Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "510-308" Exam

ITCertKeys is the very best

 ITCertKeys is the very best 
i got latest dumps 
u must visit this site 
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-812 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-812" Exam

Building Converged Cisco Multilayer Switched Networks (BCMSN)

 Question 1.
ITCertKeys uses layer 3 switches in the Core of their network. 

Which method of Layer 3 switching uses a forwarding information base (FIB)?

A. Topology-based switching
B. Demand-based switching
C. Route caching
D. Flow-based switching
E. None of the above

Answer: A

Explanation:
The Layer 3 engine (essentially a router) maintains routing information, whether from static routes or dynamic routing protocols. Basically, the routing table is reformatted into an ordered list with the most specific route first, for each IP destination subnet in the table. The new format is called a Forwarding Information Base (FIB) and contains routing or forwarding information that the network prefix can reference.

In other words, a route to 10.1.0.0/16 might be contained in the FIB, along with routes to 10.1.1.0/24 and 10.1.1.128/25, if those exist. Notice that these examples are increasingly more specific subnets. In the FIB, these would be ordered with the most specific, or longest match, first, followed by less specific subnets. When the switch receives a packet, it can easily examine the destination address and find the longest match entry in the FIB. The FIB also contains the next-hop address for each entry. When a longest match entry is found in the FIB, the Layer 3 next-hop address is found, too.

Question 2.
You need to design the VLAN scheme for the ITCertKeys network. 

Which two statements are true about best practices in VLAN design? (Select two)

A. Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should 
    occur at the distribution layer.
B. Routing should always be performed at the distribution layer.
C. VLANs should be localized to a switch.
D. VLANs should be localized to a single switch unless voice VLANs are being utilized.
E. Routing should not be performed between VLANs located on separate switches.

Answer: B, C

Explanation:
In the distribution layer, uplinks from all access layer devices are aggregated, or come together. The distribution layer switches must be capable of processing the total volume of traffic from all the connected devices. These switches should have a port density of high-speed links to support the collection of access layer switches. VLANs and broadcast domains converge at the distribution layer, requiring routing, filtering, and security. The switches at this layer must be capable of performing multilayer switching with high throughput. Only certain Catalyst switch models can provide multilayer switching; be sure to understand which ones can do this.

A switched environment offers the technology to overcome flat network limitations. Switched networks can be subdivided into VLANs. By definition, a VLAN is a single broadcast domain. All devices connected to the VLAN receive broadcasts from other VLAN members. However, devices connected to a different VLAN will not receive those same broadcasts. (Naturally, VLAN members also receive unicast packets directed toward them from other VLAN members.) A VLAN consists of defined members communicating as a logical network segment. In contrast, a physical segment consists of devices that must be connected to a physical cable segment. A VLAN can have connected members located anywhere in the campus network, as long as VLAN connectivity is provided between all members. Layer 2 switches are configured with a VLAN mapping and provide the logical connectivity between the VLAN members.

Question 3.
The ITCertKeys la network is shown below:
 
On the basis of the information provided in the exhibit above, which two sets of procedures are best practices for Layer 2 and 3 failover alignment? (Select two)

A. Configure the ITCertKeys 1 switch as the standby HSRP router and the STP root for VLANs 11 
    and 110. Configure the ITCertKeys 2 switch as the standby HSRP router and the STP root for 
    VLANs 12 and 120.
B. Configure the ITCertKeys 1 switch as the active HSRP router and the backup STP root for 
    VLANs 11 and 110. Configure the ITCertKeys 2 switch as the active HSRP router and the 
    backup STP root for VLANs 12 and 120.
C. Configure the ITCertKeys 2 switch as the active HSRP router and the STP root for all VLANs. 
    Configure the ITCertKeys 1 switch as the standby HSRP router and backup STP root for all 
    VLANs.
D. Configure the ITCertKeys 1 switch as the active HSRP router and the STP root for all VLANs. 
    Configure the ITCertKeys 2 switch as the standby HSRP router and backup STP root for all 
    VLANs.
E. Configure the ITCertKeys 1 switch as the standby HSRP router and the backup STP root for 
    VLANs 12 and 120. Configure the ITCertKeys 2 switch as the standby HSRP router and the 
    backup STP root for VLANs 11 and 110.
F. Configure the ITCertKeys 1 switch as the active HSRP router and the STP root for VLANs 11 
    and 110. Configure the ITCertKeys 2 switch as the active HSRP router and the STP root for 
    VLANs 12 and 120.

Answer: E, F

Explanation:
Basically, each of the routers that provides redundancy for a given gateway address is assigned to a common HSRP group. One router is elected as the primary, or active, HSRP router, another is elected as the standby HSRP router, and all the others remain in the listen HSRP state. The routers exchange HSRP hello messages at regular intervals, so they can remain aware of each other's existence, as well as that of the active router. HSRP election is based on a priority value (0 to 255) that is configured on each router in the group. By default, the priority is 100. The router with the highest priority value (255 is highest) becomes the active router for the group. If all router priorities are equal or set to the default value, the router with the highest IP address on the HSRP interface becomes the active router. 

To set the priority, use the following interface configuration command:
Switch(config-if)# standby group priority priority When HSRP is configured on an interface, the router progresses through a series of states before becoming active. This forces a router to listen for others in a group and see where it fits into the pecking order. The HSRP state sequence is Disabled, Init, Listen, Speak, Standby, and, finally, Active. You can configure a router to preempt or immediately take over the active role if its priority is the highest at any time. Use the following interface configuration command to allow preemption:
Switch(config-if)# standby group preempt [delay seconds]

Question 4.
The ITCertKeys LAN switches are being configured to support the use of Dynamic VLANs. 

Which of the following are true of dynamic VLAN membership? (Select all that apply)

A. VLAN membership of a user always remains the same even when he/she is moved to another 
    location.
B. VLAN membership of a user always changes when he/she is moved to another location.
C. Membership can be static or dynamic.
D. Membership can be static only.
E. None of the above.

Answer: A, C

Explanation:
Dynamic VLAN memberships are based on the users MAC address connected to the port. If you have VTP server, a VTP database file, a VTP client switch, and a dynamic port; regardless of where your physical location is, you can still remain in the same VLAN.

Incorrect Answers:
B: This was true before the use of Dynamic VLAN membership, as VLANs were
assigned to ports, not users.
D: VLAN memberships can be either static or dynamic.

Question 5:
The ITCertKeys LAN switches are being configured to support the use of Dynamic
VLANs. What should be considered when implementing a dynamic VLAN solution?
(Select two)

A. Each switch port is assigned to a specific VLAN.
B. Dynamic VLANs require a VLAN Membership Policy Server.
C. Devices are in the same VLAN regardless of which port they attach to.
D. Dynamic VLAN assignments are made through the command line interface.

Answer: B, C

Explanation:
With VLAN Membership Policy Server (VMPS), you can assign switch ports to VLANs dynamically, based on the source Media Access Control (MAC) address of the device connected to the port. When you move a host from a port on one switch in the network to a port on another switch in the network, the switch assigns the new port to the proper VLAN for that host dynamically.

Note: There are two types of VLAN port configurations: static and dynamic.

Incorrect Answers
A: In a static VLAN, the administrator assigns switch ports to the VLAN, and the association does 
    not change until the administrator changes the port assignment. However, this is not the case 
    of dynamic VLANs.
D: The Command Line Interface is not used for dynamic VLAN assignments. 

Reference: Cisco Online, Configuring Dynamic Port VLAN Membership with VMPS

Question 6.
What is the preferred method of filtering bridged traffic within a VLAN?

A. Ethernet maps
B. Router ACLs
C. VLAN access maps
D. IP ACLs

Answer: C

Explanation.
VLAN ACLs or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps to filter traffic between devices in the same VLAN. Each VLAN access map can consist of one or more map sequences, each sequence with a match clause and an action clause. The match clause specifies IP, IPX, or MAC ACLs for traffic filtering and the action clause specifies the action to be taken when a match occurs. When a flow matches a permit ACL entry, the associated action is taken and the flow is not checked against the remaining sequences. When a flow matches a deny ACL entry, it will be checked against the next ACL in the same sequence or the next sequence. If a flow does not match any ACL entry and at least one ACL is configured for that packet type, the packet is denied.

Reference:
http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter09186a0080160

Question 7.
You are assigning VLANs to the ports of switch IT1. 

What VLAN number value is an assigned to the default VLAN?

A. VLAN 1003
B. VLAN 1
C. VLAN ON
D. VLAN A
E. VLAN 0

Answer: B

Explanation: 
The default VLAN is VLAN 1. Although this VLAN can be modified, it can not be deleted from the switch. The following VLANs are on by default for all Cisco Catalyst switches:
VLAN 1 - Default VLAN
VLAN 1002 - Default FDDI VLAN
VLAN 1003 - Default Token Ring VLAN
VLAN 1004 - Default FDDI Net VLAN
VLAN 1005 - Default Token Ring Net VLAN

Incorrect Answers:
A: This is the default Token Ring VLAN that is installed in the switch IOS. It is seldom used.
C: ON is a VTP configuration mode, but is not a normal VLAN name.
D: Although any VLAN can be named VLAN A, it is not created by default.
E: Although in Cisco IOS the number 0 has significance (i.e. ethernet 0, console port 0,
    serial 0) in VLANs 1 is the default. VLAN 0 is an invalid VLAN and can not be used. 

Question 8.
The VLANs in switch IT1 are being modified. 

Which of the following are updated in IT1 every time a VLAN is modified? (Select all that apply)

A. Configuration revision number
B. Configuration revision flag field
C. Configuration revision reset switch
D. Configuration revision database
E. None of the above.

Answer: A, D

Explanation:
For accountability reasons, every time a VLAN is modified the revision number changes, as does the information in the configuration revision database (as that is where the VLAN information is stored).

Incorrect Answers:
B, C: The configuration revision flag field, and the configuration revision reset switch don't exist in this context.

Question 9:
If you needed to transport traffic coming from multiple VLANs (connected between switches), and your CTO was insistent on using an open standard, which protocol would you use?

A. 802.11B
B. spanning-tree
C. 802.1Q
D. ISL
E. VTP
F. Q.921

Answer: C

Explanation:
The act involved in the above question is trunking. The two trunking protocols in the answer choices are: 802.1Q and ISL. ISL is Cisco proprietary and IEEE 802.1Q is based on an open standard. When non-Cisco switches are used along with Cisco switches and trunking is required, it is best to use the 802.1Q encapsulation.

Incorrect Answers:
A: This standard is used in wireless networking and has nothing to do with VLAN switching.
B: The Spanning Tree Protocol (STP) is used to prevent loops within a bridged network. Each 
    VLAN runs a separate instance of the STP and this is enabled by default.
D: This is the alternative Cisco proprietary method of trunking.
E: VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that manages the addition, 
    deletion, and renaming of VLANs on a network-wide basis. It is not used to actually transport 
    VLAN traffic.
F: This is an ISDN signalling standard and is not related with VLAN switching.

Question 10.
Under what circumstances should an administrator prefer local VLANs over end-to-end VLANs?

A. Eighty percent of traffic on the network is destined for Internet sites.
B. There are common sets of traffic filtering requirements for workgroups located in multiple 
    buildings.
C. Eighty percent of a workgroup's traffic is to the workgroup's own local server.
D. Users are grouped into VLANs independent of physical location.
E. None of the above

Answer: A

Explanation:
This geographic location can be as large as an entire building or as small as a single switch inside a wiring closet. In a geographic VLAN structure, it is typical to find 80 percent of the traffic remote to the user (server farms and so on) and 20 percent of the traffic local to the user (local server, printers, and so on).

Reference: Building Cisco Multilayer Switched Networks (Cisco Press) page 93


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.