Download Free VCE Files: CCNA, A+ Certification, MCSE – Cert4sure CCNP,Cisco Cisco 642-812 New Questions, Most Important Cisco 642-812 PDF With Accurate Answers

Cisco 642-812 New Questions, Most Important Cisco 642-812 PDF With Accurate Answers

The 100% valid latest Cisco 642-812 question answers ensure you 100% pass! And now we are offering the free Cisco 642-812 new version along with the VCE format Cisco 642-812 practice test. Free download more new Cisco 642-812 PDF and VCE on Flydumps.com.

QUESTION 73
With Cisco Express Forwarding, prefixes that require exception processing can be cached with one of
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
which four special adjacencies. (Choose four.)
A. forward
B. null
C. glean
D. kick
E. discard
F. drop

Correct Answer: BCEF Section: (none) Explanation
Explanation/Reference: QUESTION 74
Refer to the exhibit. Why are users from VLAN 100 unable to ping users on VLAN 200?

A. Encapsulation on the switch is wrong.
B. Trunking needs to be enabled on Fa0/1.
C. The native VLAN is wrong.
D. VLAN 1 needs the no shutdown command.
E. IP routing needs to be enabled on the switch.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 75
Refer to the exhibit. What problem is preventing users on VLAN 100 from pinging addresses on VLAN
200?

A. No default route on DLS1.
B. Encapsulation mismatch between switches.
C. Native VLAN mismatch.
D. Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.
E. Trunking needs to be enabled.
F. The ip routing command is missing on DLS1.

Correct Answer: F Section: (none) Explanation
Explanation/Reference:
QUESTION 76
An attacking device has gained unauthorized access to data on a different VLAN through the use of
double tagging. What is the name of this network attack?
A. switch spoofing TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
B. IP spoofing
C. VLAN hopping
D. VLAN jumping
E. DHCP spoofing
F. MAC flooding

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 77
Which three characteristics are true about voice traffic in the campus network? (Choose three.)
A. bursty
B. greedy
C. drop sensitive
D. delay sensitive
E. UDP priority
F. TCP retransmits

Correct Answer: CDE Section: (none) Explanation
Explanation/Reference:
QUESTION 78
Which three characteristics are true about voice traffic in the campus network? (Choose three.)
A. TCP retransmits
B. benign
C. greedy
D. drop sensitive
E. smooth
F. delay insensitive

Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
QUESTION 79
Which two statements are true about voice VLANs? (Choose two.)
A. Voice VLANs allow IP phones to be moved around without worrying about subnets.
B. Voice VLANs allow voice and data packets to be logically combined.
C. Implementing voice VLANs causes network administrators to change their existing IP topology.
D. Using voice VLANs makes it easier for network administrators to identify and troubleshoot network TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside problems.
E. Voice VLANs are available on all Cisco switches.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 80
Which two statements are true about trust boundaries? (Choose two.)
A. Classifying and marking traffic should be done as close to the traffic source as possible.
B. Classifying and marking traffic should be done at the distribution layer.
C. Traffic is classified and marked as it travels through the network.
D. If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E. The trust boundary moves depending on the type of traffic entering the network.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 81
In the event that two devices need access to a common server, but they cannot communicate with each
other, which security feature should be configured to mitigate attacks between these devices?
A. port security
B. dynamic ARP inspection
C. DHCP snooping
D. private VLANs
E. BPDU guard

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 82
A hacker is interested in seeing traffic from all switch ports on the switch that he is connected to,
including the ports belonging to other VLANs. What type of attack is he likely to implement?
A. MAC address flooding
B. ARP attack
C. spoofing attack
D. DHCP attack
E. VLAN hopping

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 83
Which statement best summarizes how DHCP snooping works?
A. DHCP snooping validates the header information of all DHCP replies and only allows the reply through if it has a matching request in the DSRT.
B. DHCP snooping validates all DHCP responses from all switch ports and only allows packets through if the destination port sent a DHCP request in the last 5 seconds.
C. DHCP snooping validates all DHCP responses from all switch ports and only allows packets through if the destination port specifically sent a DHCP request.
D. DHCP snooping determines which switch ports are trusted and can source all DHCP messages.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 84
Which three statements are true about DAI? (Choose three.)
A. DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
B. DAI forwards all ARP packets received on a trusted interface without any checks.
C. DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
D. DAI forwards all ARP packets received on a trusted interface after verifying and inspecting the packet against the DAI table.
E. DAI intercepts all ARP packets on untrusted ports.
F. DAI is used to prevent against a DHCP Snooping attack.

Correct Answer: ABE Section: (none) Explanation
Explanation/Reference:
QUESTION 85
What does the auto qos voip cisco-phone command do?
A. If a Cisco IP phone is attached, the switch trusts the CoS.
B. The switch assigns a CoS value of 5 to incoming packets.
C. It turns on STP to see if a Cisco IP phone is attached.
D. If a Cisco IP phone is attached and removed, the switch continues to trust the CoS values as long as the switch is not rebooted.
E. It disables the trust boundary feature because the switch knows a Cisco IP phone is attached. TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside

Correct Answer: A Section: (none) Explanation
Explanation/Reference: QUESTION 86
A network administrator would like to configure 802.1x port-based authentication, however, the client workstation is not 802.1x compliant. What is the only supported authentication server that can be used?
A. TACACS with LEAP extensions
B. TACACS+
C. RADIUS with EAP extensions
D. LDAP

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 87
A switch has been configured with PVLANs. With what type of PVLAN port should the default gateway be configured?
A. Isolated
B. Promiscuous
C. Community
D. Primary
E. Trunk

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 88
Workstations on a segment with HSRP running should have their IP default gateway configured for which device?
A. standby router
B. virtual router
C. router physically connected to the network segment
D. router closest to the network segment
E. backup router

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 89
Refer to the exhibit. The lightweight wireless architecture splits the processing of the 802.11 data and management protocols and the access point functionality between the access point and the WLAN
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
controller using split MAC approach. Which three functionalities are handled by the WLAN controller?
(Choose three.)

A. the transmission of beacon frames
B. the portions of the protocol that have real-time requirements
C. the response to Probe Request frames from clients
D. 802.11 authentication
E. 802.11 association and re-association (mobility)
F. 802.11 frame translation and bridging

Correct Answer: DEF Section: (none) Explanation
Explanation/Reference:
QUESTION 90
What is the function of the Service Set Identifier (SSID) in the wireless LAN?
A. The SSID should be configured on the client site only and provides data-privacy functions and authentication to the access point.
B. The SSID must match on both the client and the access point. The SSID is advertised in plain-text in the access point beacon messages.
C. The SSID must match on both the client and the access point and provides encryption keys for authentication to the access point.
D. The SSID must match on both the client and the access point and provides MAC Address Authentication to authenticate the client to the access point.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 91
Refer to the exhibit. Three different wireless groups of users are allowed to gain access to the wireless
LAN. What type of security policy should be enforced for the users in the Guest group?
TestInside Help You Pass Any IT Exam http://www.TestInside.com
Testinside

A. static WEP and MAC authentication
B. LEAP authentication
C. primary SSID with open or no WEP authentication
D. open authentication with WEP plus MAC authentication

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 92
Refer to the exhibit. Which statement is true about the repeater access point that is deployed in this wireless network?

A. The repeater access point should use a different SSID than the SSID configured on the parent access point.
B. The repeater access point should use a different WEP encryption method than the WEP encryption that is enabled on the parent access point.
C. The repeater access point reduces the throughput in half because it receives and then re-transmits each packet on the same channel.
D. The repeater access point requires a 10 percent channel overlap with channel of the root access point.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 93
What are two differences between the Autonomous WLAN solution and the Lightweight WLAN solution?
(Choose two.)
A. TACACS+ can only be used for authentication with the Cisco Lightweight WLAN solution.
B. CiscoWorks Wireless LAN Solution Engine can be used for management with the Autonomous WLAN Solution.
C. CiscoWorks Wireless LAN Solution Engine can be used for management with the Lightweight WLAN Solution.
D. Cisco Wireless LAN Controller is used to configure the access points in the Lightweight WLAN solution.
E. Cisco Wireless LAN Controller is used to configure the access points in the Autonomous WLAN solution.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 94
Which statement is true about the data traffic between the access point and controller?
A. The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
B. The data traffic is encrypted with AES.
C. The data traffic between the access point and controller is encrypted.
D. The data traffic is encapsulated with LWAPP.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 95
How are VRRP messages exchanged between routers sharing a common LAN segment?
A. VRRP relies on TCP to open a connection and to maintain that connection using TCP keepalives.
B. Unicast IP addresses with UDP port ID 112.
C. Destination IP address 224.0.0.18 with IP Protocol ID 112.
D. VRRP messages are directly encapsulated into the Ethernet data field using type code 0x112.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 96
Refer to the exhibit. Based on the minimal VRRP configuration, which VRRP command issued on RTA
will ensure that RTA is the master virtual router?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside

A. vrrp 100 priority 0
B. vrrp 100 priority 1
C. vrrp 100 priority 100
D. vrrp 100 priority 254
E. vrrp 100 preempt
F. no vrrp 100 preempt

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 97
Refer to the exhibit. What does the output of the debug command indicate on VRRP router RTA?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside

A. VRRP is not active on RTA.
B. RTB does not have VRRP active.
C. RTA does not have VRRP preempt active.
D. RTB has a different IP address coded for VRRP group 1 than RTA.
E. RTB has the same IP address coded on its Ethernet interface as RTA.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 98
Which method enables GLBP to forward traffic from a LAN segment via multiple routers
simultaneously?
A. Clients need to have different default gateway IP addresses coded.
B. Separate GLBP groups are coded on the routers.
C. The AVG assigns different virtual MAC addresses.
D. Multiple AVG designated routers respond to ARP requests.
E. Proxy ARP allows multiple routers to respond to ARP requests from clients.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 99
How are GLBP messages exchanged between routers that share a common LAN segment?
A. GLBP messages are multicast to UDP port ID 3222.
B. GLBP messages are directly encapsulated into the Ethernet data field using type code 3222.
C. GLBP relies on TCP to open a connection and to maintain that connection using TCP keepalives.
D. Routers inform clients with GLBP messages and use ARP messages to exchange information about first-hop redundancy.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 100
Which method used by GLBP allows the AVG to prefer one GLBP router as the AVF over other GLBP routers until its tracked interface goes down, when another router might be more preferred?
A. no glbp group load-balancing
B. glbp group load-balancing host-dependent
C. glbp group load-balancing round-robin
D. glbp group load-balancing weighted

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 101
Refer to the exhibit. If VLAN 21 does not exist before typing the commands, what is the result of the configuration applied on switch SW1?

A. A new VLAN 21 is created and port 0/8 is assigned to that VLAN.
B. A new VLAN 21 is created, but no ports are assigned to that VLAN.
C. No VLAN 21 is created and no ports are assigned to that VLAN.
D. Configuration command vlan database should be used first to create the VLAN 21.

Correct Answer: A Section: (none) Explanation
Explanation/Reference: QUESTION 102
Refer to the exhibit. The link between switch SW1 and switch SW2 is configured as a trunk, but the trunk failed to establish connectivity between the switches. Based on the configurations and the error TestInside Help You Pass Any IT Exam
http://www.TestInside.com Testinside messages received on the console of SW1, what is the cause of the problem?

A. The two ends of the trunk have different duplex settings.
B. The two ends of the trunk have different EtherChannel configuration.
C. The two ends of the trunk have different native VLAN configuration.
D. The two ends of the trunk allow different VLANs on the trunk.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 103
What action should a network administrator take to enable VTP pruning on an entire management
domain?
A. enable VTP pruning on any client switch in the domain
B. enable VTP pruning on every switch in the domain
C. enable VTP pruning on any switch in the management domain
D. enable VTP pruning on a VTP server in the management domain

Correct Answer: D Section: (none) Explanation Explanation/Reference:
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside
QUESTION 104
Which process plays a major role in the creation of the CEF adjacency table?
A. Address Resolution Protocol (ARP)
B. PDU header rewrite
C. NetFlow switching
D. hello packet exchange

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 105
How does VTP pruning enhance network bandwidth?
A. by restricting unicast traffic to across VTP domains
B. by reducing unnecessary flooding of traffic to inactive VLANs
C. by limiting the spreading of VLAN information
D. by disabling periodic VTP updates

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 106
The network operations center has received a call stating that users in VLAN 107 are unable to access
resources through Router 1. From the information contained in the graphic, what is the cause of this
problem?
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside

A. VLAN 107 does not exist on switch A.
B. VTP is pruning VLAN 107
C. VLAN 107 is not configured on the trunk
D. spanning tree is not enabled on VLAN 107

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 107
Which two table types are CEF components?(Choose two.)
A. forwarding information base
B. adjacency tables
C. neighbor tables TestInside Help You Pass Any IT Exam http://www.TestInside.com
Testinside
D. caching tables
E. route tables

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 108
Which Cisco IOS command assigns a Catalyst switch port to VLAN 10?
A. switchport mode vlan 10
B. switchport trunk native 10
C. switchport access vlan 10
D. switchport mode access vlan 10

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 109
Which statement is true regarding the configuration of ISL trunks?
A. All Catalyst switches support ISL trunking.
B. A Catalyst switch will report giants if one side is configured for ISL while the other side is not.
C. ISL trunking requires that native VLANs match.
D. A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 110
Which three statements are true regarding the above diagram? (Choose three.)
TestInside Help You Pass Any IT Exam http://www.TestInside.com Testinside

A. A trunk link will be formed.
B. Only VLANs 1-1001 will travel across the trunk link.
C. The native VLAN for Switch B is vlan 1.
D. DTP is not running on Switch A.
E. DTP packets are sent from Switch B.

Correct Answer: ACE Section: (none) Explanation
Explanation/Reference:

Cisco 642-812 Questions and Answers Products basically comprise of the simulated Cisco 642-812 exam questions AND their most correct answers,accompanied with a methodical elucidation of the Cisco 642-812 answers and the probable wrong answers.The extent to which Cisco 642-812 Questions and Answers Products cover their Cisco subject is so thorough,that once you are done with a Cisco product,passing the Cisco 642-812 exam in first attempt should be a piece of cake.