Official 2014 Latest Cisco 640-864 Dump Free Download(71-80)!
QUESTION 71
Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three.)
A. server statistics
B. network audit
C. traffic analysis
D. visual inventory
E. staff input
Answer: BCE
QUESTION 72
Which of the following Cisco router services performs network traffic analysis to assist in documenting a customer’s existing network?
A. NetMon
B. MRTG
C. SNMP MIB compiler
D. NetFlow
Answer: D
QUESTION 73
Which statement identifies a benefit obtained when using a top-down network design plan?
A. provides a more detailed picture of the desired network
B. facilitates design based on previous experience
C. is less time-consuming than using a bottom-up approach
D. allows quick responses to design requests
E. incorporates customer organizational requirements
Answer: E
QUESTION 74
Lightweight access points are being deployed in remote locations where others are already operational. The new access points are in a separate IP subnet from the wireless controller. OTAP has not been enabled at any locations. Which two methods can the AP use to locate a wireless controller? (Choose two.)
A. NV-RAM IP address
B. master
C. primary, secondary, tertiary
D. DHCP
E. local subnet broadcast
F. DNS
Answer: DF
QUESTION 75
Which Cisco security solution can quarantine and prevent non-compliant end stations from accessing the network until they achieve security policy compliance?
A. Cisco Security Monitoring, Analysis, and Response System
B. Adaptive Security Appliance
C. Network Admission Control
D. Network Intrusion Prevention System
E. Cisco Secure Connectivity
F. Access Control Server
Answer: C
QUESTION 76
A network design includes private addressing, but there is also a need for two or three network devices to each be assigned a unique public address so they can be accessed from the Internet.
Which technique will satisfy this requirement?
A. Static NAT
B. VPN tunneling
C. Dynamic NAT
D. DHCP
Answer: A
QUESTION 77
A Cisco security mechanism has the following attributes:
– It is a sensor appliance
– It searches for potential attacks by capturing and analyzing traffic
– It is a “purpose-built device”
– It is installed passively
– It introduces no delay or overhead
Which Cisco security mechanism is this?
A. NIDS
B. PIX
C. IKE
D. HIPS
E. HMAC
Answer: A
QUESTION 78
Which two routing protocols operate over NBMA point-to-multipoint networks without the use of
point-to-point subinterfaces? (Choose two.)
A. OSPF
B. EIGRP
C. RIPv2
D. RIPv1
E. IGRP
F. IS-IS
Answer: AB
QUESTION 79
Which three types of WAN topologies can be deployed in the Cisco Enterprise Architecture Enterprise Edge WAN module? (Choose three.)
A. ring
B. full mesh
C. partial mesh
D. collapsed core
E. star
F. core
G. edge
Answer: BCE
QUESTION 80
Which statement accurately describes one difference between a small office and medium office topology?
A. Medium offices commonly use integrated route and switching platforms.
B. Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks.
C. Medium offices use external access switches to support LAN connectivity.
D. Small offices commonly use Rapid PVST+ for Layer 3 deployments.
Answer: C
If you want to pass the Cisco 640-864 Exam sucessfully, recommend to read latest Cisco 640-864 Dump full version.