU of the root in VU\N 2, then there is no blocking port in the VLAN 2 topology. The BPDU of VU\N 2 never makes a “full circle” around the topology; it is replaced by the VLAN 1 BPDU on the CK-SB-CK-SC link, because CK-SB runs only one STP merged with VU\N 1 STP of PVST+. Thus, there is a forwarding loop.

What does PVST+ do to correct this?
A. CK-SA sends PVST+ BPDUs ofVLAU 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
B. CK-SB sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SA) towards CK-SC. CK-SC will put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
C. CK-SC sends PVST+BPDUsofVU\N 2 (to the SSTP address that is flooded by CK-SB) towards CK-SC. CK-SAwill put port CK-SC-CK-SB into a type-inconsistent state, which prevents the loop.
D. CK-SA sends PVST+ BPDUs of VU\N 1 (to the SSTP address that is flooded by CK-SB) towards CK-SB. CK-SA will put port CK-C-CK-B into a type-inconsistent state, which prevents the loop.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 153
A wireless autonomous 1200 access point running core feature set in root mode has its SSID set to Factory_floor and provides connection to a repeater access point with its SSID set to factory_floor, if the root-mode access point is using channel 11 which channel will the repeater
access point use?
A. channel 11
B. channel 1 or 6
C. anynonoverlapping channel
D. The root access point and the repeater will negotiate this setting

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 154
The VPN server uses a preshared key for remote device authentication
A. TRUE
B. FALSE

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 155
A customer with a large enterprise network wants to allow employees to work from home over the Internet. The customer anticipates a large amount of traffic, predominantly toward the central site. The customer also requires a VPN using strong user authentication and encryption to protect highly sensitive data. Which solution best meets this customer’s requirements?
A. remote-access VPN with software encryption
B. remote-access VPN with hardware encryption
C. site-to-site VPN with hub-and-spoke tunnels using 3DES and pre-shared secrets
D. site-to-site Cisco Easy VPN

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 156
The tables contain information from the Cisco Router and Security Device Manager configurations of RA and RB. Traffic between PC1 and PC2 is not successfully establishing the site-to-site VPN between -RA and -RB. What is the mostly likely cause of this fault?
A. RAis using a standard IP ACL (100-149) while RB is using a Turbo ACL(150-199).
B. The IPSec encryption methods used by each router do not match.
C. The D-H Group settings on the two routers are the same. ”
D. The IPSec rules on the two routers are not permitting the correct interesting traffic.
Correct Answer: B Section: (none) Explanation

Explanation/Reference:
QUESTION 157
You are the network consultant. When will you assess a customer’s current network infrastructure?
A. plan
B. design
C. operate
D. optimize

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 158
A client is experiencing lower throughput and more packet retransmits is one area of the wireless network. At these times, the client utility shows high signal strength but low signal quality. What may be causing this issue?
A. The client does not support Cisco Compatible Extensions version 2.
B. Diversity is not enabled in the access point.
C. The WDS is failing to register the client card in the WLSM.
D. The channel is set incorrectly in the access point or in the client configuration.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 159
Which statement is correct about the current address translation configurations on the security appliance?
A. Dynamic NAT is used to translate the 10.0.1.100 host on the inside interface to a global address of
192.168.1.1
B. Port AddressTranslation(PAT) is used to translate any host on the inside interface to the 192.168.1.100 global address.
C. Static NAT is used to translate the 172.16.1.2 host on thedmzl interface to a global address of
192.168.1.102
D. Dynamic NAT is used to translate any host ondmzl and dmz2 interfaces to a mapped address from the address from the address pool of 192.168.1.110 to 192.168.1.250 ”

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 160
VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible.
VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted to the trunking encapsulation protocol (802.1 q or ISL).You worry about the switched infrastructure in an integrated network is vulnerable to VLAN hopping attacks. Which two configuration can be used to mitigate VLAN hopping? (Choose two.)
A. switchporttrunk encapsulation
B. switchport mode trunk
C. switchport access vlan
D. switchport mode access

Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 161
CiscoWorks SNMS is a part of the CiscoWorks family of products for managing small to large networks. CiscoWorks SIMMS is a new Web-based network management solution for small to medium-sized businesses, with 40 or fewer Cisco internetworking devices such as switches, routers, hubs, and access servers. CiscoWorks SNMS can also monitor third-party IT assets such as servers, applications, services, and printers A Public Switched Telephone Network (PSTN) trunk is typically the voice interconnect between any business and the outside world. Which network management tool is designed to allow businesses to manage up to 40 devices?
A. CiscoWorks Unrestricted
B. CiscoWorks WAN Management
C. CiscoWorks LAN Management
D. CiscoWorks SNMS

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 162
Which statement is correct about the information in the Cisco Adaptive Security Device Manager General and License Information screen?

A. The security appliance supports active/active failover only.
B. The security appliance supports 3DES-AES only.
C. The managed device is a Cisco ASA 5540 Security Appliance with VPN premium license enabled.
D. The managed device is Cisco PIX515E Security Appliance.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 163
Which three are different types of STP inconsistencies in a Layer 2 network?(Choose three) A. MAC inconsistency
B. Root inconsistency
C. EtherChannel inconsistency
D. type inconsistency

Correct Answer: BCD Section: (none) Explanation
Explanation/Reference:
QUESTION 164
According to the error log, VLAN 1 is where the BPDU was received, and VLAN 2 is where the BPDU originated. When inconsistency is detected, what happens?
A. VLAN 1 is blocked, while VLAN 2 is forwarding
B. VLAN1 is blocked, while VLAN 2 is listening
C. Both VLANs are listening on the port from which this BPDU is send
D. Both VLANs are blocked on the port from which this BPDU is received

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 165
Which is the current configured default gateway IP address on the security appliance?
A. 172.16.10.1
B. 172.16.1.1
C. 192.168.1.2
D. 10.0.1.1

Correct Answer: C Section: (none) Explanation
Explanation/Reference:

QUESTION 166
Which statement is true about a Cisco Aironet 350 Series wireless client when its green LED appears to be off and its amber LED is blinking?
A. The client adapter is scanning for a network.
B. The client adapter is in ad hoc mode.
C. The client adapter is performing a self-test.
D. The client adapter is in power-save mode.

Correct Answer: D Section: (none) Explanation
Explanation/Reference: QUESTION 167
You are the Cisco Configuration Assistant. Your IT Manager tells you 802.11b telephone can receive an audio signal from an access point, but cannot send audio. What is the most likely reason?
A. The value of RSSI telephone is greater than 30.
B. The access point only receives 802.11g data rates.
C. The security settings in the telephone mismatch the access point.
D. The telephone transmit power is significantly lower than the t the access point

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Get yourself composed for Microsoft actual exam and upgrade your skills with Flydumps Cisco 642-384 practice test products. Once you have practiced through our assessment material, familiarity on Cisco 642-384 exam domains get a significant boost. Flydumps practice tests enable you to raise your performance level and assure the guaranteed success for Cisco 642-384 exam.

Welcome to download the newest Pass4itsure ITILFND dumps: https://www.pass4itsure.com/itilfnd.html

http://www.i-tec.org/avaya-3101-testing-new-updated-avaya-3101-study-material-up-to-50-off/

CheckPoint 156-210 Exam, Sale Discount CheckPoint 156-210 Dump OnlineCheckPoint 156-210 Exam, Sale Discount CheckPoint 156-210 Dump Online

Welcome to download the newest Dumpsoon 1Z0-060 dumps:

Don’t leave your fate to boring books, you should sooner trust FLYDUMPS CheckPoint 156-210 exam sample questions. If you prefer the course on FLYDUMPS CheckPoint 156-210 exam sample questions, then you will need to attend their class and their classroom sessions are quite expensive. FLYDUMPS CheckPoint 156-210 pdf could be the passport for your career life since it covers everything needed to pass CheckPoint 156-210 exam. CheckPoint 156-210 Testing Engine are composed by current and active Information Technology experts, who use their experience in preparing you for your future CheckPoint 156-210 exam sample questions available at FLYDUMPS will save you money, and get you started on the right road to making more with your new found skills.

QUESTION 177
When you disable a rule the rule is NOT disabled until you verify your Security Policy.
A. True
B. False

Correct Answer: B
QUESTION 178
Static Source NAT translates public internal source IP addresses to private external source IP addresses.
A. True
B. False.

Correct Answer: B
QUESTION 179
What is the command that lists the interfaces to which VPN-1/FireWall-1 bound?
A. Fw ct1 iflist
B. Ifconfig -a
C. Ifconfig \all
D. Netstat -m
E. Cp bind -all

Correct Answer: A
QUESTION 180
Your customer has created a rule so that every time a user wants to go to Internet, that user must be authenticated. Which if the following is the best authentication method for roaming users, such as doctors updating patient records at various floor stations in a hospital?
A. Session
B. User
C. Client
D. Connection
E. None of the above.

Correct Answer: B QUESTION 181
Which command utility allows verification of the Security Policy installed on a firewall module?
A. Fw ct1 pstat.
B. Fw printlic.
C. Fw stat.
D. Fw ver.
E. Fw pol.

Correct Answer: C QUESTION 182
You are a firewall administrator with one Management Server managing 3 different Enforcement Modules. One of the Enforcement Modules does NOT show up in the dialog box when attempting to install a Security Policy. Which of the following is the most likely cause?
A. No master file was created.
B. License for multiple firewalls has expired.
C. The firewall has NOT been rebooted.
D. The firewall was NOT listed in the Install On column of the rule.
E. The firewall is listed as “Managed by another Management Module (external)” in the Workstation Properties dialog box.

Correct Answer: E QUESTION 183
In the Install On column of a rule, when you select a specific firewall object as the only configuration object, that rule is enforced on all firewalls with in the network, with related configurations.
A. True
B. False.

Correct Answer: B QUESTION 184
As an administrator, you want to force your users to authenticate. You have selected Client Authentication as your authentication scheme. Users will be using a Web browser to authenticate. On which TCP port will authentication be performed?
A. 23
B. 80
C. 259
D. 261
E. 900

Correct Answer: E QUESTION 185
Once installed the VPN-1/FireWall-1 NG resides directly below what layer of the TCP/IP stack?

A. Data
B. Transport
C. Physical
D. Application
E. Network

Correct Answer: E QUESTION 186
Client Authentication rules should be placed above the Stealth rule, so users can authenticate to the firewall.
A. True
B. False

Correct Answer: A QUESTION 187
The following rule base tells you any automatically created NAT rules have simply hidden but have not been deleted from the Rule Base.
A. True
B. False

Correct Answer: B QUESTION 188
You are using static Destination NAT. You have VPN-1/FireWall-1 NG running on Windows NT/Solaris platform. By default, routing occurs after the address translation when the packet is passing form the client towards the server.
A. True
B. False

Correct Answer: B QUESTION 189
Which if the following statements are FALSE?
A. Dynamic NAT cannot be used for protocols where the port number cannot be changed.
B. Dynamic NAT cannot be used when an external server must distinguish between clients bases on their IP addresses.
C. With Dynamic NAT, packet’s source port numbers are modified.
D. In Dynamic NAT, public internal addresses are hidden behind a single private external address using dynamically assigned port numbers to distinguish between them.
E. Dynamically assigned post numbers are used to distinguish between hidden private addresses.

Correct Answer: D QUESTION 190
When you modify a User Template, any users already operating under that template will be updates to the new template properties.
A. True
B. False

Correct Answer: B QUESTION 191
Installation time for creating network objects will decrease if you list machine names and IP addresses in the hosts files.
A. True
B. False

Correct Answer: A QUESTION 192
Consider the following network: No Original Packet Translated Packet Source Destination Service Source Destination Service The administrator wants to take all the local and DMZ hosts behind the gateway except the HTTP server
192.9.200.9. The http server will be providing public services and must be accessible from Internet. Select the best NAT solution below that meets these requirements.
A. Use automatic NAT that creates a static NAT to the HTTP server.
B. To hide the private addresses set the address translation for Private Net.
C. To hide the private address set the address translation for 192.9.200.0.
D. Use automatic NAT rule creation to hide NAT Local net and private Net.
E. Both A and D.

Correct Answer: E QUESTION 193
What NAT made is necessary if you want to start and HTTP session on a Reserved or Illegal IP address?
A. Static Source.
B. Static destination.
C. Dynamic
D. None of the above.

Correct Answer: B
QUESTION 194
With SecureUpdate you are able to: (Select all that apply)
A. Change Central Licenses to Local Licenses
B. Track current installed versions of Check Point and OPSEC products
C. Update Check Point and OPSEC software remotely from a central location
D. Centrally manage Licenses
E. Perform a new installation of VPN-1/FW-1 remotely

Correct Answer: BCD
QUESTION 195
Which is false about SIC communications?
A. A.VPN Certificates, such as those for IKE are used for secure communications
B. B.The Policy Editior initiates an SSL based connection with the Management Server
C. The Policy Editor must be defined as being authorised to use the Management Server
D. The Management Server verifies that the Clients IP address belongs to an authorised Policy Editor Client

Correct Answer: A

Looking to become a certified Adobe professional? Would you like to reduce or minimize your CheckPoint 156-210 certification cost? Do you want to pass all of the Microsoft certification? If you answered YES, then look no further. Flydumps.com offers you the best CheckPoint 156-210 exam certification test questions which cover all core topics and certification requirements.

Welcome to download the newest Dumpsoon 1Z0-060 dumps: http://www.dumpsoon.com/1Z0-060.html

http://www.i-tec.org/aruba-accp-v6-practise-questions-the-most-effective-aruba-accp-v6-actual-test-on-our-store/