Pass4itsure Cisco (CCNA, CCNP, Meraki Solutions Specialist, CCDP…) dumps updates throughout the year and share some exam questions for free to help you 100% pass the exam

Tag: 642-813 dumps

Cisco 642-813 Study Material, New Updated Cisco 642-813 Dumps PDF Latest Version PDF&VCE

Free Sharing –How to pass the Cisco 642-813 exam quickly? How to prepare for the changed exam? Free download Cisco 642-813   Exam practice test with all new exam questions.You can also get more new version on Flydumps.com

QUESTION 66
PassGuide is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Select three)
A. EAP-over-LAN
B. EAP MD5
C. STP
D. protocols not filtered by an ACL
E. CDP
F. TACACS+

Correct Answer: ACE Section: (none) Explanation
Explanation/Reference:
QUESTION 67
VLAN maps have been configured on switch PG1. Which of the following actions are taken in a VLAN map that does not contain a match clause?
A. Implicit deny feature at end of list.
B. Implicit deny feature at start of list.
C. Implicit forward feature at end of list
D. Implicit forward feature at start of list.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 68
A PassGuide switch was configured as shown below:
switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002 switchport port-security violation shutdown
Given the configuration output shown above, what happens when a host with the MAC address of 0003.0003.0003 is directly connected to the switch port?
A. The host will be allowed to connect.
B. The port will shut down.
C. The host can only connect through a hub/switch where 0002.0002.0002 is already connected.
D. The host will be refused access.
E. None of the other alternatives apply
Correct Answer: A Section: (none) Explanation

Explanation/Reference:
QUESTION 69
You need to configure port security on switch PG1. Which two statements are true about this technology? (Select two)
A. Port security can be configured for ports supporting VoIP.
B. With port security configured, four MAC addresses are allowed by default. C. The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.

 » Read more about: Cisco 642-813 Study Material, New Updated Cisco 642-813 Dumps PDF Latest Version PDF&VCE  »

Cisco 642-813 Exam Dumps, Welcome To Buy Cisco 642-813 Questions And Answers Online Store

ATTENTION: Get your Cisco 642-813 certification easily with,Flydumps latest Cisco 642-813 exam dumps. All the up-to-date questions and answers were added to the new version.Go to the site Flydumps.com to get more Cisco 642-813 exam
information.

QUESTION 50
Which set of statements describes the correct order and process of a wireless client associating with a
wireless access point?
A. 1. Client sends probe request.
2.
Access point sends probe response.

3.
Client initiates association.

4.
Access point accepts association.

5.
Access point adds client MAC address to association table.
B. 1. Client sends probe request.
2.
Access point sends probe response.

3.
Client initiates association.

4.
Access point accepts association.

5.
Client adds access point MAC address to association table.
C. 1. Client sends probe request.
2.
Access point sends probe response.

3.
Access point initiates association.

4.
Client accepts association.

5.

 » Read more about: Cisco 642-813 Exam Dumps, Welcome To Buy Cisco 642-813 Questions And Answers Online Store  »

Cisco 642-813 Exam Collection, Latest Release Cisco 642-813 Answers Latest Version Cisco 642-813 PDF&VCE

Important Info — Cisco 642-813 new study guide are designed to help you pass the exam in a short time.Everything you need can be found in the new version Cisco 642-813 exam dumps.Visit Flydumps.com to get more valid information.

Exam A
QUESTION 1
Acme is a small export company that has an existing enterprise network comprised of 5 switches;
CORE,DSW1,DSW2,ASW1 and ASW2. The topology diagram indicates their desired pre-VLAN spanning
tree mapping.
Previous configuration attempts have resulted in the following issues:


CORE should be the root bridge for VLAN 20; however, DSW1 is currently the root bridge for VLAN 20.


Traffic for VLAN 30 should be forwarding over the gig 1/0/6 trunk port between DSW1 and DSW2. However VLAN 30 is currently using gig 1/0/5.


Traffic for VLAN 40 should be forwarding over the gig 1/0/5 trunk port between DSW1 and DSW2. However VLAN 40 is currently using gig 1/0/6.
You have been tasked with isolating the cause of these issuer and implementing the appropriate solutions. You task is complicated by the fact that you only have full access to DSW1, with isolating the cause of these issues and implementing the appropriate solutions. Your task is complicated by the fact that you only have full access to DSW1, with the enable secret password cisco. Only limited show command access is provided on CORE, and DSW2 using the enable 2 level with a password of acme. No configuration

\
Correct Answer: configure terminal spanning-tree vlan 20 priority 61440 interface g1/0/6 spanning-tree vlan 30 port-priority 64 exit interface g1/0/5 spanning-tree vlan 40 cost 1 show spanning-tree copy run start
Section: (none) Explanation
Explanation/Reference:
By using the ※show spanning-tree§ command as shown above, we learned that DSW1 is the root bridge for VLAN 20 (notice the line ※This bridge is the root§

To determine the root bridge, switches send and compare their priorities and MAC addresses with each other. The switch with the lowest priority value will have highest priority and become the root bridge. Therefore, we can deduce that the priority of DSW1 switch is lower than the priority of the CORE switch so it becomes the root bridge. To make the CORE the root bridge we need to increase the DSW1∩s priority value, the best value should be 61440 because it is the biggest value allowed to assign and it will surely greater than of CORE switch. (You can use another value but make sure it is greater than the CORE priority value by checking if the CORE becomes the root bridge or not; and that value must be in incrementsof 4096).

 » Read more about: Cisco 642-813 Exam Collection, Latest Release Cisco 642-813 Answers Latest Version Cisco 642-813 PDF&VCE  »

Free Sharing –pass the Cisco 642-813 exam quickly

100% Valid And Pass With latest Cisco 642-813 exam dumps, you will never fail your Cisco 642-813 exam. All the questions and answers are updated and added to the new version timely by our experts.Also now Cisco 642-813 is offering free Cisco 642-813 exam VCE player and PDF files for free on their website.

Exam A
QUESTION 1
VTP devices in a network track the VTP revision number. What is a VTP configuration revision number?
A. A number for identifyiing changes to the network switch
B. A number for identifying changes in the network router
C. A number for identifying changes to the network topology
D. none of the other alternatives apply
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
The configuration revision number is a 32 bit number that indicates the level of revision for a VTP packet.
Each VTP device tracks the VTP configurationa revision number assigned to it, and most of the VTP
packets contain the VTP configuration revision number of the sender.
This information is used to determine whether the received information is more recent that the current
revision of a switch, change the VTP domain name and then change it back to the original name.

QUESTION 2

Refer to the exhibit. VLAN 1 and VLAN 2 are configured on the trunked links between Switch A and Switch B Port Fa0/2 on Switch B is currently in a blocking state for both VLANs. What should be done to load the balance VLAN traffic between Switch A and Switch B?

Correct Answer: B Section: (none)Explanation

QUESTION 3
What must be configured on a Cisco switch in order to advertise VLAN information
A. VTP mode B. VTP password
C. VTP revision number
D. VTP pruning
E. VTP domain name
F. none of the other alternatives apply
Correct Answer: E Section: (none) Explanation

QUESTION 4
A. This interface is a member of a voice VLAN
B. This interface is configured for access mode
C. this interface is a dot1q trunk passing all configuration
D. this interface is a member of VLAN 7
E. this interface is a member of VLAN 1
Correct Answer: BD Section: (none)Explanation

QUESTION 5
Correct Answer: ABCD Section: (none) Explanation

QUESTION 6
A. STP root status
B. VTP mode
C. Negotiation status
D. Management domain
E. Configuration revision number
Correct Answer: DE Section: (none)Explanation

QUESTION 7
A. Client
B. server
C. transparent
D. pass-through
E. no-negociate
Correct Answer: BC Section: (none) Explanation

QUESTION 8
Correct Answer: B Section: (none) Explanation

QUESTION 9
A. 802.1Q tunneling
B. ATM
C. SDH
D. IP over Optical Networking
E. ISL
Correct Answer: A Section: (none)Explanation

QUESTION 10
A. VLAN 1-5 will use fa0/10 as a backup only
B. VLAN 6-10 will use fa0/10 as a backup only
C. VLAN 1-5 will be blocking if fa0/10 goes down
D. VLAN 1-10 are configured to load share between fa0/10 and fa0/12
E. VLAN 6-10 have a port priority of 128 on fa0/10
Correct Answer: BD Section: (none)Explanation

QUESTION 11
A. supports token ring VLANs
B. allows VLAN consistency checks
Correct Answer: AB Section: (none) Explanation

QUESTION 12
A. DTP packets are sent to switch b
B. the native VLAN for switch b is vlan 1
C. a trunk link will be formed
D. DTP is not running on switch a
E. only VLANs 1 – 1001 will travel across the trunk link
Correct Answer: ABC Section: (none) Explanation
Explanation/Reference:

QUESTION 13
Correct Answer: D Section: (none) Explanation

QUESTION 14
A. VTP version 2 supports token ring VLANs
B. VTP version 2 allows VLAN consistency checks
C. VTP version 2 allows active redundant links when used with spanning tree
D. VTP version 2 reduces the amount of configuration necessary
E. VTP version 2 saves VLAN configuration memory
Correct Answer: AB Section: (none) Explanation

QUESTION 15
What does the global command udld enable accomplish?

 » Read more about: Free Sharing –pass the Cisco 642-813 exam quickly  »

Cisco 642-813 Answers, The Most Recommended Cisco 642-813 Exam Practice PDF Online Store

New VCE and PDF – You can prepare Cisco 642-813 exam in an easy way with Cisco 642-813 questions and answers. By training our Cisco 642-813 vce dumps with all the latest questions, you can pass the exam in the first attempt.

Exam A QUESTION 1
Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the switch port that is connected to the IP phone?

A. Effectively the trust boundary has been moved to the IP phone.
B. The host is now establishing the CoS value and has effectively become the trust boundary.
C. The switch is rewriting packets it receives from the IP phone and determining the CoS value.
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set the CoS.
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 2
Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command is configured
on the switch port interface connected to the IP phone?

A. Effectively, the trust boundary has been moved to the PC attached to the IP phone.
B. The computer is now establishing the CoS value and has effectively become the trust boundary.
C. The IP phone is enabled to override with a CoS value of 3 the existing CoS marking of the PC attached CareerCert.blogspot.com to the IP phone.
D. The switch will no longer tag incoming voice packets and will extend the trust boundary to the distribution layer switch.
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 3
Which three WLAN statements are true? (Choose three.)
A. A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B. A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN.
C. Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D. Another term for infrastructure mode is independent service set (IBSS).
E. The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
F. WLANs are designed to share the medium and can easily handle an increased demand of channel contention.

 » Read more about: Cisco 642-813 Answers, The Most Recommended Cisco 642-813 Exam Practice PDF Online Store  »