2014년 2월 13일 목요일

Cisco 인증한 642-813 덤프

ITExamDump의 제품을 구매하시면 우리는 일년무료업데이트 서비스를 제공함으로 여러분을 인증시험을 패스하게 도와줍니다. 만약 인증시험내용이 변경이 되면 우리는 바로 여러분들에게 알려드립니다.그리고 최신버전이 있다면 바로 여러분들한테 보내드립니다. ITExamDump는 한번에Cisco 642-813인증시험을 패스를 보장합니다.

ITExamDump에서 Cisco인증 642-813덤프를 구입하시면 퍼펙트한 구매후 서비스를 제공해드립니다. Cisco인증 642-813덤프가 업데이트되면 업데이트된 최신버전을 무료로 서비스로 드립니다. 시험에서 불합격성적표를 받으시면 덤프구매시 지불한 덤프비용은 환불해드립니다.

시험 번호/코드: 642-813
시험 이름: Cisco (Implementing Cisco IP Switched Networks)
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 227 문항
업데이트: 2014-02-12

ITExamDump에서 출시한 Cisco인증 642-813덤프는 실제시험문제 커버율이 높아 시험패스율이 가장 높습니다. Cisco인증 642-813시험을 통과하여 자격증을 취득하면 여러방면에서 도움이 됩니다. ITExamDump에서 출시한 Cisco인증 642-813덤프를 구매하여Cisco인증 642-813시험을 완벽하게 준비하지 않으실래요? ITExamDump의 실력을 증명해드릴게요.

IT인증시험문제는 수시로 변경됩니다. 이 점을 해결하기 위해ITExamDump의Cisco인증 642-813덤프도 시험변경에 따라 업데이트하도록 최선을 다하고 있습니다.시험문제 변경에 초점을 맞추어 업데이트를 진행한후 업데이트된Cisco인증 642-813덤프를 1년간 무료로 업데이트서비스를 드립니다.

642-813 덤프무료샘플다운로드하기: http://www.itexamdump.com/642-813.html

NO.1 What does the command udld reset accomplish?
A. allows a UDLD port to automatically reset when it has been shut down
B. resets all UDLD enabled ports that have been shut down
C. removes all UDLD configurations from interfaces that were globally enabled
D. removes all UDLD configurations from interfaces that were enabled per-port
Answer: B

Cisco pdf   642-813   642-813 pdf   642-813

NO.2 What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A. Place unused ports in a common VLAN.
B. Implement private VLANs.
C. Implement DHCP snooping.
D. Implement port security.
E. Implement VLAN access maps
Answer: DE

Cisco   642-813최신덤프   642-813   642-813 pdf

NO.3 Refer to the exhibit.
An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server
for a man-in-middle attack. Which recommendation, if followed, would mitigate this type of attack?
A. All switch ports in the Building Access block should be configured as DHCP trusted ports.
B. All switch ports in the Building Access block should be configured as DHCP untrusted ports.
C. All switch ports connecting to hosts in the Building Access block should be configured as DHCP trusted
ports.
D. All switch ports connecting to hosts in the Building Access block should be configured as DHCP
untrusted ports.
E. All switch ports in the Server Farm block should be configured as DHCP untrusted ports.
F. All switch ports connecting to servers in the Server Farm block should be configured as DHCP
untrusted ports.
Answer: D

Cisco dumps   642-813최신덤프   642-813   642-813   642-813

NO.4 Refer to the exhibit.
What information can be derived from the output?
A. Interfaces FastEthernet3/1 and FastEthernet3/2 are connected to devices that are sending BPDUs
with a superior root bridge parameter and no traffic is forwarded across the ports. After the sending of
BPDUs has stopped, the interfaces must be shut down administratively, and brought back up, to resume
normal operation.
B. Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a
superior root bridge parameter, but traffic is still forwarded across the ports.
C. Devices connected to interfaces FastEthernet3/1 and FastEthernet3/2 are sending BPDUs with a
superior root bridge parameter and no traffic is forwarded across the ports. After the inaccurate BPDUs
have been stopped, the interfaces automatically recover and resume normal operation.
D. Interfaces FastEthernet3/1 and FastEthernet3/2 are candidates for becoming the STP root port, but
neither can realize that role until BPDUs with a superior root bridge parameter are no longer received on
at least one of the interfaces.
Answer: C

Cisco   642-813인증   642-813

NO.5 Refer to the exhibit.
The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security
reasons, the servers should not communicate with each other, although they are located on the same
subnet. However, the servers do need to communicate with a database server located in the inside
network. Which configuration isolates the servers from each other?
A. The switch ports 3/1 and 3/2 are defined as secondary VLAN isolated ports. The ports connecting to
the two firewalls are defined as primary VLAN promiscuous ports.
B. The switch ports 3/1 and 3/2 are defined as secondary VLAN community ports. The ports connecting to
the two firewalls are defined as primary VLAN promiscuous ports.
C. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls are defined as primary VLAN
promiscuous ports.
D. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls are defined as primary VLAN
community ports.
Answer: A

Cisco덤프   642-813자료   642-813   642-813기출문제

NO.6 Why is BPDU guard an effective way to prevent an unauthorized rogue switch from altering the
spanning-tree topology of a network?
A. BPDU guard can guarantee proper selection of the root bridge.
B. BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the
port.
C. BPDU guard can be utilized to prevent the switch from transmitting BPDUs and incorrectly altering the
root bridge election.
D. BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
Answer: B

Cisco최신덤프   642-813   642-813

NO.7 Refer to the exhibit.
Dynamic ARP Inspection is enabled only on switch SW_A. Host_A and Host_B acquire their IP addresses
from the DHCP server connected to switch SW_A. What would the outcome be if Host_B initiated an ARP
spoof attack toward Host_A ?
A. The spoof packets are inspected at the ingress port of switch SW_A and are permitted.
B. The spoof packets are inspected at the ingress port of switch SW_A and are dropped.
C. The spoof packets are not inspected at the ingress port of switch SW_A and are permitted.
D. The spoof packets are not inspected at the ingress port of switch SW_A and are dropped.
Answer: C

Cisco   642-813   642-813

NO.8 What two steps can be taken to help prevent VLAN hopping? (Choose two.)
A. Place unused ports in a common unrouted VLAN.
B. Enable BPDU guard.
C. Implement port security.
D. Prevent automatic trunk configurations.
E. Disable Cisco Discovery Protocol on ports where it is not necessary.
Answer: AD

Cisco자격증   642-813   642-813 pdf   642-813   642-813기출문제   642-813최신덤프

NO.9 Refer to the exhibit.
GLBP has been configured on the network. When the interface serial0/0/1 on router R1 goes down, how
is the traffic coming from Host1 handled?
A. The traffic coming from Host1 and Host2 is forwarded through router R2 with no disruption.
B. The traffic coming from Host2 is forwarded through router R2 with no disruption. Host1 sends an ARP
request to resolve the MAC address for the new virtual gateway.
C. The traffic coming from both hosts is temporarily interrupted while the switchover to make R2 active
occurs.
D. The traffic coming from Host2 is forwarded through router R2 with no disruption. The traffic from Host1
is dropped due to the disruption of the load balancing feature configured for the GLBP group.
Answer: A

Cisco   642-813   642-813   642-813자료

NO.10 What does the global configuration command ip arp inspection vlan 10-12,15 accomplish?
A. validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15
B. intercepts all ARP requests and responses on trusted ports
C. intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings
D. discards ARP packets with invalid IP-to-MAC address bindings on trusted ports "Pass
Answer: C

Cisco   642-813 pdf   642-813인증

NO.11 Refer to the exhibit.
Host A has sent an ARP message to the default gateway IP address 10.10.10.1. Which statement is true?
A. Because of the invalid timers that are configured, DSw1 does not reply.
B. DSw1 replies with the IP address of the next AVF.
C. DSw1 replies with the MAC address of the next AVF.
D. Because of the invalid timers that are configured, DSw2 does not reply.
E. DSw2 replies with the IP address of the next AVF.
F. DSw2 replies with the MAC address of the next AVF.
Answer: F

Cisco   642-813기출문제   642-813최신덤프   642-813덤프

NO.12 Refer to the exhibit.
Which four statements about this GLBP topology are true? (Choose four.)
A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If router A becomes unavailable, router B forwards packets sent to the virtual MAC address of router A.
C. If another router is added to this GLBP group, there would be two backup AVGs.
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B transitions from blocking state to forwarding state when it becomes the AVG.
Answer: ABDE

Cisco   642-813   642-813   642-813

NO.13 Which statement is true about RSTP topology changes?
A. Any change in the state of the port generates a TC BPDU.
B. Only nonedge ports moving to the forwarding state generate a TC BPDU.
C. If either an edge port or a nonedge port moves to a block state, then a TC BPDU is generated.
D. Only edge ports moving to the blocking state generate a TC BPDU.
E. Any loss of connectivity generates a TC BPDU.
Answer: B

Cisco   642-813   642-813   642-813

NO.14 Which statement is true about Layer 2 security threats?
A. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against
reconnaissance attacks that use Dynamic ARP Inspection to determine vulnerable attack points.
B. DHCP snooping sends unauthorized replies to DHCP queries.
C. ARP spoofing can be used to redirect traffic to counter Dynamic ARP Inspection.
D. Dynamic ARP Inspection in conjunction with ARP spoofing can be used to counter DHCP snooping
attacks.
E. MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
F. Port scanners are the most effective defense against Dynamic ARP Inspection.
Answer: E

Cisco자격증   642-813   642-813자료   642-813   642-813   642-813덤프

NO.15 Which description correctly describes a MAC address flooding attack?
A. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking
device then becomes the destination address found in the Layer 2 frames sent by the valid network
device.
B. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking
device then becomes the source address found in the Layer 2 frames sent by the valid network device.
C. The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The
switch then forwards frames destined for the valid host to the attacking device.
D. The attacking device spoofs a source MAC address of a valid host currently in the CAM table.
The switch then forwards frames destined for the valid host to the attacking device.
E. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space.
The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.
F. Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space.
The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is
subsequently flooded out all ports.
Answer: F

Cisco dumps   642-813인증   642-813최신덤프   642-813

NO.16 What is one method that can be used to prevent VLAN hopping?
A. Configure ACLs.
B. Enforce username and password combinations.
C. Configure all frames with two 802.1Q headers.
D. Explicitly turn off DTP on all unused ports.
E. Configure VACLs.
Answer: D

Cisco   642-813 pdf   642-813   642-813자격증   642-813

NO.17 Refer to the exhibit.
DHCP snooping is enabled for selected VLANs to provide security on the network. How do the switch
ports handle the DHCP messages?
A. A DHCPOFFER packet from a DHCP server received on Ports Fa2/1 and Fa2/2 is dropped.
B. A DHCP packet received on ports Fa2/1 and Fa2/2 is dropped if the source MAC address and the
DHCP client hardware address does not match Snooping database.
C. A DHCP packet received on ports Fa2/1 and Fa2/2 is forwarded without being tested.
D. A DHCPRELEASE message received on ports Fa2/1 and Fa2/2 has a MAC address in the DHCP
snooping binding database, but the interface information in the binding database does not match the
interface on which the message was received and is dropped.
Answer: C

Cisco자격증   642-813자료   642-813자료   642-813 dumps

NO.18 Refer to the exhibit.
Which VRRP statement about the roles of the master virtual router and the backup virtual router is true?
A. Router A is the master virtual router, and router B is the backup virtual router. When router A fails,
router B becomes the master virtual router. When router A recovers, router B maintains the role of master
virtual router.
B. Router A is the master virtual router, and router B is the backup virtual router. When router A fails,
router B becomes the master virtual router. When router A recovers, it regains the master virtual router
role.
C. Router B is the master virtual router, and router A is the backup virtual router. When router B fails,
router A becomes the master virtual router. When router B recovers, router A maintains the role of master
virtual router.
D. Router B is the master virtual router, and router A is the backup virtual router. When router B fails,
router A becomes the master virtual router. When router B recovers, it regains the master virtual router
role.
Answer: B

Cisco   642-813자격증   642-813인증   642-813인증

NO.19 When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gather
information?
A. The attacking station uses DTP to negotiate trunking with a switch port and captures all traffic that is
allowed on the trunk.
B. The attacking station tags itself with all usable VLANs to capture data that is passed through the switch,
regardless of the VLAN to which the data belongs.
C. The attacking station generates frames with two 802.1Q headers to cause the switch to forward the
frames to a VLAN that would be inaccessible to the attacker through legitimate means.
D. The attacking station uses VTP to collect VLAN information that is sent out and then tags itself with the
domain information to capture the data.
Answer: A

Cisco   642-813   642-813

NO.20 Refer to the exhibit.
Assume that Switch_A is active for the standby group and the standby device has only the default HSRP
configuration. Which statement is true?
A. If port Fa1/1 on Switch_A goes down, the standby device takes over as active.
B. If the current standby device had the higher priority value, it would take over the role of active for the
HSRP group.
C. If port Fa1/1 on Switch_A goes down, the new priority value for the switch would be 190.
D. If Switch_A had the highest priority number, it would not take over as active router.
Answer: C

Cisco   642-813   642-813최신덤프

ITexamdump의 C_TSCM62_65덤프의 VCE테스트프로그램과 70-331덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 3107시험에 대비한 고품질 덤프와 C_HANATEC131시험 최신버전덤프를 제공해드립니다. 최고품질 C_THR12_66시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.

시험자료링크: http://www.itexamdump.com/642-813.html

댓글 없음:

댓글 쓰기