update : demo - killtest
TRANSCRIPT
Exam : Cisco 642176
Title :
Update : Demo
Small Medium Business for
Engineers
http://www.KillTest.com
| English | Chinese(Traditional) | Chinese(Simplified) | 2 KillTest Information Co., Ltd. All rights reserved.
1.Refer to the exhibit. What are the two options available when using the Security Audit configuration task in Cisco SDM? (Choose two.)
A.Perform a virus scan. B.Perform a secure audit on the router. C.Perform a onestep lockdown on the router. D.Perform a denialofservice attack on the router to verify that it is protected. E.Perform a realtime inspection of incoming traffic destined for the router. Correct:B C 2.The recommended WAN access method for a simplified and costeffective Cisco SingleSite Secure Network Foundation deployment provides which type of service? A.besteffort B.low latency C.guaranteed quality D.guaranteed bandwidth Correct:A 3.Refer to the exhibit. From this Cisco SDM Security Audit Wizard screen, what should you do to secure the router?
| English | Chinese(Traditional) | Chinese(Simplified) | 3 KillTest Information Co., Ltd. All rights reserved.
A.Click Next. B.Click Fix All, then Next. C.Click Fix All, then clear CDP check box, then Next. D.Click Fix All, then clear CDP check box, then Next, then immediately reboot the router. E.Click Fix All, then clear CDP check box, then Next, then manually disable CDP on the WAN interface. F.Click Fix All, then clear CDP check box, then Next, then manually disable CDP on the WAN interface, then immediately reboot the router. Correct:E 4.Refer to the exhibit. In a Cisco SingleSite Secure Network Foundation implementation, which factor affects your choice of switch configuration?
| English | Chinese(Traditional) | Chinese(Simplified) | 4 KillTest Information Co., Ltd. All rights reserved.
A.type of QoS scheme that is being used B.maximum number of supported IP phones C.maximum amount of packet latency acceptable D.type of security scheme that is being implemented Correct:B 5.What is the reason for running spanning tree in a Cisco SingleSite Secure Network Foundation solution? A.to allow management of all network devices B.to aggregate logical network groups together at one central point C.to protect the network in case someone inadvertently creates a physical loop in it D.to ensure that if a device fails another device will automatically take over for it E.to connect like devices, such as phones or computers, in logical network groups Correct:C 6.Refer to the exhibit. Which Cisco SDM configuration task would you select to configure a static route to the service provider?
| English | Chinese(Traditional) | Chinese(Simplified) | 5 KillTest Information Co., Ltd. All rights reserved.
A.NAC B.NAT C.Routing D.Quality of Service E.Intrusion Protection Correct:C 7.Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 switch? A.The default network security setting is "HIGH". B.The "LOW" setting enables broadcast storm control and limits the number of devices that can connect to a switch port. C.The "LOW" setting disables broadcast storm control and has no effect on the number of devices that can connect to a switch port. D.The "LOW" setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port. E.The "LOW" setting disables broadcast storm control but limits the number of devices that can connect to a switch port. Correct:B 8.Refer to the exhibit. The exhibit is an example of which technology being implemented?
| English | Chinese(Traditional) | Chinese(Simplified) | 6 KillTest Information Co., Ltd. All rights reserved.
A.PAT B.QoS C.802.1Q D.VLANs E.spanning tree Correct:A 9.Which three of these are prerequisites for resetting a Catalyst Express 500 switch when Cisco Network Assistant is unavailable? (Choose three.) A.a switch with no connected devices B.physical access to the switch C.a PC preconfigured with a specific IP address and mask D.at least one enabled switch port that is unconnected to any device E.a PC or laptop with Windows 2000 or Windows XP installed and a web browser that has JavaScript enabled Correct:B D E 10.If voice and data traffic will be sent and received via a WAN link, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic? A.IPSec VPN B.NAT C.QoS mechanisms D.EIGRP routing protocol
| English | Chinese(Traditional) | Chinese(Simplified) | 7 KillTest Information Co., Ltd. All rights reserved.
E.Static routing F.Firewall Correct:C 11.When using Cisco Network Assistant to configure a WSCE50024LC switch, which three are available choices in the port settings window? (Choose three.) A.group mode selections B.duplex mode selections C.port security selections D.auto MDIX selections E.status selections Correct:B D E 12.When enabling IPS on an ISR using the Cisco SDM IPS Wizard, in what location can the SDF be placed? A.on the NVRAM of the ISR B.on the RAM of the ISR C.on the flash memory of the ISR D.on the USB memory stick of the ISR E.on the IPS Module of the ISR Correct:C 13.Drop
Correct: Green choice5>Yellow Choice1 Green choice1>Yellow Choice3 Green choice3>Yellow Choice2 Green choice4>Yellow Choice5 Green choice2>Yellow Choice4 14.You are designing a solution that needs to support a fullrate T3 connection. Which router model does the Cisco SingleSite Secure Network Foundation 1.1 Design and Implementation Guide suggest for this solution?
| English | Chinese(Traditional) | Chinese(Simplified) | 8 KillTest Information Co., Ltd. All rights reserved.
A.Cisco 2801 B.Cisco 2811 C.Cisco 2821 D.Cisco 2851 E.Cisco 3825 F.Cisco 3845 Correct:F 15.During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modifications should be made prior to implementation? A.Plan B.Prepare C.Position D.Perform E.Design F.Develop Correct:B 16.Refer to the exhibit. Which Cisco SDM configuration task is used to enable the translation of the inside network private IP address to the public IP address?
A.Interface and Connections B.Firewall and ACL C.VPN D.Security Audit
| English | Chinese(Traditional) | Chinese(Simplified) | 9 KillTest Information Co., Ltd. All rights reserved.
E.Routing F.NAT Correct:F 17.Refer to the exhibit. What does "locking down" the router entail?
A.Prohibiting console access to the router. B.Disabling HTTPS access to Cisco SDM. C.Preventing any alterations to the router's running configuration. D.Shutting down all the router's interfaces. E.Disabling all the vulnerable services on the router. Correct:E 18.Which two statements about configuring an unconnected Catalyst Express 500 switch from setup mode using a PC are true? (Choose two.) A.you may use either the CLI or CNA for configuration. B.You may make a direct connection to the PC from any port on the switch. C.You must use CLI for initial configuration. D.You must use Cisco Network Assistant to set up the initial configuration. E.You may only make a direct connection from the console port of the switch to the PC serial port. F.You may only make a direct connection from the port with the flashing green LED to the PC. Correct:D F
| English | Chinese(Traditional) | Chinese(Simplified) | 10 KillTest Information Co., Ltd. All rights reserved.
19.Which WAN connection requires a different interface than the standard interfaces provided in the Cisco SingleSite Secure Network Foundation deployment design? A.DSL B.VPN C.Cable D.Metro Ethernet E.Frame Relay Correct:E 20.Drop
Correct: Green choice3>Yellow Choice1 Green choice1>Yellow Choice2 Green choice6>Yellow Choice3 Green choice4>Yellow Choice4 21.Which two statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct? (Choose two.) A.There is no 802.1Q trunking used in these designs. B.802.1Q trunking is used between the access switch and the router. C.Trunking ensures that traffic from only one VLAN is carried on that trunk. D.When 802.1Q trunks are configured, they are also called Native VLANs. E.The Cisco Control VLAN carries only layer 2 control traffic. Correct:B E 22.To protect the network from external and internal threats, where should Cisco IPS be enabled on an ISR? A.on the untrusted (outside) interface of the ISR B.on the trusted (inside) interface of the ISR C.on the WAN and LAN interfaces of the ISR D.on the console and auxiliary ports of the ISR
| English | Chinese(Traditional) | Chinese(Simplified) | 11 KillTest Information Co., Ltd. All rights reserved.
E.globally on the ISR Correct:C 23.During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer's security requirements? A.Prepare B.Plan C.Position D.Perform E.Design F.Develop Correct:B 24.Which two WAN access methods are specified for a simplified and costeffective Cisco SingleSite Secure Network Foundation deployment design? (Choose two.) A.DSL B.Cable C.MPLS D.Wireless E.Leased Line/Frame Relay Correct:A B 25.Drop
Correct: Green choice4>Yellow Choice1 Green choice6>Yellow Choice2 Green choice3>Yellow Choice3 Green choice1>Yellow Choice4 Green choice2>Yellow Choice5 Green choice5>Yellow Choice6
| English | Chinese(Traditional) | Chinese(Simplified) | 12 KillTest Information Co., Ltd. All rights reserved.
26.When using the Steps to Success Methodology, where does Quote Builder fit into the deal process flow? A.It encompasses the Validate and Solve steps. B.It encompasses the Discover, Validate, and Present steps. C.It encompasses the Discover, Solve, and Close steps. D.It encompasses the Discover, Validate, and Solve steps. E.It encompasses the Discover, Validate, Solve and Present steps. Correct:A 27.Refer to the exhibit. In a Cisco SingleSite Secure Network Foundation implementation, which factors affect the router configuration you select?
A.type of QoS scheme that is being used B.maximum amount of packet latency acceptable C.type of security scheme that is to be implemented D.maximum number of supported IP phones per platform Correct:D 28.In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone+Desktop"? (Choose two.) A.The ports may belong to a configurable data VLAN. B.The names of the VLANs used by the Smartports are not relevant. C.The names of the VLANs used by the Smartports are case insensitive. D.The names of the VLANs used by the Smartports are case sensitive. E.The ports may belong to many VLANs, depending on how many PCs are connected to each port. Correct:A D
| English | Chinese(Traditional) | Chinese(Simplified) | 13 KillTest Information Co., Ltd. All rights reserved.
29.Refer to the exhibit. Which two interfaces are enabled for 802.1Q encapsulation? (Choose two.)
A.Router 1, gig 0/0 B.Router 1, gig 0/1 C.SW1, Gig Port 9 D.SW2, Fast Port 1 to 24 Correct:B C 30.When determining a customer's technical requirements for a Cisco Unified Communications solution, which important tool can be used to determine the bandwidth used by different codecs with various voice protocols over different media? A.Network Codec Aggregator Tool B.Voice Codec Bandwidth Calculator C.Bandwidth Estimator Tool D.Voice Bandwidth Calculator E.Unified Communications Bandwidth Tool Correct:B