Pass4sure 640-864 Questions and Answers in PDF
With the high number of professionals vying for available jobs in the IT sector, one way of getting an edge over your competitors is to acquire a certification. Employers prefer Cisco certified professionals. So if you want an increase in job opportunities and would like to advance your career quickly then passing 640-864 test and getting certified is the best way to achieve this.
Cisco administrates the 640-864 test. With this exam, all those who pass can then get certified. Adequate preparation before the Designing for Cisco Internetwork Solutions 640-864 test is therefore necessary and essential for success. Cisco recommends that candidates should start studying Designing for Cisco Internetwork Solutions 640-864 prep guide quite some time before in order to pass on the first try. With this in mind, IPass4sures has prepared Cisco 640-864 book download study material that cover all the outlined topics for the 640-864 test. You can therefore put your worries aside and use our 640-864 question and answers guide to pass easily.
Our Cisco 640-864 study material, 640-864 dumps and 640-864 practice exam for the Designing for Cisco Internetwork Solutions comes in PDF format and can easily be accessed with any PDF Reader on your computer, laptop or tablet. This makes it easier to study on any platform, anytime and anywhere conveniently. You can even print the file for an easier learning process.
For all your queries, IPass4sures offers live customer support chat. You can get any question answered promptly at any time of day throughout the week. Our customers mean a lot to us therefore we take their questions seriously.
With the high number of professionals vying for available jobs in the IT sector, one way of getting an edge over your competitors is to acquire a certification. Employers prefer Cisco certified professionals. So if you want an increase in job opportunities and would like to advance your career quickly then passing 640-864 test and getting certified is the best way to achieve this.
Cisco administrates the 640-864 test. With this exam, all those who pass can then get certified. Adequate preparation before the Designing for Cisco Internetwork Solutions 640-864 test is therefore necessary and essential for success. Cisco recommends that candidates should start studying Designing for Cisco Internetwork Solutions 640-864 prep guide quite some time before in order to pass on the first try. With this in mind, IPass4sures has prepared Cisco 640-864 book download study material that cover all the outlined topics for the 640-864 test. You can therefore put your worries aside and use our 640-864 question and answers guide to pass easily.
Even though there are many providers of Cisco 640-864 study material, we provide you with the best and most affordable materials on the market. You can rely on us to help you become a certified professional when you study with the 640-864 study material that are prepared by leading Cisco professionals who have been working at IPass4sures for a long time. These professionals are highly qualified and therefore know exactly what to expect from the 640-864 test candidates.
Our Cisco 640-864 study material, 640-864 dumps and 640-864 practice exam for the Designing for Cisco Internetwork Solutions comes in PDF format and can easily be accessed with any PDF Reader on your computer, laptop or tablet. This makes it easier to study on any platform, anytime and anywhere conveniently. You can even print the file for an easier learning process.
For all your queries, IPass4sures offers live customer support chat. You can get any question answered promptly at any time of day throughout the week. Our customers mean a lot to us therefore we take their questions seriously.
When you have decided to purchase our Designing for Cisco Internetwork Solutions 640-864 prep guide for your exam; you can pay with PayPal since it is one of the most secure methods of payment available. We are committed to safeguarding your privacy, so you can purchase any of our products without any hesitation.
To show how high the standards of our 640-864 study material are, we offer you to download free samples for Cisco 640-864 practice exam, 640-864 prep guide and 640-864 dumps to have a look at what we have to offer. If you are satisfied, then you can go ahead and purchase the full Cisco 640-864 questions and answers.
IPass4sures also offers you a 30 days 100% money back guarantee in case you found our 640-864 materials unsatisfactory and could not pass your exam after studying with our Cisco 640-864 questions and answers. We believe in customer satisfaction first and foremost that is why we have a refund policy in place for our customers.
Question: 1
Which consideration is the most important for the network designer when considering IP routing?
A. convergence
B. scalability
C. on-demand routing
D. redistribution
Answer: A
Explanation: Convergence is most important because with delayed convergence outage recovery will be delayed as well.
Question: 2
You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according to interface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements?
A. RMON
B. SNMFV3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
Explanation: NetFlow provides extremely granular and accurate traffic measurements and a high-level collection of aggregated traffic. The output of netflow information is displayed via the show ip cache flow command on routers. The Table shows a description of the fields for NetFlow output. Table. Netflow Output escription
Question: 3
DataQuirk is a web-based medical transcription company for exotic-animal veterinarians. The company recently added a third ISP for international business. They are organizing the enterprise network into a fully operational Enterprise Edge. To which two modules will the three ISPs be directly related? (Choose two)
A. PSTN
B. E- Commerce
C. WAN/MAN
D. Edge Distribution
E. Internet Connectivity
F. Remote Access VPN
Answer: B, E
Explanation: The purpose of ISP link is for serving customers & it is also providing internet connectivity to internal & external users, thus it falls into above 2 categories. Explanation: The Enterprise Edge Module consists of the following modules:
+ E-commerce modulE. includes the devices and services necessary for an organization to provide e-commerce applications.
+ Internet connectivity modulE. provides enterprise users with Internet access.
+ VPN and remote access modulE. terminates VPN traffic and dial-in connections from external users.
+ WAN/ MAN and site-to-site modulE. provides connectivity between remote sites and the central site over various WAN technologies. In these modules, only E-Commerce and Internet Connectivity modules will be directly related to the three ISPs.
Question: 4
Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two)
A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers.
B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
C. Use automatic VLAN pruning to prune unused VLANs from trunked interface to avoid broadcast propagation.
D. Avoid wasted processing by disabling STP where loops are not possible.
E. Use VTP transparent mode to decrease the potential for operational error
Answer: B, E
Explanation: When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design. Performance in the access layer is also important. Redundancy and QoS features should be considered. The following are recommended best practices for the building access layer:
Question: 5
With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an example of such a strength?
A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.
B. N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.
C. N+N+1 redundancy configuration has the least impact to system management because all of the controllers are collocated in an NOC or data center
D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the same subnet for more efficiency.
Answer: B
Explanation: With such an arrangement there is no complex mesh of access points & controllers.
N+N WLC Redundancy With N+N redundancy, shown in Figure 5-14. an equal number of controllers hack up each other. For example, a pair of WLCs on one floor serves as a backup to a second pair on another floor. The top WLC is primary for API and AP2 and secondary for AP3 and AP4. The bottom WLC is primary for AP3 and AP4 and secondary for API and AP2. There should be enough capacity on each controller to manage a failover situation.
N+N+1 WLC Redundancy With N+N+1 redundancy, shown in Figure 5-15, an equal number of controllers back up each other (as with N+N), plus a backup WLC is configured as the tertiary WLC for the APs. N+N+1 redundancy functions the same as N+N redundancy plus a tertiary controller that backs up the secondary controllers. The tertiary WLC is placed in the data center or network operations center
Question: 6
Which of these statements is true concerning the data center access layer design?
A. The access layer in the data center is typically built at Layer 3, which allows for better shaping of services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP address on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer.
Answer: B
Explanation: With Layer 2 / 3, capabilities in-built access layer switches can have data & voice VLANs with interfaces; this is helpful in improving routing convergence.
Question: 7
Which one of these statements should the designer keep in mind when considering the advanced routing features?
A. one-way router redistribution avoids the requirement for state or default routes.
B. Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.
C. Filtering only occurs on the routing domain boundary using redistribution.
D. Summarize routes at the core toward the distribution layer.
E. The hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation.
Answer: B
Explanation: Routing Protocols on the Hierarchical Network Infrastructure The selected routing protocol should be used based on the network design goals and the network module being used. As shown in Figure 11-23, high-speed routing is recommended for the network core and distribution layers. These routing protocols react fast to network changes. It is a best practice that the same routing protocol be used in the three layers (core, distribution, access) of the enterprise network. The enterprise edge connects the campus network with external connectivity including WAN, Internet, VPN. remote-access modules. Routing protocols in the enterprise edge may be EIGRP, OSPF, BGP, and static routes. Specifically in the Internet module you will find BGP/static routes. Table 11-9 shows a summary of the recommended routing protocols in the network infrastructure.
Question: 8
Which two statements about designing the Data Center Access layer are correct? (Choose two)
A. Multiport NIC servers should each have their own IP address
B. Layer 3 connectivity should never be used in the access layer
C. Layer 2 connectivity is primarily implemented in the access layer
D. Multiport NIC servers should never be used in the access layer
E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent
Answer: C, E
Explanation: User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2 Here is the Explanation: from the Cisco press CCDA certification guide Figure 4-8. Enterprise Data Center Infrastructure Overview
Defining the DC Access Layer The data center access layer’s main purpose is to provide Layer 2 and Layer 3 physical port density for various servers in the data center. In addition, data center access layer switches provide high-performance, low-latency switching and can support a mix of oversubscription requirements. Both Layer 2 and Layer 3 access (also called routed access) designs are available, but most data center access layers are built using Layer 2 connectivity. The Layer 2 access design uses VLAN trunks upstream, which allows data center aggregation services to be shared across the same VLAN and across multiple switches. Other advantages of Layer 2 access are support for NIC teaming and server clustering that requires network connections to be Layer 2 adjacent or on the same VLAN with one another. CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4
Question: 9
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?
A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable
Answer: C
Explanation: Anycast is a network addressing and routing methodology in which datagrams from a single sender are routed to the topologically nearest node in a group of potential receivers all identified by the same destination address. Link: http://en.wikipedia.org/wiki/Anycast
Question: 10
Which one of these statements is true about addressing redundancy within the WAN environment?
A. The reliability and speed of DSL allow for cost savings by not including redundant links.
B. CAMDM and dark fiber offer advanced redundancy features such as automatic backup and repair mechanism to cope system faults.
C. An SLA is one way to eliminate the need for redundancy.
D. The failure of a single SONET/SDH link or network element does not lead to failure of the entire network.
Answer: D
Explanation: Dual-Ring topologies are being used in WAN environment. Link: http://en.wikipedia.org/wiki/Ring_network
Question: 11
Refer to the exhibit.
Model A is the recommended design for routing between Building Distribution switches and Campus Core switches. Which two statements describe the reasons? (Choose two)
A. Model A uses timer-based non-deterministic convergence.
B. Mode A uses timer-based, providing fast convergence to the remaining path.
C. In Model A, a link or box failure does not require routing protocol convergence.
D. In Model A, the Layer 3 redundant equal cost links support fast convergence.
Answer: C, D
Explanation: Due to redundant links in place the routing protocols can select multiple equal cost paths and installs them as soon as one of the links goes down, such topology also can support load-balancing. Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html
Question: 12
Which one of these statements is true concerning the enterprise data center?
A. It can be located either at the enterprise campus or at a remote branch.
B. Remote data center connectivity requirements align with the small office design.
C. The data center designs will differ substantially depending on whether the location is on campus or remote.
D. A remote branch with a data center becomes the enterprise campus.
Answer: C
Explanation:
If data center is at enterprise campus there will be no need for installing high capacity WAN links, just an upgrade if existing WAN infrastructure can accommodate increased traffic demands. There are many more such considerations while designing data centers.
To show how high the standards of our 640-864 study material are, we offer you to download free samples for Cisco 640-864 practice exam, 640-864 prep guide and 640-864 dumps to have a look at what we have to offer. If you are satisfied, then you can go ahead and purchase the full Cisco 640-864 questions and answers.
IPass4sures also offers you a 30 days 100% money back guarantee in case you found our 640-864 materials unsatisfactory and could not pass your exam after studying with our Cisco 640-864 questions and answers. We believe in customer satisfaction first and foremost that is why we have a refund policy in place for our customers.
Question: 1
Which consideration is the most important for the network designer when considering IP routing?
A. convergence
B. scalability
C. on-demand routing
D. redistribution
Answer: A
Explanation: Convergence is most important because with delayed convergence outage recovery will be delayed as well.
Question: 2
You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according to interface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements?
A. RMON
B. SNMFV3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
Explanation: NetFlow provides extremely granular and accurate traffic measurements and a high-level collection of aggregated traffic. The output of netflow information is displayed via the show ip cache flow command on routers. The Table shows a description of the fields for NetFlow output. Table. Netflow Output escription
Question: 3
DataQuirk is a web-based medical transcription company for exotic-animal veterinarians. The company recently added a third ISP for international business. They are organizing the enterprise network into a fully operational Enterprise Edge. To which two modules will the three ISPs be directly related? (Choose two)
A. PSTN
B. E- Commerce
C. WAN/MAN
D. Edge Distribution
E. Internet Connectivity
F. Remote Access VPN
Answer: B, E
Explanation: The purpose of ISP link is for serving customers & it is also providing internet connectivity to internal & external users, thus it falls into above 2 categories. Explanation: The Enterprise Edge Module consists of the following modules:
+ E-commerce modulE. includes the devices and services necessary for an organization to provide e-commerce applications.
+ Internet connectivity modulE. provides enterprise users with Internet access.
+ VPN and remote access modulE. terminates VPN traffic and dial-in connections from external users.
+ WAN/ MAN and site-to-site modulE. provides connectivity between remote sites and the central site over various WAN technologies. In these modules, only E-Commerce and Internet Connectivity modules will be directly related to the three ISPs.
Question: 4
Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two)
A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers.
B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
C. Use automatic VLAN pruning to prune unused VLANs from trunked interface to avoid broadcast propagation.
D. Avoid wasted processing by disabling STP where loops are not possible.
E. Use VTP transparent mode to decrease the potential for operational error
Answer: B, E
Explanation: When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design. Performance in the access layer is also important. Redundancy and QoS features should be considered. The following are recommended best practices for the building access layer:
Question: 5
With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an example of such a strength?
A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.
B. N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.
C. N+N+1 redundancy configuration has the least impact to system management because all of the controllers are collocated in an NOC or data center
D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the same subnet for more efficiency.
Answer: B
Explanation: With such an arrangement there is no complex mesh of access points & controllers.
N+N WLC Redundancy With N+N redundancy, shown in Figure 5-14. an equal number of controllers hack up each other. For example, a pair of WLCs on one floor serves as a backup to a second pair on another floor. The top WLC is primary for API and AP2 and secondary for AP3 and AP4. The bottom WLC is primary for AP3 and AP4 and secondary for API and AP2. There should be enough capacity on each controller to manage a failover situation.
N+N+1 WLC Redundancy With N+N+1 redundancy, shown in Figure 5-15, an equal number of controllers back up each other (as with N+N), plus a backup WLC is configured as the tertiary WLC for the APs. N+N+1 redundancy functions the same as N+N redundancy plus a tertiary controller that backs up the secondary controllers. The tertiary WLC is placed in the data center or network operations center
Question: 6
Which of these statements is true concerning the data center access layer design?
A. The access layer in the data center is typically built at Layer 3, which allows for better shaping of services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP address on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer.
Answer: B
Explanation: With Layer 2 / 3, capabilities in-built access layer switches can have data & voice VLANs with interfaces; this is helpful in improving routing convergence.
Question: 7
Which one of these statements should the designer keep in mind when considering the advanced routing features?
A. one-way router redistribution avoids the requirement for state or default routes.
B. Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.
C. Filtering only occurs on the routing domain boundary using redistribution.
D. Summarize routes at the core toward the distribution layer.
E. The hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation.
Answer: B
Explanation: Routing Protocols on the Hierarchical Network Infrastructure The selected routing protocol should be used based on the network design goals and the network module being used. As shown in Figure 11-23, high-speed routing is recommended for the network core and distribution layers. These routing protocols react fast to network changes. It is a best practice that the same routing protocol be used in the three layers (core, distribution, access) of the enterprise network. The enterprise edge connects the campus network with external connectivity including WAN, Internet, VPN. remote-access modules. Routing protocols in the enterprise edge may be EIGRP, OSPF, BGP, and static routes. Specifically in the Internet module you will find BGP/static routes. Table 11-9 shows a summary of the recommended routing protocols in the network infrastructure.
Question: 8
Which two statements about designing the Data Center Access layer are correct? (Choose two)
A. Multiport NIC servers should each have their own IP address
B. Layer 3 connectivity should never be used in the access layer
C. Layer 2 connectivity is primarily implemented in the access layer
D. Multiport NIC servers should never be used in the access layer
E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent
Answer: C, E
Explanation: User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2 Here is the Explanation: from the Cisco press CCDA certification guide Figure 4-8. Enterprise Data Center Infrastructure Overview
Defining the DC Access Layer The data center access layer’s main purpose is to provide Layer 2 and Layer 3 physical port density for various servers in the data center. In addition, data center access layer switches provide high-performance, low-latency switching and can support a mix of oversubscription requirements. Both Layer 2 and Layer 3 access (also called routed access) designs are available, but most data center access layers are built using Layer 2 connectivity. The Layer 2 access design uses VLAN trunks upstream, which allows data center aggregation services to be shared across the same VLAN and across multiple switches. Other advantages of Layer 2 access are support for NIC teaming and server clustering that requires network connections to be Layer 2 adjacent or on the same VLAN with one another. CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4
Question: 9
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?
A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable
Answer: C
Explanation: Anycast is a network addressing and routing methodology in which datagrams from a single sender are routed to the topologically nearest node in a group of potential receivers all identified by the same destination address. Link: http://en.wikipedia.org/wiki/Anycast
Question: 10
Which one of these statements is true about addressing redundancy within the WAN environment?
A. The reliability and speed of DSL allow for cost savings by not including redundant links.
B. CAMDM and dark fiber offer advanced redundancy features such as automatic backup and repair mechanism to cope system faults.
C. An SLA is one way to eliminate the need for redundancy.
D. The failure of a single SONET/SDH link or network element does not lead to failure of the entire network.
Answer: D
Explanation: Dual-Ring topologies are being used in WAN environment. Link: http://en.wikipedia.org/wiki/Ring_network
Question: 11
Refer to the exhibit.
Model A is the recommended design for routing between Building Distribution switches and Campus Core switches. Which two statements describe the reasons? (Choose two)
A. Model A uses timer-based non-deterministic convergence.
B. Mode A uses timer-based, providing fast convergence to the remaining path.
C. In Model A, a link or box failure does not require routing protocol convergence.
D. In Model A, the Layer 3 redundant equal cost links support fast convergence.
Answer: C, D
Explanation: Due to redundant links in place the routing protocols can select multiple equal cost paths and installs them as soon as one of the links goes down, such topology also can support load-balancing. Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html
Question: 12
Which one of these statements is true concerning the enterprise data center?
A. It can be located either at the enterprise campus or at a remote branch.
B. Remote data center connectivity requirements align with the small office design.
C. The data center designs will differ substantially depending on whether the location is on campus or remote.
D. A remote branch with a data center becomes the enterprise campus.
Answer: C
Explanation:
If data center is at enterprise campus there will be no need for installing high capacity WAN links, just an upgrade if existing WAN infrastructure can accommodate increased traffic demands. There are many more such considerations while designing data centers.
No comments:
Post a Comment