Cisco 642-873 Demos, Latest Release Cisco 642-873 Test Software Are Based On The Real Exam

Most accurate The Cisco 642-873 Questions & Answers covers all the knowledge points of the real exam. We update our product frequently so our customer can always have the latest version of Cisco 642-873.We provide our customers with the excellent 7×24 hours customer service.We have the most professional Cisco 642-873 expert team to back up our grate quality products.If you still cannot make your decision on purchasing our product, please try our Cisco 642-873 free pdf practice test for you to free download.Cisco 642-873 is also an authenticated IT certifications site that offer all the new questions and answers timely.Visit the site Flydumps.com to get free Cisco 642-873 VCE test engine and PDF.

Exam A
QUESTION 1
DRAG DROP You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, in Cisco client security software applications. Match the applications with the descriptions.

A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference: QUESTION 2

Which two statements about Layer 3 access designs are correct? (Choose two.)
A. Broadcast and fault domains are increased
B. Limits on clustering and NIC teaming are removed
C. Convergence time is fractionally slower than STP
D. IP Address space is difficult to manage
E. Fast uplink convergence is supported for failover and fallback
Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
QUESTION 3
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation? (Choose two.)
A. Destination IP Address
B. Output Interface
C. Source MAC address
D. Next-hop IP Address
E. Source Port
F. Next-hop MAC Address
Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 4
Which of these is true of IP addressing with regard to VPN termination?
A. Termination devices need routable addresses inside the VPN
B. Designs should not include overlapping address spaces between sites, since NAT is not supported
C. IGP routing protocols will update their routing tables over an IPSec VPN
D. Addressing designs need to allow for summarization
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 5
When is a first-hop redundancy protocol needed in the distribution layer?
A. When preempt tuning of the default gateway is needed
B. When the design implements Layer 2 between the access switch and the distribution switch
C. When HSRP is not supported by the design
D. When a robust method of backing up the default gateway is needed
E. When multiple vendor devices need to be supported
F. When the design implements Layer 3 between the access switch and the distribution switch
Correct Answer: F Section: (none) Explanation
Explanation/Reference:
QUESTION 6
Which of these practices should you follow when designing a Layer 3 routing protocol?
A. Never peer on transit links
B. Build squares for deterministic convergence
C. Build inverted U designs for deterministic convergence
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 7
Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements? (Choose two.)
A. Call signaling must have guaranteed bandwidth service
B. Strict-priority queuing should be limited to 50% of the capacity of the link
C. At least 23 percent of the link bandwidth should be reserved for default best-effort class
D. Voice needs to be assigned to the hardware priority queue
E. Voice needs to be assigned to the software priority queue
Correct Answer: AD Section: (none) Explanation
Explanation/Reference: QUESTION 8
Which statement about IDS/IPS design is correct?
A. An IPS should be deployed if the security policy does not support the denial of traffic
B. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow
C. An IDS analyze a copy of the monitored traffic and not the actual forwarded packet
D. Traffic impact considerations are increased when deploying an IDS over an IPS sensor
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 9
In which two locations in an enterprise network can an IPS sensor be placed? (Choose two.)
A. Between two layer devices without trunking
B. Between two Layer 2 devices with trunking
C. Between a Layer 2 device and a Layer 3 device with trunking
D. Bridging two VLANs on one switch
E. Bridging VLANs on two switches
Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 10
DRAG DROP You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, in Cisco NAC appliance components. Match the applications with the appropriate descriptions.

A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:

QUESTION 11
Which two statements are correct regarding Flex links? (Choose two.)
A. Flex links operate only over single pairs of links
B. Flex Links automatically disable STP so no BPDUs are propagated
C. Failover from active to standby on Flex Links takes less than a second
D. Flex Link pairs must be of the same interface type
E. An interface can belong to multiple Flex links
Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 12
One of your customers is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?
A. 8
B. 14
C. 23
D. 7
E. 19
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 13
What is the purpose of IGMP in a multicast implementation?
A. It determines whether Bidirectional PIM or PIM sparse mode will be used for a multicast flow
B. It is used on WAN connections to determine the maximum bandwidth of a connection
C. It dynamically registers individual hosts in a multicast group on a specific LAN
D. It is not used in multicast
E. It determines the virtual address group for a multicast destination
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 14
What is meant by the term “firewall sandwich”?
A. Firewall connections in either an active or standby state
B. A method of operating firewalls from multiple vendors
C. Multiple layers of firewalling
D. An architecture in which all traffic between firewalls goes through application-specific servers
E. An Architecture in which all traffic between firewalls goes through application-specific gateway
Correct Answer: C Section: (none) Explanation Explanation/Reference:
QUESTION 15
Which of these statements is true of clientless end-user devices?
A. They do not receive unique IP Addresses
B. RADIUS or LDAP is required in order to assign IP Addresses
C. Their traffic appears to originate from the originating host network
D. They are assigned addresses from the internal DHCP pool
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 16
How does ERS use the VLAN tag?
A. As a mapping to the DLCI in service internetworking
B. To support transparency for Layer 2 frames
C. As a connection identifier to indicate destination
D. To provide service internetworking
E. To provide a trunk by which all VLANs can navigate from one site to one or multiple sites
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 17
Which of these terms refers to call issues that cause variations in timing or time of arrival?
A. Digitized sampling
B. Queuing
C. Packet Loss
D. Jitter
E. Signal-to-noise ratio ratio
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 18
What two descriptions best define DWDM? (Choose two.)
A. A technology for transmitting multiple optical signals using less sophisticated transceiver designs then CWDM
B. A WDM system that is compatible with EDFA technology
C. An optical technology for transmitting up to 32 channels over multiple fiber strands D. An optical technology for transmitting up to 16 channels over multiple fiber strands
E. A technology for transmitting more closely packed optical signals using more sophisticated transceiver designs than CWDM
Correct Answer: BE Section: (none) Explanation
Explanation/Reference:
QUESTION 19
Which two design concerns must be addressed when designing a multicast implementation? (Choose two.)
A. The 0x01004f MAC address prefix is used for mapping IP Addresses to MAC addresses
B. Only the low-order 24 bits of the MAC address are used to map IP Addresses
C. Only the low-order 23 bits of the IP Address are used to map MAC addresses
D. Only the high-order 23 bits of the MAC address are used to map IP Addresses
E. The 0x01005e MAC address prefix is used for mapping IP Addresses to MAC addresses
F. Only the low-order 23 bits of the MAC address are used to map IP Addresses
Correct Answer: CE Section: (none) Explanation
Explanation/Reference:
QUESTION 20
Which two of these are characteristics of an IDS sensor? (Choose two.)
A. Has promiscuous interface that is used to monitor the network
B. Passively listens to network traffic
C. In an active device in the traffic path
D. Traffic arrives on one IDS interface and exits on another
E. Has a permissive interface that is used to monitor network
Correct Answer: AB Section: (none) Explanation
Explanation/Reference:

Cisco 642-873 tests containing questions that cover all sides of tested subjects that help our members to be prepared and keep high level of professionalism.The main purpose of Cisco 642-873 exam is to provide high quality test that can secure and verify knowledge, give overview of question types and complexity that can be represented on real exam certification