Home » SWITCH 642-813 Q&As » Section 7 - New Questions (March, 2012) » 642-813 Q&A – New Questions (26-30) (March, 2012)

642-813 Q&A – New Questions (26-30) (March, 2012)

Section 7 – New Questions (March, 2012)

QUESTION 26
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?
A.    a list of applications currently in use in the network
B.    IP addressing design plans so that the network can be appropriately segmented to mitigate
potential network threats
C.    detailed security device specifications
D.    results from pilot network testing
Answer: A

QUESTION 27
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?
A.    No more than one secure MAC address should be set.
B.    The default will be set.
C.    The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.    No value is needed if the switchport priority extend command is configured.
E.    No more than two secure MAC addresses should be set.
Answer: B

QUESTION 28
Switch# show ip sla application

IP SLAs
Version: 2.2.0 Round Trip Time MIB, Infrastructure Engine-II Time of last change in whole IP SLAs: 22:17:39.117 UTC Fri Jun Estimated system max number of entries:15801
Estimated number of configurable operations: 15801 Number of Entries configured: 0
Number of active Entries: 0
Number of pending Entries: 0
Number of inactive Entries: 0
Supported Operation Types
Type of Operation to Perform: 802.1agEcho
Type of Operation to Perform: 802.1agJitter
Type of Operation to Perform: dhcp
Type of Operation to Perform: dns
Type of Operation to Perform: echo
Type of Operation to Perform: ftp
Type of Operation to Perform: http
Type of Operation to Perform: jitter
Type of Operation to Perform: pathEcho
Type of Operation to Perform: pathJitter
Type of Operation to Perform: tcpConnect
Type of Operation to Perform: udpEcho
IP SLAs low memory water mark: 21741224

Refer to the exhibit. What best describes the Cisco IOS IP SLA command and output in the exhibit?
A.    verifies which operation types have been enabled for IP SLA responder.
B.    verifies which operation types have been enabled for IP SLA source.
C.    verifies which operation types are supported in software.
D.    verifies enabled operation types that are not running.
Answer: C

QUESTION 29
You have just created a new VLAN on your network. What is one step that you should include in your VLAN based implementation and verification plan?
A.    Verify that different native VLANs exist between two switches for security purposes.
B.    Verify that the VLAN was added on all switches with the use of the show vlan command.
C.    Verify that the switch is configured to allow for trunking on the switch ports.
D.    Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
Answer: B

QUESTION 30
Which statement is correct about the use of the virtual interface on a WLC?
A.    Used to relay DHCP messages
B.    Used to communicate with LAPs
C.    Used to bring up LWAPP tunnels
D.    Used to extend into the wireless client VLAN
Answer: A