642-813

9
* * * * * * Hundreds of people each day pass their IT certification exams with Testking guaranteed certification resources and training kits. Use the Cisco 642-813 questions and answers to practice for your next Cisco certification exam. If you don't pass – you don't pay! Testking has the first and only 100% product satisfaction and exam passing guarantee. Advanced practice questions and answers help drive the information into your routine thinking and surpass 642-813 brain dumps in retention and skill building. Cisco 642-813 exam answers and practice questions can be used at home or office, installable on up to two PCs, or print the questions and answers to take with you and train on-the-go! Cisco 642-813 preparation tools are the perfect fit for any Cisco certification candidate with 642-813 training materials for every level of entry. Exam Engine Features Control your IT training process by customizing your practice certification questions and answers. The fastest and best way to train. Truly interactive practice tests Create and take notes on any question Retake tests until you're satisfied YOU select the areas of the exam to cover Filter questions for a new practice test experience each time Re-visit difficult questions 642-813 Implementing Cisco IP Switched Networks (SWITCH) Exam number/code: 642-813 Exam name: Implementing Cisco IP Switched Networks (SWITCH) Questions & Answers: 280 Q&A Related Certifications: CCNP, CCNP 2010 TestKing Cisco 642-813 Exam Questions & Answers

description

Truly interactive practice tests Create and take notes on any question Retake tests until you're satisfied YOU select the areas of the exam to cover Filter questions for a new practice test experience each time Re-visit difficult questions Hundreds of people each day pass their IT certification exams with Testking guaranteed certification resources and training kits. TestKing Cisco 642-813 Exam Questions & Answers * * * * * *

Transcript of 642-813

******

Hundreds of people each day pass their IT certification exams with Testkingguaranteed certification resources and training kits. Use the Cisco 642-813 questions and answers to practice for your next Cisco certificationexam. If you don't pass – you don't pay! Testking has the first and only 100% productsatisfaction and exam passing guarantee. Advanced practice questions and answers helpdrive the information into your routine thinking and surpass 642-813 brain dumps in retentionand skill building. Cisco 642-813 exam answers and practice questions can be used at home or office,installable on up to two PCs, or print the questions and answers to take with you and trainon-the-go! Cisco 642-813 preparation tools are the perfect fit for any Cisco certificationcandidate with 642-813 training materials for every level of entry. Exam Engine FeaturesControl your IT training process by customizing your practice certification questions andanswers. The fastest and best way to train.

Truly interactive practice testsCreate and take notes on any questionRetake tests until you're satisfiedYOU select the areas of the exam to coverFilter questions for a new practice test experience each timeRe-visit difficult questions

642-813Implementing Cisco IP Switched Networks (SWITCH)

Exam number/code: 642-813Exam name: Implementing Cisco IP Switched Networks (SWITCH)Questions & Answers: 280 Q&ARelated Certifications: CCNP, CCNP 2010

TestKing Cisco 642-813 Exam Questions & Answers

Question 1: You are the network administrator tasked with designing a switching solution for theTestKing network. Which of the following statements describing trunk links areINCORRECT? (Select all that apply) A. The trunk link belongs to a specific VLAN.B. Multiple trunk links are used to connect multiple end user devices.C. A trunk link only supports native VLAN.D. Trunk links use 802.10 to identify a VLAN.E. The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets. Answer: A,B,C,D Explanation:A trunk is a point-to-point link that transmits and receives traffic between switches orbetween switches and routers. Trunks carry the traffic of multiple VLANs and can extendVLANs across an entire network. 100BaseT and Gigabit Ethernet trunks use Cisco ISL (thedefault protocol) or industry-standard IEEE 802.1Q to carry traffic for multiple VLANs over asingle link. Frames received from users in the administratively-defined VLANs are identifiedor tagged for transmission to other devices. Based on rules you define, a unique identifier(the tag) is inserted in each frame header before it is forwarded. The tag is examined andunderstood by each device before any broadcasts or transmission to other switches, routers,or end stations. When the frame reaches the last switch or router, the tag is removed beforethe frame is transmitted to the target end station.Incorrect Answers:E: This statement is true, as untagged frames are always used with the native VLAN. Thenative VLAN is VLAN 1 by default in Cisco switches.Section 5: Configure loop prevention forthe VLAN based solution(13 Questions)

Question 2: Jitter is causing problems with the VOIP application in the TestKing network. What causesnetwork jitter? A. Variable queue delaysB. Packet dropsC. Transmitting too many small packetsD. Compression Answer: A Explanation:Delay variation or jitter is the difference in the delay times of consecutive packets. A jitterbuffer is often used to smooth out arrival times, but there are instantaneous and total limitson buffering ability. Any type of buffering used to reduce jitter directly increases total networkdelay. In general, traffic requiring low latency also requires a minimum variation in latency.Note: Jitter in Packet Voice Networks :Jitter is defined as a variation in the delay of received packets. At the sending side, packetsare sent in a continuous stream with the packets being spaced evenly apart. Due to networkcongestion, improper queuing, or configuration errors, this steady stream can becomelumpy, or the delay between each packet can vary instead of remaining constant.

Exam: 642-813 Certification Questions & Answers

TestKing Cisco 642-813 Exam Questions & Answers

Question 3: If you were to configure an ISL Ethernet trunk between two Cisco switches, named TK1 andTK2, what would you have to include at the end of the link for the trunk to operate correctly?(Select two) A. An identical VTP mode.B. An identical speed/duplex.C. An identical trunk negotiation parameter.D. An identical trunk encapsulation parameter. Answer: B,D Explanation:In order for a trunk to be operational, the speed and duplex settings must match at each endof the trunk, and both switches must use the same trunking encapsulation (802.1Q or ISL).Incorrect Answers:A: It is common for switches to have trunk links operating, while the VTP modes differ. Forexample, a switch configured with VTP mode server can have a trunk connected to a switchwith VTP mode client.C: This is incorrect, as there are a number of configurations that are supported where thetrunk negotiation parameters differ between switches. For example, switch TK1 could havethe trunk configured for "on" while switch TK2 could have the switch trunk configured for"desirable" and the trunk would be operational.

Question 4: When the Catalyst switch TK1 is enabled to use VTP, which information does it advertise onits trunk ports? (Select two) A. VTP modeB. STP root statusC. Negotiation statusD. Management domainE. Configuration revision number Answer: D,E Explanation:The VTP protocol maintains VLAN configuration consistency throughout the network bydistributing VLAN information to the network. VLAN information is sent to network devices inadvertisements that contain the VTP management domain name, the current configurationrevision number, the VLANs that the server knows about, and certain VLAN parameters.Any time you change a VLAN, VTP automatically sends an advertisement to update all othernetwork devices.The following global configuration information is distributed in VTP advertisements:VLAN IDs (ISL and 802.1Q) Emulated LAN names (for ATM LANE ) 802.10 SAID values(FDDI) VTP domain name VTP configuration revision number VLAN configuration, includingmaximum transmission unit (MTU) size for each VLAN Frame format Reference: Cisco, Configuring VTPhttp://www.cisco.com/univercd/cc/td/doc/product/lan/cat5000/rel_6_1/config/vtp.htm

Question 5: The TestKing network utilizes the Multiple-instance Spanning Tree protocol in its switchedLAN. Which three statements about the MST protocol (IEEE 802.1S) are true? (Select three) A. To verify the MST configuration, the show pending command can be used in MSTconfiguration mode.

TestKing Cisco 642-813 Exam Questions & Answers

B. When RSTP and MSTP are configured; UplinkFast and BackboneFast must also beenabled.C. All switches in the same MST region must have the same VLAN-to-instance mapping, butdifferent configuration revision numbers.D. All switches in an MST region, except distribution layer switches, should have theirpriority lowered from the default value 32768.E. An MST region is a group of MST switches that appear as a single virtual bridge toadjacent CST and MST regions.F. Enabling MST with the "spanning-tree mode mst" global configuration command alsoenables RSTP. Answer: A,E,F Explanation:MST is built on the concept of mapping one or more VLANs to a single STP instance.Multiple instances of STP can be used (hence the name MST), with each instancesupporting a different group of VLANs. Each could be tuned to result in a different topology, so that Instance 1 would forward on theleft uplink, while Instance 2 would forward on the right uplink. Therefore, VLAN A would bemapped to Instance 1,and VLAN B to Instance 2.To implement MST in a network, you need to determine the following: The number of STPinstances needed to support the desired topologies. Whether to map a set of VLANs to eachinstance.

Question 6: Two TestKing switches are connected as shown below:

Configuration exhibit

Please refer to the exhibit above. Given the partial configuration of the two Cisco TestKingswitches, which two statements are true about VLAN traffic? (Select two) A. VLANs 1-5 will be blocked if fa0/10 goes down.B. VLANs 6-10 will use fa0/10 as a backup only.C. VLANs 1-5 will use fa0/10 as a backup only.D. VLANs 6-10 have a port priority of 128 on fa0/10.E. VLANs 1-10 are configured to load share between fa0/10 and fa0/12. Answer: B,E Explanation:

TestKing Cisco 642-813 Exam Questions & Answers

Spanning-Tree Protocol (STP) is a Layer 2 protocol that utilizes a special-purpose algorithmto discover physical loops in a network and effect a logical loop-free topology. STP creates aloop-free tree structure consisting of leaves and branches that span the entire Layer 2network. The actual mechanics of how bridges communicate and how the STP algorithmworks will be discussed at length in the following topics. Note that the terms bridge andswitch are used interchangeably when discussing STP. In addition, unless otherwiseindicated, connections between switches are assumed to be trunks. Load sharing can be accomplished using a couple of methods. The most common method ofload sharing is through root bridge placement on a per-VLAN basis. This will distribute trafficfor separate VLANs across separate paths to different root bridges. A separate methoddivides the bandwidth supplied by parallel trunks connecting switches. To avoid loops, STPnormally blocks all but one parallel link between switches. Using load sharing, traffic can bedivided between the links according to which VLAN the traffic belongs. Load sharing can be configured on trunk ports by using STP port priorities or STP pathcosts. For load sharing using STP port priorities, both load-sharing links must be connectedto the same switch. For load sharing using STP path costs, each load-sharing link can beconnected to the same switch or to two different switches. Load Sharing Using STP Port PrioritiesWhen two ports on the same switch form a loop, the STP port priority setting determineswhich port is enabled and which port is in a blocking state. The priorities on a parallel trunkport can be set so that the port carries all the traffic for a given VLAN. The trunk port with thehigher priority (lower values) for a VLAN is forwarding traffic for that VLAN. The trunk portwith the lower priority (higher values) for the same VLAN remains in a Blocking state for thatVLAN. One trunk port sends or receives all traffic for the VLAN.

Question 7: HSRP has been configured between two TestKing devices. What kind of message does anHSRP configured router send out every 3 seconds? (Select all that apply) A. RetireB. CoupC. ResignD. SendE. Hello Answer: E Explanation:Hello -The hello message conveys to other HSRP routers the router's HSRP priority andstate information. By default, an HSRP router sends hello messages every three seconds.Incorrect Answers:A: These messages are not used by HSRP.B: Coup-When a standby router assumes the function of the active router, it sends a coupmessage. This message is used by HSRP, but it is not sent our every 3 seconds.C: Resign-A router that is the active router sends this message when it is about to shut downor when a router that has a higher priority sends a hello message. This message is only sentbefore it resigns, not every 3 seconds.D: These messages are not used by HSRP.

Question 8: You need to determine where the trust boundaries will be in a new TestKing VOIP design.Which two statements are true about these trust boundaries? (Select two) A. Trust boundaries are configured in the core of the network to provide the most efficientforwarding based upon QoS markings,

TestKing Cisco 642-813 Exam Questions & Answers

B. Setting trust boundaries at the edge of the network allows intermediate hop devices toadminister QoS policies without detailed packet identification.C. Trust boundaries are used to determine which QoS mechanism will be applied to thetraffic.D. At the trust boundaries, the untrusted traffic will be marked with a new QoS valueappropriate for the policy in place at the point where the traffic entered the campus network.E. Trust boundaries define the firewall rules for QoS admission into a network. Answer: B,D Explanation:The packets that enter your network or hardware can be marked into different classes; youcan define the trust boundaries in your network. You can define some devices as trusteddevices and some as untrusted devices. The packets that come from trusted devices areconsidered trusted because the trusted devices classify the packets correctly. The packetsthat come from untrusted devices are considered untrusted because they might not classifythe packets correctly. After you have marked the packets and defined the trust boundaries,you can force the scheduling of the packets into different queues. These queues invoke atthe time of congestion.Defining trust boundaries is important in your network. Setting the trust boundary at the IPphone means that you can accept all the IP phone markings into the network withoutmodifications.You should always try to do classification close to the edge of the network, for scalability.On an IP phone, the tagged data (802.1Q/p) from the PC or any other device that isattached to the access port of the IP phone can be trusted or untrusted. In trusted mode, theIP phone passes all the data unchanged. In untrusted mode, the IP phone re-marks theLayer 2 CoS value to the new value (if configured on the access layer switch) or changes itto 0, if nothing is configured. The default is untrusted mode, which is the recommendmethod.Reference: http://www.ciscopress.com/articles/article.asp?p=385336&seqNum=2

Question 9: The TestKing administrator has issue the "show vlan id 5" command. What will thiscommand display? (Select two) A. Ports in VLAN 5B. UtilizationC. VLAN information on port 0/5D. FiltersE. MTU and type Answer: A,E Explanation:#show vlan id 5 : Shows all ports belonging to VLAN 5 and MTU of ports and type.

Question 10: What is true about access control on bridged and routed VLAN traffic? (Select three) A. Router ACLs can be applied to the input and output directions of a VLAN interface.B. Bridged ACLs can be applied to the input and output directions of a VLAN interface.C. Only router ACLs can be applied to a VLAN interface.D. VLAN maps and router ACLs can be used in combination.E. VLAN maps can be applied to a VLAN interface Answer: A,B,D

TestKing Cisco 642-813 Exam Questions & Answers

Explanation:Router ACLs are applied on interfaces as either inbound or outbound.To filter both bridged and routed traffic, VLAN maps can be used by themselves or inconjunction with router ACLs.VLAN ACLs, also called VLAN maps, which filter both bridged and routed packets. VLANmaps can be used to filter packets exchanged between devices in the same VLAN.

Question 11: Switch TK1 is configured with VTP. Which two VTP modes will make TK1 capable ofcreating and deleting VLANs on itself? (Select two) A. ClientB. ServerC. TransparentD. Pass-throughE. No-negotiate Answer: B,C Explanation:VTP ModesYou can configure a switch to operate in any one of these VTP modes: Server-In VTP servermode, you can create, modify, and delete VLANs and specify other configuration parameters(such as VTP version) for the entire VTP domain. VTP servers advertise their VLANconfiguration to other switches in the same VTP domain and synchronize their VLANconfiguration with other switches based on advertisements received over trunk links. VTPserver is the default mode. Client-VTP clients behave the same way as VTP servers, but youcannot create, change, or delete VLANs on a VTP client. Transparent-VTP transparentswitches do not participate in VTP. A VTP transparent switch does not advertise its VLANconfiguration and does not synchronize its VLAN configuration based on receivedadvertisements. However, in VTP version 2, transparent switches do forward VTPadvertisements that they receive out their trunk interfaces. If you configure the switch as VTP transparent, you can create and modify VLANs but thechanges affect only the individual switch.Incorrect Answers:A: Clients can not modify, add, or delete any VLAN information.D: These options are not valid VTP modes.E: These options are not valid VTP modes.

Question 12: A TestKing switch was configured as shown below: switchport mode accessswitchport port-securityswitchport port-security maximum 2switchport port-security mac-address 0002.0002.0002switchport port-security violation shutdown Given the configuration output shown above, what happens when a host with the MACaddress of 0003.0003.0003 is directly connected to the switch port? A. The host will be allowed to connect.B. The port will shut down.C. The host can only connect through a hub/switch where 0002.0002.0002 is alreadyconnected.D. The host will be refused access.

TestKing Cisco 642-813 Exam Questions & Answers

E. None of the other alternatives apply Answer: A Explanation:Steps of Implementing Port Security:In Exhibit two MAC addresses are allowed so that host will be allowed to connect.

Question 13: You have configured voice VLANs on Catalyst switch TK1. Which two statements are trueabout the operation of voice VLANs on this device? (Select two) A. When the voice VLAN feature is enabled, all untagged traffic is sent according to thedefault CoS priority of the port.B. Enabling voice VLANs enables the switch to create multiple queues for traffic that isentering a port.C. When voice VLANs are configured on a trunk link, UplinkFast must also be enabled.D. Voice VLANs are configured to enable the switch to forward frames marked with theproper CoS values over separate physical links.E. Enabling voice VLANs enables the switch to forward frames with a specific 802.1Pmarking. Answer: A,E Explanation:Here is the sample voice vlan configuration:Switchport voice vlan vlan-id dot1q command enables voice VLAN on switch port andassociated VLAN.Mls qos trust cos command enables QoS (Quality of Services ) based on COS (Class ofservice) which is determined by the 802.1P priority bits.Switchport priority cos <priority> value sets the priority values to frame coming from PC toswitch port. When Voice VLAN feature is enabled on switch port, all untagged frame sends with thedefault or configured COS (Class of Services) priority value.

Question 14: You are assigning VLANs to the ports of switch TK1. What VLAN number value is anassigned to the default VLAN? A. VLAN 1003B. VLAN 1C. VLAN OND. VLAN AE. VLAN 0 Answer: B Explanation:The default VLAN is VLAN 1. Although this VLAN can be modified, it can not be deletedfrom the switch. The following VLANs are on by default for all Cisco Catalyst switches:VLAN 1 - Default VLANVLAN 1002 - Default FDDI VLANVLAN 1003 - Default Token Ring VLANVLAN 1004 - Default FDDI Net VLANVLAN 1005 - Default Token Ring Net VLANIncorrect Answers:

TestKing Cisco 642-813 Exam Questions & Answers

A: This is the default Token Ring VLAN that is installed in the switch IOS. It is seldom used.C: ON is a VTP configuration mode, but is not a normal VLAN name.D: Although any VLAN can be named VLAN A, it is not created by default.E: Although in Cisco IOS the number 0 has significance (i.e. ethernet 0, console port 0,serial 0) in VLANs 1 is the default. VLAN 0 is an invalid VLAN and can not be used.

Question 15: You have been tasked with setting a trust boundary on the TestKing network. What is thebasic function of this trust boundary? A. Trust boundaries are points in the network where Layer 2 CoS markings are converted toLayer 3 DSCP or IP precedence markings.B. Trust boundaries are a point in the network where QoS functionality begins and ends.C. Trust boundaries determine whether certain types of traffic can pass.D. Trust boundaries are a point in the network where decisions about CoS markings onincoming packets are made.E. None of the other alternatives apply Answer: D Explanation:The perimeter formed by switches that do not trust incoming QoS is called the trustboundary. Usually, the trust boundary exists at the farthest reaches of the enterprise network(access-layer switches and WAN or ISP demarcation points). When the trust boundary hasbeen identified and the switches there are configured with untrusted ports, everything elseinside the perimeter can be configured to blindly trust incoming QoS values since theCOS/QOS markings are then under the control of the network administrator, and not the enduser.

Related 642-813 Exams:

Popular Certification Exams:

LOT-848 000-011 000-M16 920-447 000-M11190-622 E20-611 70-453 E20-820 642-351190-612 510-306 1z0-052 50-663 LOT-956

Hot Certifications:

F9CD CWNA Server+ iNet+ ITIL

Popular Certification Providers:

Huawei BlackBerry BEA EMC Cisco

TestKing Cisco 642-813 Exam Questions & Answers