Pass4itsure Cisco (CCNA, CCNP, Meraki Solutions Specialist, CCDP…) dumps updates throughout the year and share some exam questions for free to help you 100% pass the exam

Cisco 642-892 Cert Exam, 100% Pass Cisco 642-892 Doc Are The Best Materials

Are you struggling for the Cisco 642-892 exam? Good news,Flydumps IT technical experts have collected and certified 445 questions and answers which are updated to cover the knowledge points and enhance candidates’abilities.With Cisco 642-892 preparation tests you can pass the exam easily and go further on Cisco career path.

QUESTION 123
Which statement best summarizes how DHCP snooping works?
A. DHCP snooping validates the header information of all DHCP replies and only allows the reply through if it has a matching request in the DSRT.
B. DHCP snooping validates all DHCP responses from all switch ports and only allows packets through if the destination port sent a DHCP request in the last 5 seconds.
C. DHCP snooping validates all DHCP responses from all switch ports and only allows packets through if the destination port specifically sent a DHCP request.
D. DHCP snooping determines which switch ports are trusted and can source all DHCP messages.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 124
Refer to the exhibit. On the basis of the configuration provided, how are the Hello packets sent by R2 handled by R5 in OSPF area 5?

A. The Hello packets will be exchanged and adjacency will be established between routers R2 and R5.
B. The Hello packets will be exchanged but the routers R2 and R5 will become neighbors only.
C. The Hello packets will be dropped and no adjacency will be established between routers R2 and R5.
D. The Hello packets will be dropped but the routers R2 and R5 will become neighbors.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 125
A network administrator would like to configure 802.1x port-based authentication, however, the client workstation is not 802.1x compliant. What is the only supported authentication server that can be used?
A. TACACS with LEAP extensions
B. TACACS+
C. RADIUS with EAP extensions
D. LDAP

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-892
QUESTION 126
Which two statements are true about port security? (Choose two.)
A. With port security configured, four MAC addresses are allowed by default.
B. Port security cannot be configured for ports supporting VoIP.
C. With port security configured, only one MAC address is allowed by default.
D. The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.
E. Port security can be configured for ports supporting VoIP.

Correct Answer: CE Section: (none) Explanation
Explanation/Reference:
QUESTION 127
A switch has been configured with PVLANs. With what type of PVLAN port should the default gateway be configured?
A. Isolated
B. Promiscuous
C. Community
D. Primary
E. Trunk

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 128
Refer to the exhibit. The lightweight wireless architecture splits the processing of the 802.11 data and management protocols and the access point functionality between the access point and the WLAN controller using split MAC approach. Which three functionalities are handled by the WLAN controller? (Choose three.)

A. the transmission of beacon frames
B. the portions of the protocol that have real-time requirements
C. the response to Probe Request frames from clients
D. 802.11 authentication
E. 802.11 association and re-association (mobility)
F. 802.11 frame translation and bridging

Correct Answer: DEF Section: (none) Explanation Explanation/Reference:
QUESTION 129
What is the function of the Service Set Identifier (SSID) in the wireless LAN?
A. The SSID should be configured on the client site only and provides data-privacy functions and authentication to the access point.
B. The SSID must match on both the client and the access point. The SSID is advertised in plain-text in the access point beacon messages.
C. The SSID must match on both the client and the access point and provides encryption keys for authentication to the access point.
D. The SSID must match on both the client and the access point and provides MAC Address Authentication to authenticate the client to the access point.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 130
Refer to the exhibit. Which statement is true about the repeater access point that is deployed in this wireless network? PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-892

A. The repeater access point should use a different SSID than the SSID configured on the parent access point.
B. The repeater access point should use a different WEP encryption method than the WEP encryption that is enabled on the parent access point.
C. The repeater access point reduces the throughput in half because it receives and then re-transmits each packet on the same channel.
D. The repeater access point requires a 10 percent channel overlap with channel of the root access point.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 131
What are two differences between the Autonomous WLAN solution and the Lightweight WLAN solution? (Choose two.)
A. TACACS+ can only be used for authentication with the Cisco Lightweight WLAN solution.
B. CiscoWorks Wireless LAN Solution Engine can be used for management with the Autonomous WLAN Solution.
C. CiscoWorks Wireless LAN Solution Engine can be used for management with the Lightweight WLAN Solution.
D. Cisco Wireless LAN Controller is used to configure the access points in the Lightweight WLAN solution.
E. Cisco Wireless LAN Controller is used to configure the access points in the Autonomous WLAN solution.

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 132
Which statement is true about the data traffic between the access point and controller?
A. The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
B. The data traffic is encrypted with AES.
C. The data traffic between the access point and controller is encrypted.
D. The data traffic is encapsulated with LWAPP.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 133
Refer to the exhibit. If VLAN 21 does not exist before typing the commands, what is the result of the configuration applied on switch SW1?

A. A new VLAN 21 is created and port 0/8 is assigned to that VLAN.
B. A new VLAN 21 is created, but no ports are assigned to that VLAN.
C. No VLAN 21 is created and no ports are assigned to that VLAN.
D. Configuration command vlan database should be used first to create the VLAN 21.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-892
QUESTION 134
Refer to the exhibit. What happens when the switch SW2 is connected to the rest of the network in the VTP domain Lab_Network?

A. The recently introduced switch SW2 adds one more VLAN to the VLAN database in the VTP domain.
B. The recently introduced switch SW2 creates a STP loop in the VTP domain.
C. The recently introduced switch SW2 removes all configured VLANs throughout the VTP domain.
D. The recently introduced switch SW2 switches over to VTP transparent mode in order to be included into the VTP domain.
E. A trunk should be configured between the two switches in order to integrate SW2 into the VTP domain.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 135
Which routing protocol will continue to receive and process routing updates from neighbors after the passive- interface router configuration command is entered?
A. EIGRP
B. RIP
C. OSPF
D. IS-IS

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 136
What action should a network administrator take to enable VTP pruning on an entire management domain?
A. enable VTP pruning on any client switch in the domain
B. enable VTP pruning on every switch in the domain
C. enable VTP pruning on any switch in the management domain
D. enable VTP pruning on a VTP server in the management domain

Correct Answer: D Section: (none) Explanation Explanation/Reference:
QUESTION 137
How does VTP pruning enhance network bandwidth?
A. by restricting unicast traffic to across VTP domains
B. by reducing unnecessary flooding of traffic to inactive VLANs
C. by limiting the spreading of VLAN information
D. by disabling periodic VTP updates

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 138
Which technology manages multicast traffic at Layer 2 by configuring Layer 2 LAN interfaces dynamically to forward multicast traffic only to those interfaces that want to receive it?
A. IGMP
B. IGMP snooping
C. PIM-DM
D. DVMRP
E. MOSPF PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-892

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 139
Which well-defined routing protocol would a network administrator configure on multicast routers when member routers are widely dispersed?
A. Distance Vector Multicast Routing Protocol (DVMRP)
B. Protocol Independent Multicast Dense Mode (PIM-DM)
C. Multicast Open Shortest Path First (MOSPF)
D. Protocol Independent Multicast Sparse Mode (PIM-SM)
E. Core-Based Trees (CBT)

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 140
When building an IP multicast domain using PIM which mode assumes that other routers do not want to forward multicast packets for the group?
A. PIM-DM
B. PIM-SM
C. PIM-RP
D. CGMP
E. IGMP snooping

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 141
Which statement describes Dynamic Trunking Protocol (DTP) mode ‘desirable’?
A. The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.
B. The interface actively attempts to convert the link to a trunk link.
C. The interface is put into permanent trunking mode but prevented from generating DTP frames.
D. The interface is put into a passive mode, waiting to convert the link to a trunk link.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 142
Given the following partial configuration for Router A: interface serial 0 ip address 10.1.1.1 255.255.255.0 encapsulation frame-relay ip ospf network point-to-multipoint router ospf 7 network 10.1.1.0 0.0.0.255 area 0 Which two statements are correct? (Choose two.)
A. DR/BDR elections do not take place.
B. The router is restricted to a hub and spoke topology.
C. The area 0 NBMA cloud is configured as more than one subnet.
D. OSPF neighbor statements are not necessary.

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 143
Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation frames?
A. access
B. trunk
C. no negotiate
D. dynamic desirable
E. dynamic auto
Correct Answer: D Section: (none) Explanation

Explanation/Reference:
QUESTION 144
Which command displays the number of times that the OSPF Shortest Path First (SPF) algorithm has been executed?
A. show ip protocol PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-892
B. show ip ospf interface
C. show ip ospf
D. show ip ospf database

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 145
Which of the following NSAP addresses is a private, locally administered address?
A. 39.0f01.0002.0000.0c00.1111.00
B. 48.0f01.0002.0000.0c00.1111.00
C. 49.0004.30ac.0000.3090.c7df.00
D. 52.0f01.0002.0000.0c00.1111.00

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 146
Which two methods advertise internal networks to external ISPs via BGP? (Choose two.)
A. using aggregate routes
B. disabling synchronization
C. forcing the next-hop address
D. defining routes via the network statement

Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 147
Which two table types are CEF components?(Choose two.)
A. forwarding information base
B. adjacency tables
C. neighbor tables
D. caching tables
E. route tables

Correct Answer: AB Section: (none) Explanation
Explanation/Reference:
QUESTION 148
A network administrator assigns a multicast address of 239.255.8.5 to an application running on a device with an Ethernet MAC address of 01.b2.7d.05.f1.80. Which Layer 2 multicast address will this device use?
A. 01.00.5e.7F.08.05
B. 01.b2.7d.05.f1.80
C. 01.b2.7d.0a.08.05
D. 01.00.5e.05.f1.80
E. ff.ff.ff.ff.ff.ff

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 149
For the accompanying router output, which of the following statements describes the state that neighbor
172.16.254.3 is in?
A. The router will not accept connections from the peer.
B. The router has sent out an active TCP connection request to the peer.
C. The router is listening on its server port for connection requests from the peer.
D. BGP can exchange routing information in this state.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 150
Above is the output from show ip bgp neighbors command. What is line 21 stating about the BGP connection?
PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-892

A. the number of consecutive TCP connections to the specified remote neighbor
B. the number of times the router has established a TCP connection
C. the number of total TCP connections that the router has
D. the number of neighbors that the router has

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 151
IS-IS is often considered an alternative to OSPF in the IP world. Which two statements identify similarities between IS-IS and OSPF? (Choose two.)
A. support for designated intermediate systems and backup designated intermediate systems
B. support for multiple areas per router
C. support for classless routing
D. support for address summarization between areas
E. support for both DIS adjacencies and neighbor adjacencies

Correct Answer: CD Section: (none) Explanation
Explanation/Reference: QUESTION 152
In an IS-IS environment, what happens when the designated IS router crashes?
A. The elected backup designated router takes the place of the DIS indefinitely without the necessity of a new election.
B. The elected backup designated router takes the place of the DIS temporarily without the necessity of a new election, until the original DIS comes back online.
C. A new election process occurs immediately, establishing a new DIS that will remain in place indefinitely.
D. A new election process occurs immediately, establishing a new DIS until a router with a higher priority or MAC address establishes an adjacency.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
PassGuide.com-Make You Succeed To Pass IT Exams PassGuide 642-892
QUESTION 153
Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value?
A. VTP
B. 802.1Q
C. DTP
D. ISL

Correct Answer: B Section: (none) Explanation
Explanation/Reference:

Flydumps.com Cisco 642-892 material details are researched and created by the most professional certified authors who are regularly using current exams experience to create precise and logical dumps. You can get questions and answers from many other websites or books, but logic is the main key of success. And Flydumps.com will give you this key of success.