Cisco 642-974 Exam - TopITexams.com
Free 642-974 Sample Questions:
1.How would you configure a NAM to monitor and report the most heavily viewed sections of a website?
A.Create a separate domain name or virtual server IP address for each section of the site. Add each domain name or IP address to the NAM application protocol directory.
B.Enable regularexpression pattern matching. Define application protocol filters based on regular expressions that match the desired URLs.
C.Enable URL monitoring. Define each desired URL as an application in the protocol directory.
D.Use SPAN or VACLs to capture upperlayer protocol data from the web servers. Use a thirdparty application to parse the stored capture files.
2.Which command must be issued to activate the FWSM firewall context?
3.You are a help desk trainee for XXYYinc.com. A potential customer has a question for you:
which function learns MAC and IP addresses used in the Dynamic ARP Inspection feature?
A.IP Source Guard
D.Unicast Reverse Path Forwarding (Unicast RPF)
4.In a Cisco Catalyst 6500 Series Switch, in which slot or slots should you install the NAM?
A.slots 1 to 4
B.slot 5 or 6
C.any slot except a supervisor module slot
D.the slots that are closest to the supervisor modules
5.A customer has installed an FWSM in the data center. Which feature must be configured to enable FTP to work?
E.deep packet inspection
6.Which IDSM capture method has the ability to impact the performance of VoIP applications?
7.You work as a Cisco engineer in the Data Center of XXYYinc.com. With your experience, which two functions will be executed if install all command ? (Choose two.)
A.causes a switchover back to the originally active supervisor module
B.reloads the standby supervisor module with the new Cisco NXOS software
C.copies the kickstart and system images to the standby supervisor module
D.backs up the currently active software image before upgrading it
Answer: B, C
8.Cisco NXOS is a data centerclass operating system that is modular, resilient, and built for quality of service. So in your opinion, how many paths can be considered in NXOS for equalcost multipathing?
9.You work as the network administrator at XXYYinc.com. As far as you know, which command qualifies uRPF in strict mode?
A.ip verify unicast source reachablevia any
B.ip verify unicast source reachablevia rx
C.ip verify unicast source reachablevia strict
D.ip verify unicast source strict
10.What will be upgraded as a result of this command? upgrade ftp://email@example.com//upgrade/IPSK9r1.1a5.11.pkg
C.both application and recovery partitions immediately
D.both application and recovery partitions at the next scheduled automatic IDSM update
11.What is the effect of executing the command intrusiondetection module 5 managementport accessvlan 10 on an IDSM?
A.allows the IDSM to be managed by devices in VLAN 10
B.configures the IDSM to monitor traffic from VLAN 10 in inline mode
C.allows the IDSM to perform blocking actions on devices in VLAN 10
D.configures the IDSM to monitor traffic from VLAN 10 in promiscuous mode
12.Your customer uses these fileoriented network applications: FTP Webbased file repositories Windows and Linux file sharing How can you use the NAM to create a report showing total network traffic for these applications?
A.Define a VACL that forwards traffic for all of the applications.
B.Define an application group that contains all of the interfaces for the application servers.
C.This cannot be accomplished because the NAM cannot monitor upperlayer protocol data.
D.Add each application to the Cisco Traffic Analyzer protocol directory and create an application group with all of the applications.
13.Policybased routing (PBR) provides a mechanism for expressing and implementing forwarding/routing of data packets based on the policies defined by the network administrators. Which of following is taken to packets that do not match any of the routemap statements in policybased routing?
B.continue being evaluated against the implicit "permit" statement
C.forwarded using the specified "set" policy
D.forwarded using a policy identical to packets matching a "deny" statement
14.As a Cisco engineer works at XXYYinc.com. With your experience, how you realize to achieve multiple active uplinks and loop prevention in a Cisco Nexus 5000 Switch, using Ethernet Host Virtualizer?
A.by PortChanneling uplink ports
B.by implementing PerVLAN Spanning Tree
C.by pinning MAC addresses to specific ports
D.by tying a server interface to a border interface in the switching fabric
15.You are a help desk trainee for XXYYinc.com. When you deploy the network, what happens after a failure by using the default VDC highavailability options in the Cisco Nexus 7010 Switch?
A.The VDC is deleted and then recreated with startup configuration.
B.If dual supervisors, a supervisor switchover is forced.
C.If single supervisor, a graceful restart is forced.
D.The VDC is deleted and no further action will be performed.
16.You are a Cisco engineer of XXYYinc.com. There is a configuration with following conditions: Nexus(config)# monitor session 1 Nexus(configmonitor)# source interface e2/4
Nexus(configmonitor)# destination interface e2/1 Nexus(configmonitor)# filter vlan55,56
Nexus(configmonitor)# What will be the result of this configuration?
A.SPAN destinations will not get VLANs 55 and 56.
B.One SPAN session is monitored on port e2/4.
C.VLANs 55 and 56 are copied from trunk interface e2/4.
D.VLANs 55 and 56 are monitored on port e/21.
17.Which signature action can be configured only on an IDSM sensor in IPS mode?
A.log packets containing the attacker and victim address pair
B.modify data in the packet
C.send a request to block a connection
D.terminate the TCP flow
18.You work as the network administrator at XXYYinc.com. You are familiar with all kinds of Switches, so as far as you know, what can a Cisco Nexus 7010 Switch administrator do via VDC to provide OOB management?
A.use 802.1Q trunking and provide a separate VLAN via VDC
B.use different OOB management ports for the different VDCs
C.allocate separate VLANs and Virtual Routing and Forwardings via VDC
D.use the same VLAN and subnet for all VDCs, with different IP addresses
19.How can a customer with multiple FWSM contexts limit the number of connections that are permitted in each context?
A.Map the context to a class, and apply resource limits to the class.
B.Map the context to a VLAN, and apply resource limits to the VLAN.
C.Map the context to a class, and apply resource limits to the context.
D.You cannot limit the number of connections that are permitted in a context.
20.You work as the network administrator at XXYYinc.com. You are testing the company network while during failover, what occurs with the MAC address of the standby Hot Standby Router Protocol (HSRP) router?
A.It defaults to the factoryburned MAC address of the standby router.
B.It is reclaimed by the active router.
C.The standby router assumes the virtual MAC address.
D.The standby router sends gratuitous Address Resolution Protocol (ARP) messages.
21.What is required when configuring NTP on the IDSM?
A.Configure an MD5 key.
B.Add a service account for the NTP service.
C.Configure the IDSM host access list to allow access to the NTP server.
D.Associate the VLAN containing the NTP server with the IDSM management port.
22.You are a Cisco engineer of XXYYinc.com. You are maintaining the company network, as much as you know, which of the following information will be included when information gathered during the DCNM initial discovery ?
A.directly connected devices only
B.management information base (MIB) stems
D.Simple Network Management Protocol (SNMP) clients
23.You work as a Cisco engineer at XXYYinc.com. You know Dynamic Host Configuration Protocol (DHCP) well, so how are DHCP messages authenticated in the DHCP snooping process?
A.Untrusted sources are identified by configuring their connecting interfaces.
B.Traffic is blocked if it matches MAC addresses of invalid DHCP servers.
C.Untrusted sources are matched against a database of valid Dynamic Host Configuration Protocol bindings.
D.Trusted sources are matched by identifying RFCconsistent Dynamic Host Configuration Protocol calls.
24.What must you do to enable HTTPS as the access protocol on the NAM?
A.Enable the HTTP server, then enable the SSL service.
B.Install a strong crypto patch on the NAM, then enable the HTTPS server.
C.Ensure that 128bit cryptography is enabled, then enable the HTTPS server.
D.Enable the HTTP server, then issue the http secure server enable command.
25.You are the senior desktop administrator for XXYYinc.com. A potential customer has a question for you: what will the OSPF neighbors do when a router using OSPF Graceful Restart fails?
A.announce their grace period to other active neighbors
B.continue forwarding after switchover
C.continue forwarding during switchover
D.gracefully restart their Open Shortest Path First process
26.Which negotiation is initiated by setting an EtherChannel mode to auto on an interface?
A.to create an EtherChannel
B.to create an EtherChannel only if an LACP is received
C.to create an EtherChannel only if a PAgP packet is received
D.to place the interface in an EtherChannel if the connected interface is also in auto mode
27.You are the senior desktop administrator for XXYYinc.com. There is a consultation from a potential customer: When a failure situation includes a corrupted operating system image and no connectivity per inband management into a Cisco Nexus 7010 Switch , and the system cannot boot up. Which part can be used to resolve the case?
A.ROM monitor mode
B.Universal Serial Bus ports
D.Connectivity Management Processor