Home » SWITCH 642-813 Q&As » Section 4 - Prepare Infrastructure » 642-813 Q&A – Prepare infrastructure to support advanced services (1-5)

642-813 Q&A – Prepare infrastructure to support advanced services (1-5)

Section4 – Prepare infrastructure to support advanced services

QUESTION NO: 1
Refer to the exhibit. On the basis of the configuration that is provided, how will the traffic coming from the PC be handled?

1

A. The switch access port is configured to trust the priority of the data that is received from the PC.
B. The IP phone access port is configured to override the priority of the data that is received from the PC.
C. The IP phone access port is configured to trust the priority of the data that is received from the PC.
D. The switch access port is configured to override the priority of the data that is received from the PC.
Answer: C
Explanation:
Configuring the IP Phone to Trust the CoS Priority of Incoming Data Frames
You can connect a PC or other data device to a Cisco7960 IP Phone port. The PC can generate packets with an assigned CoS value. You can configure the switch to trust the priority of frames arriving on the IP phone port from connected devices.
Beginning in privileged EXEC mode, follow these steps to trust the CoS priority received from the non-voice port on the Cisco7960 IP Phone:

1-1

QUESTION NO: 2
Refer to the exhibit. A trunk link is connected between switch A_SW and switch D_SW. Based on the configuration shown in the exhibit, how would the traffic coming from the switch A_SW be managed?

2
A. The trunk port Fa0/1 on switch A_SW will trust all CoS values on the frames coming from the IP phone.
B. The trunk port Fa0/1 on switch A_SW will trust all CoS values on the frames received on the IP phone.
C. The trunk port Fa0/1 on switch D_SW will trust all CoS values on the frames coming from port Fa0/1 on A_SW.
D. The trunk port Fa0/1 on switch D_SW will trust all CoS values on the frames received on the A_SW switch port Fa0/4.
E. The trunk port Fa0/1 on switch D_SW will trust allCoS values on the frames received on the IP phone port.
Answer: C

QUESTION NO: 3
Which three statements are true about implementing Cisco wireless LANs? (Choose three.)
A.LWAPP allows encrypted communication between lightweight access points and WLAN controllers.
B.The WLAN Solution Engine (WLSE) is used to control lightweight access points.
C.Power over Ethernet (PoE) is only available when a WLAN controller is integrated into the network.
D.One of the advantages of the lightweight WLAN solution is that the devices act independently.
E.Antenna power is a relative value reference to dBi.
F.Characteristics of antennas are directionality, gain, and polarization.
Answer: A E F

QUESTION NO: 4
Refer to the exhibit. A workstation PC is connected to the Cisco IP phone access port. Based on the configuration in the exhibit, how will the traffic be managed? 

4
A.The IP phone access port will override the priority of the frames received from the PC.
B.The IP phone access port will trust the priority of the frames received from the PC.
C.The switch port Fa0/4 will override the priority of the frames received from the PC.
D.The switch port Fa0/4 will trust the priority for the frames received from the PC.
Answer: A
Explanation:
The PC connected to the phone, however, should normally be untrusted and have all inbound CoS values set to 0. This is mentioned here to show how trust boundaries also exist at any connected IP Phones.
Example:

interface fastethernet 0/1
switchport voice vlan 200
switchport priority extend cos 0

A switch instructs an attached IP Phone through CDP messages as to how it should extend QoS trust to its own user data switch port. To configure the trust extension, use the following interface configuration command:

Switch(config-if)# switchport priority extend {cos value | trust}

Normally, the QoS information from a PC connected to an IP Phone should not be trusted. This is because the PC’s applications might try to spoof CoS or Differentiated Services Code Point (DSCP) settings to gain premium network service. In this case, use the cos keyword so that the CoS bits are overwritten to value by the IP Phone as packets are forwarded to the switch. If CoS values from the PC cannot be trusted, they should be overwritten to a value of 0.

QUESTION NO: 5
You need to determine the correct wireless LAN topology for use in the Pass4sure network. Which three statements are true about the various WLAN topologies? (Select three)
A. In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B. In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C. In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D. In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E. In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F. In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
Answer: ABC

2 thoughts on “642-813 Q&A – Prepare infrastructure to support advanced services (1-5)

  1. Lord Biggie says:

    Men, I like the you go about explaining the questions it makes understanding it very easy. Keep up with the good work 🙂

Comments are closed.