2013年12月31日星期二

Cisco 351-018認定試験の資格を入手したいのか

IT-Passports.comは多くのIT職員の夢を達成することであるウェブサイトです。IT夢を持っていたら、速くIT-Passports.comに来ましょう。 IT-Passports.comにはすごいトレーニング即ち Ciscoの351-018試験トレーニング資料があります。これはIT職員の皆が熱望しているものです。あなたが試験に合格することを助けられますから。

IT-Passports.comのCiscoの351-018トレーニング資料を利用したら、初めて試験を受けるあなたでも一回で試験に合格できることを保証します。IT-Passports.comのCiscoの351-018トレーニング資料を利用しても合格しないのなら、我々は全額で返金することができます。あなたに他の同じ値段の製品を無料に送って差し上げます。

試験番号:351-018問題集
試験科目:Cisco 「CCIE Security written」
問題と解答:全560問

IT-Passports.comが提供した対応性の訓練問題をテストにして初めてCiscoの351-018認定試験に参加する受験者の最もよいな選択でございます。真実試験問題が似てるのを確保することができて一回合格するのは目標にしています。もし試験に失敗したら、弊社が全額で返金いたします。

IT-Passports.comの351-018問題集は多くの受験生に検証されたものですから、高い成功率を保証できます。もしこの問題集を利用してからやはり試験に不合格になってしまえば、IT-Passports.comは全額で返金することができます。あるいは、無料で試験351-018問題集を更新してあげるのを選択することもできます。こんな保障がありますから、心配する必要は全然ないですよ。

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/351-018.html

NO.1 After the client opens the command channel (port 21) to the FTP server and requests passive mode,
what will be the next step?
A. The FTP server sends back an ACK to the client.
B. The FTP server allocates a port to use for the data channel and transmits that port number to the client.
C. The FTP server opens the data channel to the client using the port number indicated by the client.
D. The FTP client opens the data channel to the FTP server on port 20.
E. The FTP client opens the data channel to the FTP server on port 21.
Answer: B

Cisco認定証   351-018   351-018練習問題   351-018練習問題

NO.2 To provide a separation of duties within Cisco Security Manager, which mode would the Cisco Security
Manager administrator use?
A. Activity mode
B. Change Control mode
C. Workflow mode
D. Task-Based mode
E. Task Isolation mode
Answer: C

Cisco練習問題   351-018   351-018   351-018

NO.3 Which of these best represents a typical attack that takes advantage of RFC 792, ICMP type 3
messages?
A. blind connection-reset
B. large packet echo request
C. packet fragmentation offset
D. broadcast-based echo request
E. excessive bandwidth consumption
Answer: A

Cisco   351-018   351-018認定試験   351-018

NO.4 In ISO 27001 ISMS, which three of these certification process phases are required to collect
information for ISO 27001? (Choose three.)
A. discover
B. certification audit
C. post-audit
D. observation
E. pre-audit
F. major compliance
Answer: BCE

Cisco過去問   351-018認定試験   351-018

NO.5 Which two of these Cisco Catalyst security features offer the best ways to prevent ARP cache poisoning?
(Choose two.)
A. Dynamic ARP Inspection
B. port security
C. MAC address notification
D. DHCP snooping
E. PortFast
F. 802.1x authentication
Answer: AD

Cisco認定資格   351-018練習問題   351-018

NO.6 The ARP functionality in IPv4 is accomplished using which type of messages, as defined in ICMPv6?
A. router solicitation and advertisement
B. neighbor solicitation and advertisement
C. redirect
D. neighbor solicitation and router advertisement
E. router solicitation and neighbor advertisement
Answer: B

Cisco   351-018練習問題   351-018参考書

NO.7 A DNS Client sends DNS messages to obtain information about the requested domain name space.
The information is known as which of these?
A. Resource Record
B. Resolver
C. Branch
D. Authoritative Client
E. Recursive Client
Answer: A

Cisco   351-018認定証   351-018認定資格

NO.8 In the example shown, Host A has attempted a DCOM attack using Metasploit from Host A to Host
Which three statements best describe how event logs and IPS alerts can be used in conjunction with each
other to determine if the attack was successful? (Choose three.)
A. Cisco Security MARS will collect the syslog and the IPS alerts based on time.
B. The IPS event will suggest that an attack may have occurred because a signature was triggered.
C. IPS and Cisco ASA adaptive security appliance will use the Unified Threat Management protocol to
determine that both devices saw the attack
D. Cisco ASA adaptive security appliance will see the attack in both directions and will be able to
determine if an attack was successful.
E. The syslog event will indicate that an attack is likely because a TCP SYN and an ACK followed the
attempted attack.
Answer: ABE

Cisco   351-018   351-018   351-018練習問題   351-018問題集   351-018

NO.9 Refer to the exhibit.
Which three of the following statements are correct? (Choose three.)
A. The exhibit shows an example of a NAC Framework network.
B. The exhibit shows an example of a NAC Appliance network.
C. The network utilizes in-band admission control.
D. The network utilizes out-of-band admission control.
E. Cisco NAC Appliance Agent is used to verify end-user PC compliance with the security policy
F. Cisco Trust Agent is used to verify end-user PC compliance with the security policy.
Answer: BDE

Cisco練習問題   351-018   351-018

NO.10 Which two of these commands are required to implement a Cisco Catalyst 6500 Series Firewall
Services Module (FWSM) in a Catalyst 6500 running Cisco IOS? (Choose two.)
A. firewall multiple-vlan-interfaces
B. firewall module vlan-group
C. module secure-traffic
D. firewall vlan-group <vlan-x>
E. firewall module secure-traffic
Answer: BD

Cisco認定証   351-018過去問   351-018認定証

NO.11 Which method is used by Cisco Security Agent to get user state information from the operating
system?
A. secure SSL using HTTPS session
B. application (Layer 7)-based (Cisco proprietary) encryption
C. NetBIOS socket on TCP port 137-139 and UDP port 137-139
D. Win32 application binary interface (ABI)
E. Win32 application programming interface (API)
Answer: E

Cisco   351-018練習問題   351-018   351-018過去問   351-018   351-018

NO.12 Cisco ASA 5500 Series Adaptive Security Appliance application layer protocol inspection is
implemented using which of these?
A. Protocol Header Definition File (PHDF)
B. Cisco Modular Policy Framework
C. Reverse Path Forwarding (RPF)
D. NetFlow version 9
E. Traffic Classification Definition File (TCDF)
Answer: B

Cisco認定証   351-018過去問   351-018

NO.13 Refer to the exhibit.
Switch SW2 has just been added to Fa0/23 on SW1. After a few seconds, interface Fa0/23 on SW1 is
placed in the error-disabled state. SW2 is removed from port 0/23 and inserted into SW1 port Fa0/22 with
the same result. What is the most likely cause of this problem?
A. The spanning-tree PortFast feature has been configured on SW1.
B. BPDU filtering has been enabled either globally or on the interfaces of SW1.
C. The BPDU guard feature has been enabled on the Fast Ethernet interfaces of SW1.
D. The Fast Ethernet interfaces of SW1 are unable to autonegotiate speed and duplex with SW2.
E. PAgP is unable to correctly negotiate VLAN trunk characteristics on the link between SWI and SW2.
Answer: C

Cisco   351-018認定資格   351-018認定証   351-018参考書

NO.14 Which two of these statements regarding Authentication Header (AH) are true? (Choose two.)
A. AH requires the use of Encapsulating Security Payload (ESP) to work correctly.
B. AH provides authentication for most of the "outer" IP header, as well as the upper layer protocols.
C. AH can be deployed in tunnel mode only.
D. AH is not commonly used, because it can only encrypt the original packet using a DES encryption
algorithm.
E. AH will work through a NAT (one-to-one) device, but not through a PAT (one-to-many) device.
F. AH uses an IP protocol number of 51.
Answer: BF

Cisco練習問題   351-018   351-018   351-018   351-018認定試験   351-018参考書

NO.15 What is the net effect of using ICMP type 4 messages to attack RFC 1122-compliant hosts?
A. Hosts will perform a soft TCP reset and restart the connection.
B. Hosts will perform a hard TCP reset and tear down the connection.
C. Hosts will reduce the rate at which they inject traffic into the network.
D. Hosts will redirect packets to the IP address indicated in the ICMP type 4 message.
E. Hosts will retransmit the last frame sent prior to receiving the ICMP type 4 message.
Answer: C

Cisco   351-018認定資格   351-018

NO.16 Referring to the partial debug output shown in the exhibit, which of these values is contained inside the
brackets [4] in line 1?
A. RADIUS identifier field value
B. RADIUS attribute type value
C. RADIUS VSA number
D. RADIUS VSA length
E. vendor ID
Answer: B

Cisco   351-018   351-018過去問   351-018   351-018問題集   351-018

NO.17 Which two of these are valid TACACS+ Accounting packets? (Choose two.)
A. REQUEST
B. REPLY
C. RESPONSE
D. CONTINUE
E. START
Answer: AC

Cisco   351-018練習問題   351-018過去問   351-018   351-018参考書

NO.18 How do TCP SYN attacks take advantage of TCP to prevent new connections from being established
to a host under attack?
A. sending multiple FIN segments, forcing TCP connection release
B. filling up a host listen queue by failing to ACK partially opened TCP connections
C. taking advantage of the host transmit backoff algorithm by sending jam signals to the host
D. incrementing the ISN of each segment by a random number, causing constant TCP retransmissions
E. sending TCP RST segments in response to connection SYN+ACK segments, forcing SYN
retransmissions
Answer: B

Cisco過去問   351-018認定試験   351-018問題集

NO.19 For a router to obtain a certificate from a CA, what is the first step of the certificate enrollment process?
A. The router generates a certificate request and forwards it to the CA.
B. The router generates an RSA key pair.
C. The router sends its public key to the CA.
D. The CA sends its public key to the router.
E. The CA verifies the identity of the router.
F. The CA generates a certificate request and forwards it to the router.
Answer: B

Cisco認定試験   351-018   351-018   351-018   351-018参考書   351-018

NO.20 Which two of these statements about SMTP and ESMTP are the most correct? (Choose two.)
A. Open mail relays are often used for spamming.
B. ESMTP does not provide more security features than SMTP.
C. SMTP provides authenticated e-mail sending.
D. Worms often spread via SMTP.
Answer: AD

Cisco問題集   351-018認定証   351-018問題集

NO.21 When using Cisco Easy VPN Remote (hardware client deployment) in the client-mode setup, all of the
following statements are correct except which one?
A. Perform split tunneling on the Cisco Easy VPN Remote device.
B. Initiate a connection from a network behind the Cisco Easy VPN Server to the network behind the
Cisco Easy VPN Remote client.
C. Set the Cisco Easy VPN Remote to allow an administrator or user to manually initiate a connection.
D. Set the Cisco Easy VPN Remote to automatically connect to the Cisco Easy VPN Server.
Answer: B

Cisco参考書   351-018練習問題   351-018

NO.22 When a failover takes place on an adaptive security appliance configured for failover, all active
connections are dropped and clients must reestablish their connections, unless the adaptive security
appliance is configured in which two of the following ways? (Choose two.)
A. active/stand by failover
B. active/active failover
C. active/active failover and a state failover link has been configured
D. active/standby failover and a state failover link has been configured
E. to use a serial cable as the failover link
F. LAN-based failover
Answer: CD

Cisco   351-018過去問   351-018   351-018過去問   351-018

NO.23 Which three of these protocols are supported when using TACACS+? (Choose three.)
A. AppleTalk
B. CHAP
C. NASI
D. NetBIOS
E. Kerberos
Answer: ACD

Cisco認定資格   351-018   351-018過去問   351-018認定資格   351-018   351-018

NO.24 Which one of the following is not a valid RADIUS packet type.?
A. access-reject
B. access-response
C. access-challenge
D. access-reply
E. access-accept
Answer: B

Cisco過去問   351-018参考書   351-018認証試験   351-018

NO.25 Which two of these are true about TFTP? (Choose two.)
A. TFTP includes a basic username/password authentication mechanism.
B. While "putting" files via TFTP is possible, it is good practice to disallow it, because TFTP lacks access
control mechanisms.
C. TFTP uses a very basic "stop and wait" mechanism for flow control, for which each packet needs to be
acknowledged before the next one is sent.
D. TFTP root directories need to be world-readable and -writable due to the lack of security controls in the
protocol.
E. TFTP can list remote directory contents, but only if advanced options (as defined in RFC 2347) are
negotiated between client and server at initial connection time.
Answer: BC

Cisco   351-018過去問   351-018   351-018   351-018

NO.26 A DNS open resolver is vulnerable to which three of these malicious activities? (Choose three.)
A. cache poisoning attack
B. amplification attack
C. Ping of Death attack
D. Resource Utilization attack
E. Blue Screen of Death
F. Nachi worm attack
Answer: ABD

Cisco問題集   351-018   351-018   351-018認定証   351-018認証試験   351-018

NO.27 Which of these statements best describes the advantage of using Cisco Secure Desktop, which is part
of the Cisco ASA VPN solution?
A. Cisco Secure Desktop creates a separate computing environment that is deleted when you finish,
ensuring that no confidential data is left on the shared or public computer.
B. Cisco Secure Desktop is used to protect access to your registry and system files when browsing to
SSL VPN protected pages.
C. Cisco Secure Desktop ensures that an SSL protected password cannot be exploited by a man-
in-the-middle attack using a spoofed certificate
D. Cisco Secure Desktop hardens the operating system of the machines you are using at the time it is
launched.
Answer: A

Cisco   351-018認定証   351-018練習問題   351-018認定資格

NO.28 ASDM on the Cisco ASA adaptive security appliance platform is executed as which of the following?
A. an ActiveX application or a JavaScript application
B. a JavaScript application and a PHP application
C. a fully compiled .Net Framework application
D. a fully operational Visual Basic application
E. a Java applet or a standalone application using the Java Runtime Environment
Answer: E

Cisco   351-018   351-018認定資格   351-018

NO.29 Refer to the exhibit.
Which of these statements is correct for the Fidelity Rating and Base RR values?
A. Both the Fidelity Rating and Base RR values are computed from the Severity Factor value.
B. The Fidelity Rating value is computed from the Base RR value.
C. The Severity Factor value is computed from the Fidelity Rating and Base RR values.
D. The Fidelity Rating value is computed from the Base RR and Severity Factor values.
E. The Base RR value is computed from the Fidelity Rating and Severity Factor values.
Answer: E

Cisco認定試験   351-018認証試験   351-018認定試験   351-018認定資格   351-018

NO.30 How does using DHCP Option 82 on a Cisco Wireless LAN Controller make a network more secure?
A. by preventing rogue DHCP servers from returning unauthorized addresses
B. by ensuring that DHCP addresses are parity-checked before being issued
C. by ensuring that clients receive proper routing information as part of their DHCP responses
D. by preventing DHCP address requests from untrusted relay agents
E. by adding fully qualified domain information that the client can use for SSL authentication
Answer: D

Cisco   351-018   351-018   351-018認証試験

IT認定試験に関連する資料を提供するプロなウェブサイトとして、IT-Passports.comはずっと受験生に優秀な試験参考書を提供し、数え切れない人を助けました。IT-Passports.comの351-018問題集はあなたに試験に合格する自信を与えて、楽に試験を受けさせます。この351-018問題集を利用して短時間の準備だけで試験に合格することができますよ。不思議でしょう。しかし、これは本当なことです。この問題集を利用する限り、IT-Passports.comは奇跡を見せることができます。

IT-Passports.comのCisco 642-591試験問題集を紹介する

多くの時間とお金がいらなくて20時間だけあって楽に一回にCiscoの642-591認定試験を合格できます。IT-Passports.comが提供したCiscoの642-591試験問題と解答が真実の試験の練習問題と解答は最高の相似性があります。

Ciscoの642-591認証試験を選んだ人々が一層多くなります。642-591試験がユニバーサルになりましたから、あなたはIT-Passports.com のCiscoの642-591試験問題と解答¥を利用したらきっと試験に合格するができます。それに、あなたに極大な便利と快適をもたらせます。実践の検査に何度も合格したこのサイトは試験問題と解答を提供しています。皆様が知っているように、IT-Passports.comはCiscoの642-591試験問題と解答を提供している専門的なサイトです。

IT-Passports.comのCiscoの642-591試験トレーニング資料はPDFぼ形式とソフトウェアの形式で提供して、IT-Passports.comのCiscoの642-591試験問題と解答に含まれています。642-591認定試験の真実の問題に会うかもしれません。そんな問題はパーフェクトと称するに足って、効果的な方法がありますから、どちらのCiscoの642-591試験に成功を取ることができます。IT-Passports.comのCiscoの642-591問題集は総合的にすべてのシラバスと複雑な問題をカバーしています。IT-Passports.comのCiscoの642-591テストの問題と解答は本物の試験の挑戦で、あなたのいつもの考え方を変換しなければなりません。

あなたはインターネットでCiscoの642-591認証試験の練習問題と解答の試用版を無料でダウンロードしてください。そうしたらあなたはIT-Passports.comが用意した問題集にもっと自信があります。早くIT-Passports.comの問題集を君の手に入れましょう。

試験番号:642-591問題集
試験科目:Cisco 「Implementing Cisco NAC Appliance」
問題と解答:全60問

IT-Passports.comは専門的なIT認証サイトで、成功率が100パーセントです。これは多くの受験生に証明されたことです。IT-Passports.comにはIT専門家が組み立てられた団体があります。彼らは受験生の皆さんの重要な利益が保障できるように専門的な知識と豊富な経験を活かして特別に適用性が強いトレーニング資料を研究します。その資料が即ちCiscoの642-591試験トレーニング資料で、問題集と解答に含まれていますから。

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/642-591.html

NO.1 After you implement a network scan and view the report, you notice that
access any of its dependent plug
A.enable the Dependent Plug
B.configure dependent plug
rule
C.ins
D.load the dependent plug
Correct:D
Green choice6
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
machines, what is the next step after configuring check
A.retrieve updates
B.require the use of the Cisco NAA
C.configure session timeout and traffic policies
D.map rules to requirement
E.configure requirements
Correct:E
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
drop-down field shown in the exhibit?
A.the authenticating NAS
B.the authorizing NAM
C.the name of the ISP
D.the external authenticating server
Correct:D
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
A.IP-based
B.peer-based
C.host-based
D.manager-
E.server-based
F.VLAN-based
Correct:A C
10.After you implement a network scan and view the report, you notice that
access any of its dependent plug
A.enable the Dependent Plug
B.configure dependent plug
rule
C.install dependent plug
D.load the dependent plug
Correct:D
Green choice6---->Yellow Choice3
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
machines, what is the next step after configuring check
A.retrieve updates
B.require the use of the Cisco NAA
C.configure session timeout and traffic policies
D.map rules to requirement
E.configure requirements
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
down field shown in the exhibit?
A.the authenticating NAS
B.the authorizing NAM
C.the name of the ISP
D.the external authenticating server
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
based
based
-based
based
based
Correct:A C
10.After you implement a network scan and view the report, you notice that
access any of its dependent plug
A.enable the Dependent Plug
B.configure dependent plug
tall dependent plug
D.load the dependent plug
>Yellow Choice3
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
machines, what is the next step after configuring check
B.require the use of the Cisco NAA
C.configure session timeout and traffic policies
D.map rules to requirement
E.configure requirements
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
down field shown in the exhibit?
A.the authenticating NAS
D.the external authenticating server
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
10.After you implement a network scan and view the report, you notice that
access any of its dependent plug
A.enable the Dependent Plug-in check box on the General Tab form
B.configure dependent plug-in support when you mapped the Nessus scan check to the Nessus plug
tall dependent plug-ins when you updated the Cisco NAC Appliance plug
D.load the dependent plug-ins for that plug
>Yellow Choice3
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
machines, what is the next step after configuring check
B.require the use of the Cisco NAA
C.configure session timeout and traffic policies
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
down field shown in the exhibit?
D.the external authenticating server
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
10.After you implement a network scan and view the report, you notice that
access any of its dependent plug-ins. What did you forget to do?
in check box on the General Tab form
in support when you mapped the Nessus scan check to the Nessus plug
ins when you updated the Cisco NAC Appliance plug
ins for that plug-in in the Plug
The safer , easier way to help you pass any IT exams.
4 / 5
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
machines, what is the next step after configuring check
C.configure session timeout and traffic policies
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
10.After you implement a network scan and view the report, you notice that
ins. What did you forget to do?
in check box on the General Tab form
in support when you mapped the Nessus scan check to the Nessus plug
ins when you updated the Cisco NAC Appliance plug
in in the Plug-in Updates form
The safer , easier way to help you pass any IT exams.
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
machines, what is the next step after configuring checks and rules?
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
10.After you implement a network scan and view the report, you notice that
ins. What did you forget to do?
in check box on the General Tab form
in support when you mapped the Nessus scan check to the Nessus plug
ins when you updated the Cisco NAC Appliance plug
in Updates form
The safer , easier way to help you pass any IT exams.
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
s and rules?
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
10.After you implement a network scan and view the report, you notice that
in support when you mapped the Nessus scan check to the Nessus plug
ins when you updated the Cisco NAC Appliance plug-in library
in Updates form
The safer , easier way to help you pass any IT exams.
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
8.Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
end user is
prompted for a username, password, and provider. What should be entered in the Provider
9.What are the two types of traffic policies that apply to user roles? (Choose two.)
10.After you implement a network scan and view the report, you notice that a plug
in support when you mapped the Nessus scan check to the Nessus plug
in library
The safer , easier way to help you pass any IT exams.
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
end user is
prompted for a username, password, and provider. What should be entered in the Provider
a plug-in did not
in support when you mapped the Nessus scan check to the Nessus plug-in
7.When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
end user is
prompted for a username, password, and provider. What should be entered in the Provider
in did not
in

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.2 Which three components comprise a Cisco NAC Appliance solution? (Choose three.)
A.a NAC-enabled Cisco router
B.a Linux server for in-band or out-of-band network admission control
C.a Linux server for centralized management of network admission servers
D.a Cisco router to provide VPN services
E.a read-only client operating on an endpoint device
F.a NAC-enabled Cisco switch
Correct:B C E

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.3 Drop
Correct:
Green choice1---->Yellow Choice6
Green choice2---->Yellow Choice4
Green choice3---->Yellow Choice5
Green choice4---->Yellow Choice1
Green choice5---->Yellow Choice2
Green choice6

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.4 What are the two types of traffic policies that apply to user roles? (Choose two.)
A.IP
B.peer
C.host
D.manager
E.server
F.VLAN
Correct:A C

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.5 When configuring the Cisco NAM to implement Cisco NAA requirement checking on client
machines, what is the next step after configuring check
A.retrieve updates
B.require the use of the Cisco NAA
C.configure session timeout and traffic policies
D.map rules to requirement
E.configure requirements
Correct:E

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.6 Refer to the exhibit. When logging in to a Cisco NAC Appliance solution, an
prompted for a username, password, and provider. What should be entered in the Provider
drop
A.the authenticating NAS
B.the authorizing NAM
C.the name of the ISP
D.the external authenticating server
Correct:D

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.7 Drop
Correct:
Green choice1---->Yellow Choice3
Green choice6---->Yellow Choice2
Green choice4---->Yellow Choice1

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.8 What is the result when the condition statement in a Cisco NAA check for required software
evaluates to false on a client machine?
A.The required software is automatically downloaded to the user device.
B.The required software is made available after the user is quarantined.
C.The user is put in the unauthenticated role and the software is considered missing.
D.The user is placed in the temporary role and the software is made available.
Correct:B

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.9 Which default administrator group has delete permissions?
A.admin
B.help-desk
C.add-edit
D.full-control
Correct:D

Cisco   642-591問題集   642-591問題集   642-591認定資格

NO.10 The NAS is configured to autogenerate an IP address pool of 30 subnets with a netmask of /30,
beginning at address 192.168.10.0. Which IP address is leased to the end-user host on the second
subnet?
A.192.168.10.4
B.192.168.10.5
C.192.168.10.6
D.192.168.10.7
Correct:C

Cisco   642-591問題集   642-591問題集   642-591認定資格

IT-Passports.comのCiscoの642-591試験問題資料は質が良くて値段が安い製品です。我々は低い価格と高品質の模擬問題で受験生の皆様に捧げています。我々は心からあなたが首尾よく試験に合格することを願っています。あなたに便利なオンラインサービスを提供して、Cisco 642-591試験問題についての全ての質問を解決して差し上げます。

Ciscoの640-553認定試験の対応性問題集

Ciscoの640-553の認定試験に合格すれば、就職機会が多くなります。この試験に合格すれば君の専門知識がとても強いを証明し得ます。Ciscoの640-553の認定試験は君の実力を考察するテストでございます。

同じ目的を達成するためにいろいろな方法があって、多くの人がいい仕事とすばらしい生活を人生の目的にしています。IT-Passports.comが提供した研修ツールはCiscoの640-553の認定試験に向けて学習資料やシミュレーション訓練宿題で、重要なのは試験に近い練習問題と解答を提供いたします。IT-Passports.com を選ばれば短時間にITの知識を身につけることができて、高い点数をとられます。

試験番号:640-553問題集
試験科目:Cisco 「IINS Implementing Cisco IOS Network Security」
問題と解答:全177問

IT-Passports.comはあなたが完全に信頼できるウェブサイトです。受験生の皆さんをもっと効率的な参考資料を勉強させるように、IT-Passports.comのIT技術者はずっとさまざまなIT認定試験の研究に取り組んでいますから、もっと多くの素晴らしい資料を開発し出します。一度IT-Passports.comの640-553問題集を使用すると、きっと二度目を使用したいです。IT-Passports.comは最高の640-553資料を提供するだけでなく、高品質のサービスも提供します。私達の資料についてどんなアドバイスがあってもお気軽に言ってください。受験生の皆さんを試験に合格させることを旨とするだけでなく、皆さんに最高のサービスを提供することも目標としています。

あなたのキャリアでいくつかの輝かしい業績を行うことを望まないのですか。きっとそれを望んでいるでしょう。では、常に自分自身をアップグレードする必要があります。では、IT業種で仕事しているあなたはどうやって自分のレベルを高めるべきですか。実は、640-553認定試験を受験して認証資格を取るのは一つの良い方法です。Ciscoの認定試験の640-553資格は非常に大切なものですから、Ciscoの試験を受ける人もますます多くなっています。

640-553認証試験に合格することは他の世界の有名な認証に合格して国際の承認と受け入れを取ることと同じです。640-553認定試験もIT領域の幅広い認証を取得しました。世界各地で640-553試験に受かることを通じて自分のキャリアをもっと向上させる人々がたくさんいます。IT-Passports.comで、あなたは自分に向いている製品をどちらでも選べます。

Ciscoの640-553認定試験を受験するあなたは、試験に合格する自信を持たないですか。それでも恐れることはありません。IT-Passports.comは640-553認定試験に対する最高な問題集を提供してあげますから。IT-Passports.comの 640-553問題集は最新で最全面的な資料ですから、きっと試験に受かる勇気と自信を与えられます。これは多くの受験生に証明された事実です。

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/640-553.html

NO.1 You are a network technician at Cisco.com. Which description is correct when you have generated RSA
keys on your Cisco router to prepare for secure device management?
A. All vty ports are automatically enabled for SSH to provide secure management.
B. The SSH protocol is automatically enabled.
C. You must then zeroize the keys to reset secure shell before configuring other parameters.
D. You must then specify the general-purpose key size used for authentication with the crypto key
generate rsa general-keys modulus command.
Answer: B

Cisco   640-553認証試験   640-553   640-553認証試験

NO.2 When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?
A. A period of time when no one is attempting to log in
B. The period of time in which virtual logins are blocked as security services fully initialize
C. The period of time in which virtual login attempts are blocked, following repeated failed login attempts
D. The period of time between successive login attempts
Answer: C

Cisco   640-553   640-553過去問   640-553

NO.3 Which one is the most important based on the following common elements of a network design?
A. Business needs
B. Best practices
C. Risk analysis
D. Security policy
Answer: A

Cisco過去問   640-553練習問題   640-553練習問題   640-553   640-553練習問題

NO.4 Which is the main difference between host-based and network-based intrusion prevention?
A. Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
B. Host-based IPS can work in promiscuous mode or inline mode.
C. Network-based IPS can provide protection to desktops and servers without the need of installing
specialized software on the end hosts and servers.
D. Host-based IPS deployment requires less planning than network-based IPS.
Answer: C

Cisco   640-553認定試験   640-553練習問題

NO.5 Which three items are Cisco best-practice recommendations for securing a network? (Choose three.)
A. Deploy HIPS software on all end-user workstations.
B. Routinely apply patches to operating systems and applications.
C. Disable unneeded services and ports on hosts.
D. Require strong passwords, and enable password expiration.
Answer: BCD

Cisco問題集   640-553認証試験   640-553認定資格

NO.6 How does CLI view differ from a privilege level?
A. A CLI view supports only commands configured for that specific view, whereas a privilege level
supports commands available to that level and all the lower levels.
B. A CLI view supports only monitoring commands, whereas a privilege level allows a user to make
changes to an IOS configuration.
C. A CLI view and a privilege level perform the same function. However, a CLI view is used on a Catalyst
switch, whereas a privilege level is used on an IOS router.
D. A CLI view can function without a AAA configuration, whereas a privilege level requires AAA to be
configured.
Answer: A

Cisco参考書   640-553問題集   640-553

NO.7 Which statement is true about a Smurf attack?
A. It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a target
system.
B. It intercepts the third step in a TCP three-way handshake to hijack a session.
C. It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can be
used to launch a coordinated DDoS attack.
D. It sends ping requests in segments of an invalid size.
Answer: A

Cisco   640-553参考書   640-553認定資格   640-553

NO.8 As a network engineer at Cisco.com, you are responsible for Cisco network. Which will be necessarily
taken into consideration when implementing Syslogging in your network?
A. Log all messages to the system buffer so that they can be displayed when accessing the router.
B. Use SSH to access your Syslog information.
C. Enable the highest level of Syslogging available to ensure you log all possible event messages.
D. Syncronize clocks on the network with a protocol such as Network Time Protocol.
Answer: D

Cisco認定試験   640-553認定試験   640-553練習問題   640-553

NO.9 Given the exhibit below. You are a network manager of your company. You are reading your Syslog
server reports. On the basis of the Syslog message shown, which two descriptions are correct? (Choose
two.)
A. This message is a level 5 notification message.
B. This message is unimportant and can be ignored.
C. This is a normal system-generated information message and does not require further investigation.
D. Service timestamps have been globally enabled
Answer: AD

Cisco問題集   640-553認定資格   640-553   640-553

NO.10 As a candidate for CCNA examination, when you are familiar with the basic commands, if you input the
command "enable secret level 5 password" in the global mode , what does it indicate?
A. Set the enable secret command to privilege level 5.
B. The enable secret password is hashed using SHA.
C. The enable secret password is hashed using MD5.
D. The enable secret password is encrypted using Cisco proprietary level 5 encryption.
E. The enable secret password is for accessing exec privilege level 5.
Answer: E

Cisco   640-553   640-553   640-553

NO.11 For the following attempts, which one is to ensure that no one employee becomes a pervasive security
threat, that data can be recovered from backups, and that information system changes do not
compromise a system's security?
A. Disaster recovery
B. Strategic security planning
C. Implementation security
D. Operations security
Answer: D

Cisco過去問   640-553   640-553

NO.12 Examine the following items, which one offers a variety of security solutions, including firewall, IPS,
VPN, antispyware, antivirus, and antiphishing features?
A. Cisco 4200 series IPS appliance
B. Cisco ASA 5500 series security appliance
C. Cisco IOS router
D. Cisco PIX 500 series security appliance
Answer: B

Cisco   640-553認定資格   640-553   640-553認証試験

NO.13 Which result is of securing the Cisco IOS image by use of the Cisco IOS image resilience feature?
A. When the router boots up, the Cisco IOS image will be loaded from a secured FTP location.
B. The Cisco IOS image file will not be visible in the output from the show flash command.
C. The show version command will not show the Cisco IOS image file location.
D. The running Cisco IOS image will be encrypted and then automatically backed up to a TFTP server.
Answer: B

Cisco   640-553問題集   640-553認定資格

NO.14 Which method is of gaining access to a system that bypasses normal security measures?
A. Creating a back door
B. Starting a Smurf attack
C. Conducting social engineering
D. Launching a DoS attack
Answer: A

Cisco問題集   640-553   640-553認定資格

NO.15 For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM
wizard that performs similar configuration functions?
A. setup exec command and the SDM Security Audit wizard
B. auto secure exec command and the SDM One-Step Lockdown wizard
C. aaa configuration commands and the SDM Basic Firewall wizard
D. Cisco Common Classification Policy Language configuration commands and the SDM Site-to-Site
VPN wizard
Answer: B

Cisco認定証   640-553認定資格   640-553認証試験   640-553練習問題   640-553練習問題

NO.16 The enable secret password appears as an MD5 hash in a router's configuration file, whereas the
enable password is not hashed (or encrypted, if the password-encryption
service is not enabled). What is the reason that Cisco still support the use of both enable secret and
enable passwords in a router's configuration?
A. The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE
Phase II.
B. The enable password is considered to be a router's public key, whereas the enable secret password is
considered to be a router's private key.
C. Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable
password is used to match the password that
was entered, and the enable secret is used to verify that the enable password has not been modified
since the hash was generated.
D. The enable password is present for backward compatibility.
Answer: D

Cisco参考書   640-553過去問   640-553   640-553

NO.17 How do you define the authentication method that will be used with AAA?
A. With a method list
B. With the method command
C. With the method aaa command
D. With a method statement
Answer: A

Cisco認証試験   640-553過去問   640-553認証試験   640-553   640-553   640-553

NO.18 Which three statements are valid SDM configuration wizards? (Choose three.)
A. Security Audit
B. VPN
C. STP
D. NAT
Answer: ABD

Cisco認証試験   640-553   640-553

NO.19 Which classes does the U.S. government place classified data into.? (Choose three.)
A. SBU
B. Confidential
C. Secret
D. Top-secret
Answer: BCD

Cisco問題集   640-553練習問題   640-553問題集   640-553

NO.20 Which three options are network evaluation techniques? (Choose three.)
A. Scanning a network for active IP addresses and open ports on those IP addresses
B. Using password-cracking utilities
C. Performing end-user training on the use of antispyware software
D. Performing virus scans
Answer: ABD

Cisco   640-553認証試験   640-553認定証   640-553

現在の社会で人材があちこちいます。IT領域でも同じです。コンピュータの普及につれて、パソコンを使えない人がほとんどいなくなります。ですから、IT業界で勤めているあなたはプレッシャーを感じていませんか。学歴はどんなに高くてもあなたの実力を代表できません。学歴はただ踏み台だけで、あなたの地位を確保できる礎は実力です。IT職員としているあなたがどうやって自分自身の実力を養うのですか。IT認定試験を受験するのは一つの良い方法です。640-553試験を通して、あなたは新しいスキルをマスターすることができるだけでなく、640-553認証資格を取得して自分の高い能力を証明することもできます。最近、Cisco 640-553試験の認証資格がとても人気があるようになりましたが、受験したいですか。

Cisco 642-655認定試験に合格できる機会を逃さぬ

IT-Passports.comは毎日24時間オンラインに顧客に対してサービスを提供するアフターサービスはとても良いサイトでございます。最新な情報を1年間に無料にアップデートしております。少ないお金をかかって、一回に合格しましょう。IT-Passports.comの問題集は最大のお得だね!

従来の試験によってIT-Passports.com が今年のCiscoの642-655認定試験を予測してもっとも真実に近い問題集を研究し続けます。IT-Passports.comは100%でCiscoの642-655認定試験に合格するのを保証いたします。

Ciscoの642-655の認定試験の受験生は試験に合格することが難しいというのをよく知っています。しかし、試験に合格することが成功への唯一の道ですから、試験を受けることを選ばなければなりません。職業価値を高めるために、あなたは認定試験に合格する必要があります。IT-Passports.comが開発された試験の問題と解答は異なるターゲットに含まれていますし、カバー率が高いですから、それを超える書籍や資料が絶対ありません。大勢の人たちの利用結果によると、IT-Passports.comの合格率は100パーセントに達したのですから、絶対あなたが試験を受かることに重要な助けになれます。IT-Passports.comは唯一のあなたの向いている試験に合格する方法で、IT-Passports.comを選んだら、美しい未来を選んだということになります。

関連する研究資料によって、Ciscoの642-655認定試験は非常に難しいです。でも、心配することはないですよ。IT-Passports.comがありますから。IT-Passports.comには豊富な経験を持っているIT業種の専門家が組み立てられた団体があって、彼らは長年の研究をして、最も先進的なCiscoの642-655試験トレーニング資料を作成しました。資料は問題集と解答が含まれています。IT-Passports.comはあなたが試験に合格するために一番適用なソースサイトです。IT-Passports.comのCiscoの642-655試験トレーニング資料を選んだら、あなたの試験に大きなヘルプをもたらせます。

試験番号:642-655問題集
試験科目:Cisco 「WAASFE-Wide Area Application Services for Field Engineers」
問題と解答:全75問

もう既にCiscoの642-655認定試験を申し込みましたか。「もうすぐ試験の時間なのに、まだ試験に合格する自信を持っていないですが、どうしたらいいでしょうか。何か試験に合格するショートカットがあるのですか。試験参考書を読み終わる時間も足りないですから・・・」いまこのような気持ちがありますか。そうしても焦らないでくださいよ。試験を目前に控えても、ちゃんと試験に準備するチャンスもあります。何のチャンスですかと聞きたいでしょう。それはIT-Passports.comの642-655問題集です。これは効果的な資料で、あなたを短時間で試験に十分に準備させることができます。この問題集の的中率がとても高いですから、問題集に出るすべての問題と回答を覚える限り、642-655認定試験に合格することができます。

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/642-655.html

NO.1 What important troubleshooting information will you draw for the Video Accelerator from the
WAE#show stat accelerator video?
A. Whether or not the WAE(Config)#accelerator video enable command has been issued
B. Troubleshooting of the Video Accelerator can only be done through the Central Manager GUI
C. The total Non-Windows Media and Non-Live Video Streams
D. The license status of the Video Accelerator
Answer: C

Cisco認定資格   642-655   642-655   642-655   642-655参考書

NO.2 Which setting should be used in the "Boot from" filed in the virtual blade configuration when an
operating system is first installed through an CD ISO image onto a virtual blade?
A. /local1/vbs/win2k8.iso
B. WAAS /local1/loca/vb folder
C. Floppy Disk
D. CD-ROM
E. hard disk
Answer: D

Cisco認証試験   642-655認証試験   642-655認定資格   642-655

NO.3 Within Windows Server on WAAS, what are the Cisco-supported features? (Choose all that apply)
A. Active Directory
B. DNS
C. Windows Printing
D. DHCP
E. Internet Explorer
F. FTP services
G. Windows Media Streaming
Answer: ABCD

Cisco   642-655   642-655   642-655   642-655   642-655

NO.4 How to verify that the WAE has joined a Microsoft Windows domain correctly?
A. Click the Show Authentication Status button in Central Manager
B. Use the Windowsnetstat command
C. Use the Windowsnbtstat command
D. Execute the show windows-domain command on the WAE
Answer: A

Cisco練習問題   642-655認定試験   642-655認定資格   642-655認定資格   642-655問題集   642-655

NO.5 In which two ways will you register and activate a WAE to the Central Manager? (Choose two.)
A. WAE(Config)#cms enable do active
B. The auto-activate icon in the Central Manager
C. WAE(Config)#cms enable
D. The quickstart setup procedure
Answer: CD

Cisco   642-655認定資格   642-655認定証   642-655

NO.6 Exhibit:
You work as a network engineer at Your company. You study the exhibit carefully.When troubleshooting
video licensing on a WAE, this Central Manager output is displayed.
Which two steps should be taken to enable the video license? (Choose two.)
A. Restart the WAE
B. Select the Enterprise Check Box
C. Select the Video Check Box
D. Select the Virtual-Blade Check Box
Answer: BC

Cisco   642-655認定証   642-655認定資格   642-655   642-655参考書

NO.7 Which command verifies that a WAE in-line card is intercepting traffic from the correct VLANs?
A. show wccp services
B. show wccp vlans inline
C. show int inlinegroup x/y
D. show ip access-lists
Answer: C

Cisco   642-655   642-655   642-655認証試験

NO.8 Exhibit:
Based on the following exhibit. Which two are the possible reasons the CORE1 WAE might be displayed
as "Offline"?
A. The Central Manager service is disabled
B. The WAE is powered off
C. The WAE is configured in the same VLAN as the server nodes
D. The HTTPS service is disabled
Answer: AB

Cisco   642-655   642-655   642-655練習問題

NO.9 How many baseline device groups can be configured for the acceleration feature set?
A. Three
B. One
C. As many as needed
D. Two
Answer: B

Cisco認定証   642-655練習問題   642-655認定資格   642-655

NO.10 How to monitor optimization statistics for a given application across multiple WAE devices?
A. Create a separate application traffic policy for each application
B. Create a location group for all WAE devices on which that application is optimized
C. Ensure that each application resides on a different subnet
D. Create a device group for all WAE devices on which that application is optimized
Answer: D

Cisco   642-655   642-655認定証   642-655

NO.11 Exhibit:
You work as a network engineer at Your company. You study the exhibit carefully.
A WAE in your environment is experiencing no HTTP acceleration. What is the problem according to the
output from the Central Manager?
A. HTTP and Video Accelerators cannot be enabled at the same time
B. The HTTP Accelerator is not enabled
C. DRE eliminates all need for HTTP acceleration
D. The Enterprise license is not installed
Answer: B

Cisco   642-655認定証   642-655問題集

NO.12 The Cisco WAE Appliances provide a unified platform for hosting Cisco application acceleration and
WAN optimization solutions. Your customer complains that traffic has never been received by the remote
WAE device after deploying Cisco WAAS by use of WCCPv2 in an off-path configuration. Which two
parameters should be verified? (Choose two.)
A. Routing Configuration
B. Router IP Address
C. WCCP Status
D. Service group redirection
Answer: CD

Cisco認証試験   642-655   642-655

NO.13 Exhibit:
You work as a network engineer at Your company. You study the exhibit carefully.
The following diagram displays the Cisco WAAS configuration for your customer. Which WCCPv2
interception configuration should be applied to interface Serial0?
A. Redirect in / service group 62
B. Redirect out / service group 62
C. Redirect in / service group 61
D. Redirect out/service group 61
Answer: A

Cisco   642-655練習問題   642-655練習問題   642-655   642-655練習問題   642-655

NO.14 Which three must be configured when you configure an edge print queue? (Choose three.)
A. WAFS edge service
B. EPM Policy
C. Printer Name
D. device URL
Answer: ACD

Cisco   642-655   642-655

NO.15 Your customer has recently completed a large expansion of one of their regional offices. They have
discovered that the WAE-512-2GB Edge WAE in that office has begun passing through some TCP
connections without optimizing those connections. What two actions would solve the problem? (Choose
two.)
A. Add more memory to the WAE
B. Add another WAE-512 edge WAE
C. Upgrade to a WAE-612 or WAE-7326
D. Bundle the WAE interfaces into a PortChannel
Answer: BC

Cisco参考書   642-655   642-655認定証   642-655   642-655

IT-Passports.comが提供した問題集をショッピングカートに入れて100分の自信で試験に参加して、成功を楽しんで、一回だけCiscoの642-655試験に合格するのが君は絶対後悔はしません。

最高のCiscoの646-671認定試験問題集

Ciscoの646-671試験の準備をしていたら、IT-Passports.comは貴方が夢を実現することにヘルプを与えます。 IT-Passports.comのCiscoの646-671試験トレーニング資料は高品質のトレーニング資料で、100パーセントの合格率を保証できます。もしあなたが適当な時間を持って勉強できるのなら、IT-Passports.comのCiscoの646-671試験トレーニング資料を選びましょう。この資料を手に入れたら、楽に試験の準備をすることができます。

IT-Passports.comのCiscoの646-671試験資料は同じシラバスに従って研究されたのです。それに、資料もずっとアップグレードしていますから、実際の試験問題とよく似ています。IT-Passports.comの試験合格率も非常に高いことは否定することができない事実です。IT-Passports.comのCiscoの646-671試験トレーニング資料の値段は手頃で、IT認証の受験生のみなさんによく適用します。

もう既にCiscoの646-671認定試験を申し込みましたか。「もうすぐ試験の時間なのに、まだ試験に合格する自信を持っていないですが、どうしたらいいでしょうか。何か試験に合格するショートカットがあるのですか。試験参考書を読み終わる時間も足りないですから・・・」いまこのような気持ちがありますか。そうしても焦らないでくださいよ。試験を目前に控えても、ちゃんと試験に準備するチャンスもあります。何のチャンスですかと聞きたいでしょう。それはIT-Passports.comの646-671問題集です。これは効果的な資料で、あなたを短時間で試験に十分に準備させることができます。この問題集の的中率がとても高いですから、問題集に出るすべての問題と回答を覚える限り、646-671認定試験に合格することができます。

IT-Passports.comの646-671 問題集はあなたが646-671認定試験に準備するときに最も欠かせない資料です。この問題集の価値は試験に関連する他の参考書の総合の価値に相当します。このアサーションは過言ではありません。IT-Passports.comの問題集を利用してからこのすべてが真であることがわかります。

試験番号:646-671問題集
試験科目:Cisco 「Advanced Wireless LAN for Account Managers」
問題と解答:全97問

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/646-671.html

NO.1 The CIO of a small, commercial company wants to learn about the cost benefits of enabling
voice-over-Wi-Fi services. How do you describe the service to him?
Select the best response.
A. Voice-over-Wi-Fi that is integrated into the wired network allows a single control point to guarantee the
quality of the call, regardless of the transport over which the call is carried. This leads to significant cost
savings.
B. Voice-over-Wi-Fi provides continued cost savings through the convergence of communications
devices.
C. With voice-over-Wi-Fi, the Cisco Unified wireless solution supports quality of service.
D. With voice-over-Wi-Fi, the telephony system recognizes Wi-Fi handsets in the same way that it
recognizes traditional desktop phones, which allows employees to make and receive calls when they are
mobile.
Answer: B

Cisco   646-671認定試験   646-671

NO.2 Ray Thomas, a global sales manager at a mid-sized, commercial company, is on his way from the
conference room to his office. At the same time, a client who wants to complete a large business
transaction with Ray's company is trying to reach Ray by phone. The Cisco Unified Communications
System determines that Ray is not at his desk and automatically routes the call to his current location.
Ray accepts the call while walking back to his office. After he arrives, he transparently transfers the call to
his desk phone, freeing his hands to access the information on his computer to complete the transaction.
Which of the following services enables this scenario?
Select the best response.
A. location-based services
B. voice-over-Wi-Fi
C. guest access
D. Intrusion Protection Services
Answer: B

Cisco   646-671過去問   646-671

NO.3 A growing retail company with 600 employees is considering a Cisco Unified Wireless Network solution.
In meeting with many members of the executive team, you have learned that the main concern of the
company is the lack of time that the sales staff has on the sales floor to interact with customers because
of time spent doing inventory management. Which of the following is the most appropriate point to focus
on when proposing a Cisco Unified Wireless Network solution to the executive team of the company?
Select the best response.
A. With the Cisco solution, you can provide voice-over-Wi-Fi phones to all your staff for free, which
improves their productivity, allowing them to spend more time with customers.
B. With the Cisco solution, you can enable mobile applications, which provide tangible cost savings and
return on investment (ROI) through improved productivity.
C. The Cisco solution allows sales staff to do inventory ordering right at the product shelf, which increases
the opportunities for customer interactions and raises the possibility of higher sales.
D. The Cisco solution enables improved productivity due to mobility, which leads to quicker inventory
management.
Answer: C

Cisco認定証   646-671認定証   646-671   646-671問題集

NO.4 Which two components would you find in a WLAN? (Choose two.)
Select 2 response(s).
A. fiber-optic cabling
B. access points
C. high-speed satellite transmissions
D. client adapters
E. MPLS Networks
Answer: BD

Cisco   646-671   646-671

NO.5 Which three of the following are technology components of the Cisco Unified Wireless Network?
(Choose three.)
Select 3 response(s).
A. unified advanced services
B. Self-Defending Network
C. network fault management
D. mobility platform
E. network management
F. wireless handsets
Answer: ADE

Cisco認証試験   646-671   646-671   646-671

NO.6 A small healthcare facility often misplaces expensive assets, such as IV pumps and wheelchairs. To
solve this problem, the facility placed Radio Frequency Identification (RFID) tags on its valuable property.
Now when pieces of equipment are missing, employees can determine their exact location within minutes
using a Cisco Wireless Control System management interface.
Which of the following services enables this scenario?
Select the best response.
A. enhanced security
B. Voice over Wi-Fi
C. location-based services
D. WCS mapping and tracking
Answer: C

Cisco   646-671認定資格   646-671   646-671

NO.7 An enterprise company hires a management consultant, Mary Hunt, to improve corporate
knowledge-management systems. The role requires her to be highly mobile within the enterprise as she
gathers information from a variety of employees. When Mary is back at her desk, she must compare her
new data with the data hosted on the corporate servers. After she logs in, the network recognizes her
consultant status and allocates her the appropriate access rights.
Which of the following enables this scenario?
Select the best response.
A. location-based services
B. guest access
C. enhanced security
D. network admission control (NAC)
Answer: B

Cisco   646-671   646-671過去問   646-671

NO.8 Which two of the following are primary benefits of voice-over-Wi-Fi services? (Choose two.)
Select 2 response(s).
A. reduced cellular phone costs
B. reduced cost of replacing lost assets
C. increased employee productivity
D. a single profile across all network types
E. enhanced 911 services for tracking cellular users
Answer: AC

Cisco   646-671   646-671

NO.9 A growing retail company needs to become PCI-compliant. Which of the following services enables
this?
Select the best response.
A. location-based services
B. voice-over-Wi-Fi
C. enhanced security
D. RFID asset tracking services
Answer: C

Cisco   646-671   646-671   646-671認証試験

NO.10 Which three of the following benefits are the primary benefits of location-based services? (Choose
three.)
Select 3 response(s).
A. reduced cellular phone costs
B. increased employee productivity
C. reduced cost of replacing lost assets
D. streamlined business processes
E. a single profile across all network types
F. Radio Resource Management
Answer: BCD

Cisco参考書   646-671   646-671認定試験   646-671認定証

Ciscoの646-671認定試験を受験する気があるのですか。この試験を受けた身の回りの人がきっと多くいるでしょう。これは非常に大切な試験で、試験に合格して646-671認証資格を取ると、あなたは多くのメリットを得られますから。では、他の人を頼んで試験に合格する対策を教えてもらったのですか。試験に準備する方法が色々ありますが、最も高効率なのは、きっと良いツールを利用することですね。ところで、あなたにとってどんなツールが良いと言えるのですか。もちろんIT-Passports.comの646-671問題集です。

評判のCisco 642-813認定試験の問題集

IT-Passports.comに提供されている資料はIT認定試験に対して10年過ぎの経験を持っているプロフェッショナルによって研究と実践を通じて作成し出されたものです。IT-Passports.comは最新かつ最も正確な試験642-813問題集を用意しておきます。IT-Passports.comは皆さんの成功のために存在しているものですから、IT-Passports.comを選択することは成功を選択するのと同じです。順調にIT認定試験に合格したいなら、IT-Passports.comはあなたの唯一の選択です。

あなたに最大の利便性を与えるために、IT-Passports.comは様々なバージョンの教材を用意しておきます。PDF版の642-813問題集は読みやすくて、忠実に試験の問題を再現することができます。テストエンジンとして、ソフトウェア版の642-813問題集はあなたの試験の準備についての進捗状況をテストするために利用することができます。もし試験の準備を十分にしたかどうかを確認したいなら、ソフトウェア版の642-813問題集を利用して自分のレベルをテストしてください。従って、すぐに自分の弱点や欠点を識別することができ、正しく次の642-813学習内容を手配することもできます。

インターネットで高品質かつ最新のCiscoの642-813の試験の資料を提供していると言うサイトがたくさんあります。が、サイトに相関する依頼できる保証が何一つありません。ここで私が言いたいのはIT-Passports.comのコアバリューです。すべてのCiscoの642-813試験は非常に重要ですが、こんな情報技術が急速に発展している時代に、IT-Passports.comはただその中の一つです。では、なぜ受験生たちはほとんどIT-Passports.comを選んだのですか。それはIT-Passports.comが提供した試験問題資料は絶対あなたが試験に合格することを保証しますから。なんでそうやって言ったのはIT-Passports.comが提供した試験問題資料は最新な資料ですから。それも受験生たちが実践を通して証明したことです。

IT-Passports.comのCiscoの642-813試験トレーニング資料は全てのオンラインのトレーニング資料で一番よいものです。我々の知名度はとても高いです。これは受験生の皆さんが資料を利用した後の結果です。IT-Passports.comのCiscoの642-813試験トレーニング資料を選んだら、100パーセントの成功率を保証します。もし失敗だったら、我々は全額で返金します。受験生の皆さんの重要な利益が保障できるようにIT-Passports.comは絶対信頼できるものです。

全てのIT職員はCiscoの642-813試験をよく知っています。これは一般的に認められている最高級の認証で、あなたのキャリアにヘルプを与えられます。あなたはその認証を持っているのですか。Ciscoの642-813試験は非常に難しい試験ですが、IT-Passports.comのCiscoの642-813試験トレーニング資料を手に入れたら大丈夫です。試験が難しいと感じるのは良い方法を選択しないからです。IT-Passports.comを選んだら、成功の手を握ることがきるようになります。

君はほかのサイトや書籍もブラウズ するがもしれませんが、弊社の関連の学習資料と比較してからIT-Passports.comの商品の範囲が広くてまたネット上でダウンロードを発見してしまいました。IT-Passports.comだけ全面と高品質の問題集があるのではIT-Passports.comの専門家チームが彼らの長年のIT知識と豊富な経験で研究してしました。そして、IT-Passports.comに多くの受験生の歓迎されます。

試験番号:642-813問題集
試験科目:Cisco 「Implementing Cisco IP Switched Networks」
問題と解答:全227問

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/642-813.html

NO.1 What does the command udld reset accomplish?
A. allows a UDLD port to automatically reset when it has been shut down
B. resets all UDLD enabled ports that have been shut down
C. removes all UDLD configurations from interfaces that were globally enabled
D. removes all UDLD configurations from interfaces that were enabled per-port
Answer: B

Cisco   642-813認定証   642-813問題集   642-813認定試験   642-813

NO.2 Refer to the exhibit.
DHCP snooping is enabled for selected VLANs to provide security on the network. How do the switch
ports handle the DHCP messages?
A. A DHCPOFFER packet from a DHCP server received on Ports Fa2/1 and Fa2/2 is dropped.
B. A DHCP packet received on ports Fa2/1 and Fa2/2 is dropped if the source MAC address and the
DHCP client hardware address does not match Snooping database.
C. A DHCP packet received on ports Fa2/1 and Fa2/2 is forwarded without being tested.
D. A DHCPRELEASE message received on ports Fa2/1 and Fa2/2 has a MAC address in the DHCP
snooping binding database, but the interface information in the binding database does not match the
interface on which the message was received and is dropped.
Answer: C

Cisco認定証   642-813認定証   642-813

NO.3 Refer to the exhibit.
An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server
for a man-in-middle attack. Which recommendation, if followed, would mitigate this type of attack?
A. All switch ports in the Building Access block should be configured as DHCP trusted ports.
B. All switch ports in the Building Access block should be configured as DHCP untrusted ports.
C. All switch ports connecting to hosts in the Building Access block should be configured as DHCP trusted
ports.
D. All switch ports connecting to hosts in the Building Access block should be configured as DHCP
untrusted ports.
E. All switch ports in the Server Farm block should be configured as DHCP untrusted ports.
F. All switch ports connecting to servers in the Server Farm block should be configured as DHCP
untrusted ports.
Answer: D

Cisco認定試験   642-813   642-813   642-813   642-813

NO.4 Which statement is true about Layer 2 security threats?
A. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against
reconnaissance attacks that use Dynamic ARP Inspection to determine vulnerable attack points.
B. DHCP snooping sends unauthorized replies to DHCP queries.
C. ARP spoofing can be used to redirect traffic to counter Dynamic ARP Inspection.
D. Dynamic ARP Inspection in conjunction with ARP spoofing can be used to counter DHCP snooping
attacks.
E. MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
F. Port scanners are the most effective defense against Dynamic ARP Inspection.
Answer: E

Cisco過去問   642-813   642-813   642-813問題集   642-813

NO.5 Refer to the exhibit.
Assume that Switch_A is active for the standby group and the standby device has only the default HSRP
configuration. Which statement is true?
A. If port Fa1/1 on Switch_A goes down, the standby device takes over as active.
B. If the current standby device had the higher priority value, it would take over the role of active for the
HSRP group.
C. If port Fa1/1 on Switch_A goes down, the new priority value for the switch would be 190.
D. If Switch_A had the highest priority number, it would not take over as active router.
Answer: C

Cisco参考書   642-813過去問   642-813   642-813認定試験

NO.6 Refer to the exhibit.
The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security
reasons, the servers should not communicate with each other, although they are located on the same
subnet. However, the servers do need to communicate with a database server located in the inside
network. Which configuration isolates the servers from each other?
A. The switch ports 3/1 and 3/2 are defined as secondary VLAN isolated ports. The ports connecting to
the two firewalls are defined as primary VLAN promiscuous ports.
B. The switch ports 3/1 and 3/2 are defined as secondary VLAN community ports. The ports connecting to
the two firewalls are defined as primary VLAN promiscuous ports.
C. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls are defined as primary VLAN
promiscuous ports.
D. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls are defined as primary VLAN
community ports.
Answer: A

Cisco   642-813問題集   642-813練習問題

NO.7 What is one method that can be used to prevent VLAN hopping?
A. Configure ACLs.
B. Enforce username and password combinations.
C. Configure all frames with two 802.1Q headers.
D. Explicitly turn off DTP on all unused ports.
E. Configure VACLs.
Answer: D

Cisco   642-813   642-813練習問題   642-813認定試験   642-813

NO.8 When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather
information?
A. The attacking station uses DTP to negotiate trunking with a switch port and captures all traffic that is
allowed on the trunk.
B. The attacking station tags itself with all usable VLANs to capture data that is passed through the switch,
regardless of the VLAN to which the data belongs.
C. The attacking station generates frames with two 802.1Q headers to cause the switch to forward the
frames to a VLAN that would be inaccessible to the attacker through legitimate means.
D. The attacking station uses VTP to collect VLAN information that is sent out and then tags itself with the
domain information to capture the data.
Answer: A

Cisco過去問   642-813認定試験   642-813

NO.9 Refer to the exhibit.
Host A has sent an ARP message to the default gateway IP address 10.10.10.1. Which statement is true?
A. Because of the invalid timers that are configured, DSw1 does not reply.
B. DSw1 replies with the IP address of the next AVF.
C. DSw1 replies with the MAC address of the next AVF.
D. Because of the invalid timers that are configured, DSw2 does not reply.
E. DSw2 replies with the IP address of the next AVF.
F. DSw2 replies with the MAC address of the next AVF.
Answer: F

Cisco練習問題   642-813   642-813

NO.10 What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A. Place unused ports in a common VLAN.
B. Implement private VLANs.
C. Implement DHCP snooping.
D. Implement port security.
E. Implement VLAN access maps
Answer: DE

Cisco認定証   642-813   642-813過去問   642-813

NO.11 Refer to the exhibit.
Which VRRP statement about the roles of the master virtual router and the backup virtual router is true?
A. Router A is the master virtual router, and router B is the backup virtual router. When router A fails,
router B becomes the master virtual router. When router A recovers, router B maintains the role of master
virtual router.
B. Router A is the master virtual router, and router B is the backup virtual router. When router A fails,
router B becomes the master virtual router. When router A recovers, it regains the master virtual router
role.
C. Router B is the master virtual router, and router A is the backup virtual router. When router B fails,
router A becomes the master virtual router. When router B recovers, router A maintains the role of master
virtual router.
D. Router B is the master virtual router, and router A is the backup virtual router. When router B fails,
router A becomes the master virtual router. When router B recovers, it regains the master virtual router
role.
Answer: B

Cisco認定資格   642-813   642-813認証試験

NO.12 Refer to the exhibit.
Dynamic ARP Inspection is enabled only on switch SW_A. Host_A and Host_B acquire their IP addresses
from the DHCP server connected to switch SW_A. What would the outcome be if Host_B initiated an ARP
spoof attack toward Host_A ?
A. The spoof packets are inspected at the ingress port of switch SW_A and are permitted.
B. The spoof packets are inspected at the ingress port of switch SW_A and are dropped.
C. The spoof packets are not inspected at the ingress port of switch SW_A and are permitted.
D. The spoof packets are not inspected at the ingress port of switch SW_A and are dropped.
Answer: C

Cisco   642-813   642-813   642-813   642-813

NO.13 Which description correctly describes a MAC address flooding attack?
A. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking
device then becomes the destination address found in the Layer 2 frames sent by the valid network
device.
B. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking
device then becomes the source address found in the Layer 2 frames sent by the valid network device.
C. The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The
switch then forwards frames destined for the valid host to the attacking device.
D. The attacking device spoofs a source MAC address of a valid host currently in the CAM table.
The switch then forwards frames destined for the valid host to the attacking device.
E. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space.
The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.
F. Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space.
The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.
Answer: F

Cisco問題集   642-813過去問   642-813認証試験   642-813認定試験

NO.14 What does the global configuration command ip arp inspection vlan 10-12,15 accomplish?
A. validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15
B. intercepts all ARP requests and responses on trusted ports
C. intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings
D. discards ARP packets with invalid IP-to-MAC address bindings on trusted ports "Pass
Answer: C

Cisco   642-813   642-813参考書   642-813   642-813過去問   642-813認定証

NO.15 Which statement is true about RSTP topology changes?
A. Any change in the state of the port generates a TC BPDU.
B. Only nonedge ports moving to the forwarding state generate a TC BPDU.
C. If either an edge port or a nonedge port moves to a block state, then a TC BPDU is generated.
D. Only edge ports moving to the blocking state generate a TC BPDU.
E. Any loss of connectivity generates a TC BPDU.
Answer: B

Cisco認証試験   642-813   642-813

NO.16 Refer to the exhibit.
GLBP has been configured on the network. When the interface serial0/0/1 on router R1 goes down, how
is the traffic coming from Host1 handled?
A. The traffic coming from Host1 and Host2 is forwarded through router R2 with no disruption.
B. The traffic coming from Host2 is forwarded through router R2 with no disruption. Host1 sends an ARP
request to resolve the MAC address for the new virtual gateway.
C. The traffic coming from both hosts is temporarily interrupted while the switchover to make R2 active
occurs.
D. The traffic coming from Host2 is forwarded through router R2 with no disruption. The traffic from Host1
is dropped due to the disruption of the load balancing feature configured for the GLBP group.
Answer: A

Cisco   642-813認定試験   642-813   642-813練習問題

NO.17 Refer to the exhibit.
What information can be derived from the output?
A. Interfaces FastEthernet3/1 and FastEthernet3/2 are connected to devices that are sending BPDUs
with a superior root bridge parameter and no traffic is forwarded across the ports. After the sending of
BPDUs has stopped, the interfaces must be shut down administratively, and brought back up, to resume
normal operation.
B. Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a
superior root bridge parameter, but traffic is still forwarded across the ports.
C. Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a
superior root bridge parameter and no traffic is forwarded across the ports. After the inaccurate BPDUs
have been stopped, the interfaces automatically recover and resume normal operation.
D. Interfaces FastEthernet3/1 and FastEthernet3/2 are candidates for becoming the STP root port, but
neither can realize that role until BPDUs with a superior root bridge parameter are no longer received on
at least one of the interfaces.
Answer: C

Cisco認定証   642-813   642-813認定資格

NO.18 Refer to the exhibit.
Which four statements about this GLBP topology are true? (Choose four.)
A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If router A becomes unavailable, router B forwards packets sent to the virtual MAC address of router A.
C. If another router is added to this GLBP group, there would be two backup AVGs.
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B transitions from blocking state to forwarding state when it becomes the AVG.
Answer: ABDE

Cisco過去問   642-813   642-813認定証   642-813認証試験   642-813認証試験

NO.19 What two steps can be taken to help prevent VLAN hopping? (Choose two.)
A. Place unused ports in a common unrouted VLAN.
B. Enable BPDU guard.
C. Implement port security.
D. Prevent automatic trunk configurations.
E. Disable Cisco Discovery Protocol on ports where it is not necessary.
Answer: AD

Cisco認証試験   642-813練習問題   642-813

NO.20 Why is BPDU guard an effective way to prevent an unauthorized rogue switch from altering the
spanning-tree topology of a network?
A. BPDU guard can guarantee proper selection of the root bridge.
B. BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the
port.
C. BPDU guard can be utilized to prevent the switch from transmitting BPDUs and incorrectly altering the
root bridge election.
D. BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
Answer: B

Cisco認証試験   642-813   642-813認証試験   642-813

IT 職員のそれぞれは昇進または高給のために頑張っています。これも現代社会が圧力に満ちている一つの反映です。そのためにCiscoの642-813認定試験に受かる必要があります。適当なトレーニング資料を選んだらこの試験はそんなに難しくなくなります。IT-Passports.comのCiscoの642-813試験トレーニング資料は最高のトレーニング資料で、あなたの全てのニーズを満たすことができますから、速く行動しましょう。

Ciscoの642-437認定試験の復習問題集

君はまだCisco 642-437認証試験を通じての大きい難度が悩んでいますか? 君はまだCisco 642-437認証試験に合格するために寝食を忘れて頑張って復習しますか? 早くてCisco 642-437認証試験を通りたいですか?IT-Passports.comを選択しましょう!IT-Passports.comはきみのIT夢に向かって力になりますよ。

Ciscoの642-437試験にもっと首尾よく合格したいのですか。そうしたら速くIT-Passports.comを選びましょう。IT-Passports.comは様々なIT認証試験を受ける人々に正確な試験資料を提供するサイトです。IT-Passports.comはIT職員としてのあなたに昇進するチャンスを与えられます。IT-Passports.com が提供したCiscoの642-437試験に関する一部の無料の問題と解答を利用してみることができます。そうすると、我々の信頼性をテストできます。

試験番号:642-437問題集
試験科目:Cisco 「Implementing Cisco Unified Communications Voice over IP and QoS v8.0 (CVOICE v8.0)」
問題と解答:全146問

いまCiscoの642-437認定試験に関連する優れた資料を探すのに苦悩しているのですか。もうこれ以上悩む必要がないですよ。ここにはあなたが最も欲しいものがありますから。受験生の皆さんの要望に答えるように、IT-Passports.comは642-437認定試験を受験する人々のために特に効率のあがる勉強法を開発しました。受験生の皆さんはほとんど仕事しながら試験の準備をしているのですから、大変でしょう。試験に準備するときにはあまり多くの時間を無駄にすることを避けるように、IT-Passports.comは短時間の勉強をするだけで試験に合格することができる642-437問題集が用意されています。この問題集には実際の試験に出る可能性のあるすべての問題が含まれています。従って、この問題集を真面目に学ぶ限り、642-437認定試験に合格するのは難しいことではありません。

今の競争の激しいIT業界では、多くの認定試験の合格証明書が君にをとんとん拍子に出世するのを助けることができます。多くの会社は君の実力と昇進がその証明書によって判断します。Ciscoの642-437認証試験はIT業界の中で含金度高い試験で、IT-Passports.comがCiscoの642-437認証試験について対応性の訓練 を提供しておって、ネットで弊社が提供した部分の問題集をダウンロードしてください。

Ciscoの642-437の認定試験は当面いろいろな認証試験で最も価値がある試験の一つです。最近の数十年間で、コンピュータ科学の教育は世界各地の数多くの注目を得られています。Ciscoの642-437の認定試験はIT情報技術領域の欠くことができない一部ですから、IT領域の人々はこの試験認証に合格することを通じて自分自身の知識を増加して、他の分野で突破します。IT-Passports.comのCiscoの642-437認定試験の問題と解答はそういう人たちのニーズを答えるために研究した成果です。この試験に合格することがたやすいことではないですから、適切なショートカットを選択するのは成功することの必要です。IT-Passports.comはあなたの成功を助けるために存在しているのですから、IT-Passports.comを選ぶということは成功を選ぶのことと等しいです。IT-Passports.comが提供した問題と解答はIT領域のエリートたちが研究と実践を通じて開発されて、十年間過ぎのIT認証経験を持っています。

IT-Passports.comはCiscoの642-437試験に関する完全な資料を唯一のサービスを提供するサイトでございます。IT-Passports.comが提供した問題集を利用してCiscoの642-437試験は全然問題にならなくて、高い点数で合格できます。Cisco 642-437試験の合格のために、IT-Passports.comを選択してください。

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/642-437.html

NO.1 Refer to the exhibit.
A new Cisco Unified Communications Manager Express system has been deployed and the technician is
trying to add the first new IP phone to the system. The phone powers up, but it does not register with the
system. The technician has verified that the phone is getting the proper VLAN information from Cisco
Discovery Protocol. The phone is also getting the correct IP address and TFTP server address from
DHCP. The phone has been assigned to an ephone and the correct MAC address is configured. With the
information provided, which two of the following does the administrator need to verify to resolve this
situation? (Choose two.)
A. Verify that the ip helper-address is correctly configured.
B. Verify that telephony-service has been configured.
C. Verify that the ephone has a button assigned.
D. Verify that the tftp-server path has been configured.
E. Verify that the Cisco Unified Communications Manager Express service is running.
F. Verify that the correct phone type files are in the tftp-server path.
Answer: D,F

Cisco   642-437認定試験   642-437参考書   642-437過去問   642-437

NO.2 Which four types of ephone-dns are supported by SCCP in Cisco Unified Communications Manager
Express? (Choose four.)
A. single-line
B. dual-line
C. shared-line, nonexclusive
D. two directory numbers with one telephone number
E. dual-number
F. octo-line
Answer: A,B,E,F

Cisco   642-437   642-437

NO.3 Which three Cisco IOS commands are required to configure a voice gateway as a DHCP server to
support a data subnet with the IP address of 10.1.30.0/24 and a default gateway of 10.1.30.1/24?
(Choose three.)
A. ip dhcp pool
B. subnet 10.1.30.1 255.255.255.0
C. ip dhcp pool data
D. network 10.1.30.1/24
E. network 10.1.30.0 255.255.255.0
F. default-gw 10.1.30.1/24
G. default-router 10.1.30.1
Answer: C,E,G

Cisco   642-437問題集   642-437   642-437認証試験

NO.4 Which two statements are true regarding SCCP? (Choose two.)
A. SCCP requires each endpoint or gateway event to be communicated to Cisco Unified Communications
Manager.
B. Endpoints can operate autonomously if communication with Cisco Unified Communications Manager is
lost.
C. SCCP may interoperate with H.323 endpoints if it is implemented with Cisco Unified Communications
Manager.
D. Endpoints and gateways maintain the dial plan.
E. SCCP uses hex messages for communication.
Answer: A,C

Cisco   642-437問題集   642-437過去問   642-437過去問

NO.5 1.130.1/24. Which two elements of the configuration are missing from the command output and need
to be added so that phones do not auto-register, but can manually register with Cisco Unified
Communications Manager Express? (Choose two.)
A. ip address 10.1.130.1
B. no reg-ephone
C. create profile
D. ip source-address 10.1.130.1
E. create cnf-files
F. no auto-reg-ephone
Answer: D,F

Cisco練習問題   642-437過去問   642-437認定資格   642-437認定証   642-437   642-437
10.Which three functions are associated with MGCP? (Choose three.)
A. Control is implemented by a series of plain-text commands that are sent over UDP port 2427 between
Cisco Unified Communications Manager and the gateway.
B. A PRI backhaul channel forwards PRI Layer 2 (Q.921) signaling information via a TCP connection from
the gateway to the call agent.
C. MGCP uses a separate channel for backhauling signaling information between the call agent and the
gateway.
D. The gateway maintains a separate dial plan for redundancy in case the call agent fails.
E. Users query the call agent to determine the location of the call recipient.
F. A call agent uses control messages to direct its gateways and their operational behavior.
Answer: A,C,F

Cisco   642-437   642-437練習問題   642-437   642-437認定試験

NO.6 You are configuring a network to support voice to the PSTN. One important aspect to the configuration
is to be able to determine the individual slot, subunit, and port number from the gateway endpoint
identifier. Which signaling protocol is appropriate for this situation?
A. H.323
B. SIP
C. SCCP
D. MGCP
Answer: D

Cisco認定証   642-437   642-437参考書   642-437   642-437

NO.7 Which of the following best describes the implementation challenges that are associated with
variable-length numbering plans?
A. the variable number of extensions that need to be implemented
B. the number of trunks that need to be assigned
C. the mapping between IP addresses and extension numbers
D. the identification of the number of digits that need to be dialed before the call is routed
E. the degree in which the dial plan varies
Answer: D

Cisco   642-437   642-437   642-437   642-437参考書   642-437認証試験

NO.8 The administrator has added a new ephone-dn and a new ephone to the Cisco Unified Communications
Manager Express system, but the new phone will not register with the system. If other phones are
operating properly, which of the following should the administrator do first to try to resolve the issue?
A. Reboot the router.
B. Remove the ephone, then re-add the ephone.
C. Verify that the url authentication is configured for the correct authentication URL.
D. Verify that the url services is configured to the correct URL for services.
E. Enter the command no telephony-service, then enter telephony service in global configuration mode.
F. Enter the command no create cnf-files, then enter create cnf-files under the telephony-service
configuration.
Answer: F

Cisco   642-437認定資格   642-437認定証   642-437

NO.9 Refer to the exhibit.
Which type of ephone-dn is configured for the two ephones that are shown?
A. single-line-octo
B. hunt line
C. shared-line, nonexclusive
D. two directory numbers with one telephone number
E. shared-line, overlay
F. octo-line
Answer: E

Cisco過去問   642-437練習問題   642-437認証試験   642-437問題集

NO.10 Refer to the exhibit.
An administrator is migrating a PBX telephony system to an IP Phone solution using a fixed numbering
plan. The extension numbers and PSTN DIDs cannot be changed. Which of the following methods can be
used in order to reach the individual extensions at Site B when called via the PSTN?
A. The administrator can add a 1 to the DID for Site B to become 300-555-31xxx.
B. The administrator needs to map the last four digits in the DID to the extension numbers and prefix a
site code.
C. The administrator needs to map the last four digits in the DID to the extension numbers and prefix an
intersite code.
D. The administrator needs to map the last four digits in the DID to the extension numbers using
translation rules.
E. No changes are necessary because PSTN calls are preceded with access code 9.
Answer: D

Cisco認定試験   642-437   642-437   642-437

NO.11 Refer to the exhibit.
An administrator is migrating a PBX telephony system to a VoIP solution using a fixed numbering plan.
The extension numbers and PSTN DIDs cannot be changed. Which of the following methods can be used
in order to reach the individual extensions at Site B when called via the PSTN?
A. The administrator can replace the last three digits of the DID with xxx to cover the individual
extensions.
B. The administrator can replace the last three digits of the DID with xxx and use translation rules to map
the individual extensions.
C. The administrator needs to implement an auto-attendant solution where individual extensions can be
dialed.
D. The administrator needs to map the last four digits in the DID to the extension numbers using
translation rules.
Answer: C

Cisco   642-437   642-437認定資格

NO.12 In which situation would an administrator configure telephony services, but not configure any individual
ephones?
A. Phones that are controlled by Cisco Unified Communications Manager Express
B. Cisco Unified Communications Manager SRST fallback
C. Cisco Unified Communications Manager Express with HSRP
D. Remotely located phones that are controlled by a third-party PBX
E. This is not a valid scenario. Ephones are always required.
Answer: B

Cisco   642-437参考書   642-437過去問

NO.13 Which four Cisco IOS commands are required to configure a DHCP server on a voice gateway to
support a voice subnet so that both IP addresses and the IP address of the TFTP server are provided.?
The voice subnet has an address of 10.1.130.0/24, the default gateway is 10.1.130.1/24, and the TFTP
server is located at 10.1.5.2. (Choose four.)
A. subnet 10.1.130.1/24
B. ip dhcp pool voice
C. default-router 10.1.130.1
D. option 150 10.1.5.2
E. network 10.1.130.0 255.255.255.0
F. dhcp pool voice
G. option 150 ip 10.1.5.2
H. default-gw 10.1.130.1
Answer: B,C,E,G

Cisco   642-437   642-437   642-437参考書   642-437過去問   642-437

NO.14 Refer to the exhibit.
Cisco Unified Communications Manager Express has been partially configured to support 6 IP phones
and 12 directory numbers. The Cisco Unified Communications Manager Express will use the IP address

NO.15 The router with the IP address of 10.1.120.1 needs to be configured to use the device 10.1.140.1 as the
clock source. Which configuration command will accomplish this task?
A. clock source 10.1.140.1
B. ntp server 10.1.140.1
C. clock set 10.1.140.1
D. ntp source ip addr 10.1.140.1
E. ntp client 10.1.120.1 server 10.1.140.1
Answer: B

Cisco   642-437   642-437   642-437   642-437問題集

多くの人々は高い難度のIT認証試験に合格するのは専門の知識が必要だと思います。それは確かにそうですが、その知識を身につけることは難しくないとといわれています。IT業界ではさらに強くなるために強い専門知識が必要です。