Welcome to download the newest Pass4itsure 70-247 VCE dumps: https://www.pass4itsure.com/70-247.html

Cisco 642-874 isn’t just ideal for college students it also occasion preserving by giving readymade at home alternatives and the one can possibly conserve the efforts by avoid wandering here and there seeking a competent mentor.Cisco 642-874 qualified college students are getting a lot more than their expectations inside market place simply because Cisco 642-874 will be involving great market value. If you should often hear via all of your close friends or buddie ahead of regarding Cisco 642-874 exam. however, you may not get given a significant shown to Cisco 642-874 exam sample questions because of various worries about this technique involving Cisco 642-874 exam then it’s high time pertaining to deciding concerning Flydumps regarding boosting prospective buyers associated .

QUESTION 48
Which version of spanning tree is recommended for the enterprise campus?
A. CST
B. MST
C. STP
D. PVST+
E. PVRST+

Correct Answer: E Section: (none) Explanation
Explanation/Reference: Explanation:
E – Self-study v2, Page611 Review Qn.No.4 –
QUESTION 49
Which two design concerns must be addressed when designing a multicast implementation? (Choose two)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 hits of the MAC address are used to map IP address
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01 uu4t MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

Correct Answer: DF
Section: (none)
Explanation

Explanation/Reference:
Explanation:
D & F Self-study v2, Page457

QUESTION 50

What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?
A. Adjust the default hello timers to three seconds for aggressive mode
B. Enable it in global mode and on every interface you need to support
C. Enable it in global mode to support every individual fiber-optic interface
D. Enable it to create channels containing up to eight parallel links between switches
Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:
C Self-study v2, Page 54
QUESTION 51
Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two)
A. You can reduce outage 1 to 3 seconds by using SSO in Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.
B. SSO and NSF each require the device to either be graceful restart-capable or graceful-aware.
C. In a fully redundant topology adding redundant supervisor a with NSF and SSO may cause longer convergence times than single supervisors with turned IGP times
D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E. Cisco NSF-aware neighbor relationship are independent of any turned IGP times

Correct Answer: AC Section: (none) Explanation
Explanation/Reference: Explanation:
A Self-study v2, Page 41 C Self-study v2, Page 40
QUESTION 52
Which of these statements about FSPF is true?
A. It supports multipath routing
B. It can run any type of storage ports
C. When it is used, hop-by-hop routes are based only on the switch ID
D. When it is used, path status is based on the functionality of attached ports
E. It runs only on a switch fabric and cannot function in a VSAN

Correct Answer: A Section: (none) Explanation
Explanation/Reference: Explanation:
A – Self-study v2, Page270
QUESTION 53
Refer to the exhibit
Which of the following is an advantage of device clustering utilizing Virtual Port Channels (vPC)?
A. A logical star topology provides a loop free environment so that all links will be used forward traffic
B. Enhanced EtherChannel hashing load balancing using the vPC peer link internal to the VPC
C. The control plane functions of the Nexus switches are merged to hide the use of virtualization
D. Neighboring devices connect on a Layer 3 MEC for improved packet forwarding

Correct Answer: A Section: (none) Explanation
Explanation/Reference: Explanation:
A – Refer – http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/ white_paper_c11_493718.html All links are active in a vPC topology, and traffic is distributed over the various links to achieve full utilization of the available cross-sectional bandwidth. Traffic distribution is based on a link aggregation hash algorithm
QUESTION 54
Which three statements about firewall modes are correct? (Choose three)
A. A firewall in routed mode has one IP address
B. A firewall in transparent mode has one IP address
C. In routed mode, the firewall is considered to be Layer 2 device
D. In routed mode, the firewall is considered to be a Layer 3 device
E. In transparent mode, the firewall is considered to be a Layer 2 device
F. In transparent mode, the firewall is considered to be a Layer 3 device
Correct Answer: BDE Section: (none) Explanation

Explanation/Reference:Explanation:
B,D,E – Self-study v2, Page303 – Ref.Figure:7.5
also Page344 In “Designing Cisco Network Service Architectures (ARCH)” it is clearly stated on page 334: “A transparent firewall has one IP address assigned to the entire bridge group, and uses this management address as the source address for packets originated on the firewall.” Incorrect answer:

QUESTION 55
Which one of these statements is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer witches, independent of any other devices such as firewalls or content switching devices.
C. A mix of both Layer 2 and Layer 3 access is sometimes the most optimal
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Self-study v2, Page196 Note:Not explicitly mentioned but to be understood after going thro the section
QUESTION 56
Which unique characteristics of Data Center Aggregation layer must be considerated by an Entherprise Campus designer?
A. Layer 3 routing between the Access and Aggregation layers facilitates the ability to span VLANs across multiple access switches, which is a requirement for many server virtualization and clustering technologies.
B. ”East-west” server-to-server traffic can travel between aggregation modules by way of the core, but backup and replication traffic typically remains within an aggregation module.
C. Load balancing, firewall services, and other network services are commonly integrated by the use of service modules that are inserted in the aggregation switches.
D. Virtualization tools allow a cost effective approach for redundancy in the network design by using two or four VDCs from the same physical switch.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
C,D Refer Screenshot from INE Video on the topic Virtualization – Module 1 Lesson 2 – Virtualization.wmv
QUESTION 57
Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two)
A. You can reduce outage 1 to 3 seconds by using SSO in Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.
B. SSO and NSF each require the device to either be graceful restart-capable or graceful-aware.
C. In a fully redundant topology adding redundant supervisor a with NSF and SSO may cause longer convergence times than single supervisors with turned IGP times
D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E. Cisco NSF-aware neighbor relationship are independent of any turned IGP times

Correct Answer: AC Section: (none) Explanation
Explanation/Reference: Explanation:
A Self-study v2, Page 41 C Self-study v2, Page 40
QUESTION 58
Which four Cisco proprietary Spanning Tree Protocol enhancements are supported with rapid per-VLAN Spanning-Tree plus? (Choose four.)
A. PortFast
B. UnlinkFast
C. loop guard
D. root guard
E. BPDU guard
F. BackboneFast

Correct Answer: ACDE Section: (none) Explanation
Explanation/Reference:
A C D E Self Study v2 Page 48
QUESTION 59
There are three steps to confirm whether a range if IP addresses can be summarized. Which of the following is used in each of three 3 steps?
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 60
With respect to address summarization, which of the following statements concerning IPv4 and IPv6 is true?
A. The potential size of the IPv6 address blocks suggests that address summarization favors IPv6 over IPv4.
B. Role based addressing using wildcard masks to match multiple subnets is suitable for IPv4, but unsuitable for IPv6.
C. In order to summarize, the number of subnets in the IPv4 address block should be a power of 2 while the number of subnets in the IPv address block should be a power of 64.
D. WAN link addressing best supports summarization with a/126 subnet fir IPv4 and a/31 for IPv6.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 61
The Cisco Nexus 1000V is intended to address which disadvantage of the VMware vSphere solution?
A. Inability to deploy new functional servers without requiring physical changes on the network
B. Complexity added by the requirement for an ESX host for each virtual machine
C. Network administrators lack control of the access layer of the network
D. To increase the number of physical infrastructure and the virtual machines that can be managed

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
A – Refer – http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9902/white_paper_c11-558242.html Virtual servers can now use the same network configuration, security policy, diagnostic tools, and operational models as their physical server counterparts attached to dedicated physical network ports.
QUESTION 62
Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?
A. Because the IP phone is a three-port switch. IP telephony extends the network edge, impacting the Distribution layer
B. Video and voice are alike in being bursty and bandwidth intensive, and thus impose requirements to be lossless, and have minimized and jitter.
C. IP phones have no voice and data VLAN separation, so security policies must be based on upper layer traffic characteristics.
D. Though multi-VLAN access ports are set to dot1q and carry more than two VLANs they are not trunk ports.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Self Study v2 – Page91
QUESTION 63
Support of vPC on the Cisco Nexus 5000 access switch enables various new design options for the data center Access layer, including which of the following?
A. The vPC peer link is not required for Access layer control traffic, and can instead be used to span VLANs across the vPC access switches
B. A single switch can associate per-interface with more than one vPC domain
C. vPC can be used on both sides of the MEC, allowing a unique 16 link EtherChannel to be built between the access and aggregation switch
D. Allows an EtherChannel between a server and a access switch while still maintaining the level of availability that is associated with dual-homing a server to two different access switches

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
C Refer http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/layer2/502_n1_1/ Cisco_n5k_layer2_config_gd_rel_502_N1_1_chapter8.html. When you configure the EtherChannels in a
vPC—incl. the vPC peer link channel—each switch can have up to 16 active links in a single EthChannel.
QUESTION 64
Drag the OSPF technology on the left to the approriate network convergence step on the right that this technnology helps to mitigat
Select and Place:

Correct Answer:
Section: (none) Explanation
Explanation/Reference:
Detect the Event — Bidirectional Forwarding Detection – Pg.143 Propagate the event — LSA Propagation/Throttling or pacing timers – Pg.128 Process the event — SPF Throttling or pacing timers – Pg.141,142,77 Update Forwarding data structures — CEF – Pg.197,255
QUESTION 65
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance. Which of the following concerning CEF is recommended by Cisco?
A. Use default Layer 4 hash in core.
B. Use default Layer 3 hash in distribution
C. Use default Layer 4 hash in distribution.
D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
D – Self-study v2 – Pg.60
QUESTION 66
Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?
A. availability
B. performance
C. functionality
D. manageability

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
C -Self-study v2 – Page18
QUESTION 67
You are the Cisco Network Designer in Cisco.com. Which of these is a Layer 2 transport architecture that provides packet-based transmission optimized for data based on a dual ring topology?
A. Dynamic Trunking Protocol
B. Resilient Packet Ring
C. Synchronous Digital Hierarchy
D. Coarse Wave Division Multiplexing

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
Self-study v2 – Page165,166
QUESTION 68
What two choices can you make when redundancy is required from a branch office to a regional office? (Choose two.)
A. multiple Frame Relay PVCs
B. dual Wan links to the regional office
C. dual Wan links to another branch office
D. single links – one to the regional office and one to another branch office

Correct Answer: BD Section: (none) Explanation
Explanation/Reference: Explanation:
B,D -Practical knowledge
QUESTION 69
Which one is not the feature of the Cisco Unified Wireless Network architecture?
A. network unification
B. remote access
C. mobility services
D. network management

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
B – Self-study v2 Pg.517,518
QUESTION 70
What type of Call Admission control in CallManager allows for limits to the bandwidth consumed by active calls?
A. regions
B. partitions
C. locations
D. device Pools

Correct Answer: C Section: (none) Explanation
Explanation/Reference: Explanation:
QUESTION 71
Which two of these is correct regarding the recommended practice for distribution layer design based on the following configuration?

A. use a Layer 2 link between distribution switches
B. use a Layer 3 link between distribution switches
C. use a redundant link to the core
D. use a Layer 3 link between distribution switches with route summarization

Correct Answer: CD Section: (none) Explanation
Explanation/Reference: Explanation:
Refer Picture 2.6 – Self-study v2 – Pg.41
QUESTION 72
Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?
A. dynamic reconfiguration
B. path MTU discovery
C. auto setup
D. remote management

Correct Answer: A Section: (none) Explanation
Explanation/Reference: Explanation:
Dynamic reconfiguration: All configuration changes should take effect without requiring a reboot of the device. Disruption of service with a fully loaded VPN device can potentially impact thousands of individual users. Reference: Arch student guide p.9-17
QUESTION 73
Jitter is an unwanted variation of one or more characteristics of a periodic signal in electronics and telecommunications and _____refers to call issues that cause variations in timing or time of arrival
A. echo
B. jitter
C. packet loss
D. digitized sampling

Correct Answer: B Section: (none) Explanation
Explanation/Reference: Explanation:
B – Self-study v2 Page – 187
QUESTION 74
Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? (Choose three.)
A. IP telephony
B. security
C. IP multicasting
D. QoS

Correct Answer: BCD Section: (none) Explanation
Explanation/Reference: Explanation:
Self Study v2 – Page20,21
QUESTION 75
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor? (Choose two.)
A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network

Correct Answer: CD Section: (none) Explanation
Explanation/Reference: Explanation:
C,D – Self-study v2 – Pg.388
QUESTION 76
Which three best practices should be implemented at the campus backbone submodule to support the server farm module? (Choose three.)
A. Implement highly redundant switching and links with no single points or paths of failure.
B. Implement server load balancing.
C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D. Implement intrusion detection with automatic notification of intrusion attempts in place.
Correct Answer: ACD Section: (none) Explanation

Explanation/Reference: Explanation:
A,C,D – Self-study v2 – Page 39,40
QUESTION 77
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?
A. inline with a firewall
B. in a DMZ outside the firewall
C. parallel with a firewall
D. in a DMZ behind the firewall

Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
D – Self-study v2 – Page 409
QUESTION 78
The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?
A. nGenius Real-Time Monitor
B. CiscoView
C. Device Fault Manager
D. Internetwork Performance Monitor

Correct Answer: D Section: (none) Explanation
Explanation/Reference: Explanation:
D – Self-study v2 – Page 609
QUESTION 79
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system. Where can an IPS sensor be placed in an enterprise network? (Choose two.)
A. core layer
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking

Correct Answer: CD Section: (none) Explanation
Explanation/Reference: Explanation:
D – Self-study v2 – Page 393 B Also is correct…
QUESTION 80
Which protocol would provide block access to remote storage over WAN links?
A. iSCSI
B. FCIP
C. SCSI-FP
D. eSCSI

Correct Answer: A Section: (none) Explanation
Explanation/Reference: Explanation:
Flydumps.com Cisco 642-874 material details are researched and created by the most professional certified authors who are regularly using current exams experience to create precise and logical dumps. You can get questions and answers from many other websites or books, but logic is the main key of success. And Flydumps will give you this key of success.
Pass4itsure 70-247 dumps with PDF + Premium VCE + VCE Simulator: https://www.pass4itsure.com/70-247.html