Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "920-192" Exam

Dumps of itcertkeys.com

 Dumps of itcertkeys.com
are most helpful for success
thanks buddy


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-381 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-381" Exam

Foundation Express for Field Engineers

 Question 1.
Which three statements are correct about the IEEE 802.3af Power over Ethernet standard?
(Choose three.)

A. It defines a port that acts as a power source to be a PSE.
B. It defines a powered device to be a PDE.
C. It defines how a powered device is detected.
D. It defines three methods of delivering Power over Ethernet to the discovered powered device.
E. It describes five power classes to which a device may belong.
F. It defines power class 0 as being reserved for future use.

Answer: A, C, E

Question 2.
You have just configured and enabled the Cisco IOS Firewall feature set from a remote location using the Cisco Router and Security Device Manager (SDM) Firewall wizard. You later want to double-check your configuration using Cisco SDM. However, you find that you can no longer connect to the Cisco IOS Firewall using Cisco SDM. 

What is the probable cause of this failure?

A. You must additionally specify the Cisco SDM management port number to gain access when the configuration has been applied.
B. You have not generated an RSA key pair between the host and device to allow secure access via Cisco SDM.
C. You have been locked out via access lists that have been applied to the router as a result of your Cisco SDM configuration.
D. You must specify the host IP address of Cisco SDM in the Configuration panel for allowed  management connections.

Answer: C

Question 3.
When using Cisco Router and Security Device Manager (SDM) to configure IPS, what must you do first before you can select Configure > Signature to edit any signatures?

A. Select Configure > Global Settings to enable IPS globally on the router.
B. Select Configure > Global Settings to disable the Failed Closed option.
C. Select Configure > Global Settings to point Cisco SDM to the ips.tar file in the router Flash  memory.
D. Select Configure > Rules to create the inbound and/or outbound filter to determine which traffic  will be scanned by IPS.
E. Select Configure > Rules to enable an interface for inbound and/or outbound IPS.

Answer: E

Question 4.
Exhibit:
Switches A and C are running PVST+ STP, and Switch B is running 802.1Q STP. If the BPDU of the root in VLAN 1 is better than the BPDU of the root in VLAN 2, then there is no blocking port in the VLAN 2 topology. The BPDU of VLAN 2 never makes a "full circle" around the topology; it is replaced by the VLAN 1 BPDU on the B-C link, because B runs only one STP merged with VLAN 1 STP of PVST+. Thus, there is a forwarding loop. 

What does PVST+ do to correct this?

A. Switch A sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B)  towards Switch C. Switch C will put port C-B into a type-inconsistent state, which prevents the loop.
B. Switch B sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch A)  towards Switch C. Switch C will put port C-B into a type-inconsistent state, which prevents the loop.
C. Switch C sends PVST+ BPDUs of VLAN 2 (to the SSTP address that is flooded by Switch B)  towards Switch C. Switch A will put port C-B into a type-inconsistent state, which prevents the  loop.
D. Switch A sends PVST+ BPDUs of VLAN 1 (to the SSTP address that is flooded by Switch B)  towards Switch B. Switch A will put port C-B into a type-inconsistent state, which prevents the loop.

Answer: A

Question 5.
In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

A. The WCS sends excessive traffic to the rogue, thus overloading the access point.
B. The rogue MAC address is used to spoof broadcast de-association packets.
C. The rogue MAC address is used to spoof broadcast de-authentication packets.
D. The WCS sends out excessive signals on the same channel when the rogue is detected.

Answer: C

Question 6.
OSPF routes are being redistributed into EIGRP but they are not showing up in the routing table. 

What are two possible causes? (Choose two.)

A. CEF has not been enabled.
B. Synchronization has been turned off.
C. Incorrect distribute lists have been configured.
D. No default metric has been configured for EIGRP.
E. The ip classless command is missing.
F. There are mismatched autonomous system numbers.

Answer: C, D

Question 7.
Exhibit:
Which two statements are correct about what is displayed? (Choose two.)

A. The IP address that is used for the router ID must be reachable.
B. Router 1 is the designated router because it has the lowest configured IP address.
C. Router 1 is the designated router because it has the highest configured loopback address.
D. If Router 1 had a PRI of 0, it could not be a designated router or a backup designated router.
E. Router 1 has had its ID manually configured by using the router-ID command.

Answer: C, D

Question 8.
What is the default authentication method when using HTTP to access the Cisco Router and Security Device Manager (SDM), assuming that you are not using the default configuration file (sdmconfig-xxxx.cfg) that comes with Cisco SDM?

A. none
B. local database
C. aaa
D. enable password
E. line console password
F. line vty password

Answer: D

Question 9.
The network administrator has configured the SSID value in a wireless Cisco Aironet client card.

What is the result of the client-to-access-point association if the client SSID1 is left blank, and the
SSID2 is assigned a value of my_ssid?

A. The client will consider SSID1 a null value, causing the client to request the SSID from the  access point.
B. The client software will not allow this configuration and will create an error message until the configuration is corrected.
C. The client software will replace SSID1 with SSID2, and use my_ssid to attempt association with the access point.
D. The client software will attempt association with the access point using a null value of SSID1,  and if not successful it will rotate to use the SSID2 value of my_ssid.

Answer: C

Question 10.
Which four features can be configured using Cisco Router and Security Device Manager version 2.1.1? (Choose four.)

A. IP multicast routing (PIM)
B. IPS
C. Easy VPN Remote and Easy VPN Server
D. static routes and IGP routing protocols (OSPF, RIP, EIGRP)
E. SSL VPN (Web VPN)
F. AAA

Answer: B, C, D, F


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.