CCNP SWITCH 642-813 Real Exam Questions
Implementing Cisco IP Switched Networks (SWITCH 642-813) is a qualifying exam for the Cisco Certified Network Professional CCNP®, and Cisco Certified Design Professional CCDP® certifications. The SWITCH 642-813 exam will certify that the successful candidate has important knowledge and skills necessary to to plan, configure and verify the implementation of complex enterprise switching solutions using Cisco’s Campus Enterprise Architecture. The SWITCH exam also covers secure integration of VLANs, WLANs, voice and video into campus networks.
You need to design the VLAN scheme for the cisco network. Which two statements are true about best practices in VLAN design? (Select two)
A. Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
B. Routing should always be performed at the distribution layer.
C. VLANs should be localized to a switch.
D. VLANs should be localized to a single switch unless voice VLANs are being utilized.
E. Routing should not be performed between VLANs located on separate switches.
Answer: B, C
If you needed to transport traffic coming from multiple VLANs (connected between switches),and your CTO was insistent on using an open standard, which protocol would you use?
What are some virtues of implementing end-to-end VLANs? (Choose two)
A. End-to-end VLANs are easy to manage.
B. Users are grouped into VLANs independent of a physical location.
C. Each VLAN has a common set of security and resource requirements for all members.
D. Resources are restricted to a single location.
Answer: B, C
Which of the following statements is true about the 80/20 rule (Select all that apply)?
A. 20 percent of the traffic on a network segment should be local
B. no more than 20 percent of the network traffic should be able to move across a backbone.
C. no more than 80 percent of the network traffic should be able to move across a backbone.
D. 80 percent of the traffic on a network segment should be local
Answer: B, D
The Cisco LAN is becoming saturated with broadcasts and multicast traffic. What could you do to help a network with many multicasts and broadcasts?
A. Creating smaller broadcast domains by implementing VLANs.
B. Separate nodes into different hubs.
C. Creating larger broadcast domains by implementing VLANs.
D. Separate nodes into different switches.
E. All of the above.
The Cisco LAN switches are being configured to support the use of Dynamic VLANs. What should be considered when implementing a dynamic VLAN solution? (Select two)
A. Each switch port is assigned to a specific VLAN.
B. Dynamic VLANs require a VLAN Membership Policy Server.
C. Devices are in the same VLAN regardless of which port they attach to.
D. Dynamic VLAN assignments are made through the command line interface.
Answer: B, C
The VLANs in switch PG1 are being modified. Which of the following are updated in PG1 every time a VLAN is modified? (Select all that apply)
A. Configuration revision number
B. Configuration revision flag field
C. Configuration revision reset switch
D. Configuration revision database
E. None of the other alternatives apply.
Answer: A, D
In which of the following virtual LAN networks do ports communicate with each other but cannot communicate with ports in other communities?
A. Private VLAN
B. Community VLAN
C. Promiscuous VLAN
D. Isolated VLAN
Which of the following protocols provides automatic EtherChannel configuration and is only used between Cisco switches?
A. Link Aggregation Control Protocol
B. Border Gateway Protocol
C. Port Aggregation Protocol
D. Cisco Discovery Protocol
Trust boundaries indicate where trust levels change. You can think of trust from the perspective of confidentiality and integrity. Look at the following statements which two are true
about trust boundaries?(Choose two)
A. At the trust boundaries,the untrusted traffic will be marked with a new QoS value appropriate for the policy in place at the point where the traffic entered the campus network.
B. Trust boundaries are configured in the core of the network to provide the most efficient forwarding based upon QoS markings.
C. Setting trust boundaries at the edge of the network allows intermediate hop devices to administer QoS policies without detailed packet identification.
D. Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.