[PDF and VCE] CertBus Latest 642-813 Exam Practice Materials Free Downloading

Don’t worry about how to get yourself well prepared your 642-813 exam! CertBus will work you out of your 642-813 exam with the latest updated 642-813 PDF and VCE dumps. CertBus provides the latest real 642-813 exam preparation material, covering every aspect of 642-813 exam curriculum.

We CertBus has our own expert team. They selected and published the latest 642-813 preparation materials from Official Exam-Center: http://www.certgod.com/

QUESTION NO:19

Refer to the exhibit Dynamic ARP inspection is enabled only on switch SW_A. Host_A and Host_B acquire their IP addresses form the DHCP server connected to switch SW_A. what would the outcome be if Host_B initiated an ARP spoof attack toward Host_A?

A. The spoof packets are inspected at the ingress port of switch SW_A and are permitted

B. The spoof packets are inspected at the ingress port of switch SW_A and are dropped

C. The spoof packets are not inspected at the ingress port of switch SW_A and are permitted

D. The spoof packets are not inspected at the ingress port of switch SW_A and are dropped

Correct Answer: C Explanation

Explanation/Reference:

QUESTION NO:11

A network is deployed using recommended practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the two optimal locations for trust boundaries to be configured by the network administrator? (Choose two)

A. Host

B. IP phone

C. Access layer switch

D. Distribution layer switch

E. Core layer switch

Correct Answer: BC Explanation

Explanation/Reference:

QUESTION NO:8

Refer to the exhibit For the configuration shown, which is the recommended method of providing inter VLAN routing?

A. Determine which switch is the root bridge then connect a router on a stick to it

B. Configure SVIs on the core switches

C. Configure SVIs on the distribution switches

D. Configure SVIs on the access layer switches

Correct Answer: C Explanation

Explanation/Reference:

QUESTION NO:14

You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and you have assigned that interface to VLAN 20. To check the status of SVI, you issue the show interfaces vlan 20 command at the CLI prompt. You see from the output display that the interface is in an up/up state. What must be true in a SVI configuration to bring the VLAN and line protocol ip?

A. The port must be physically connected to another Layer 3 device

B. At least one port in VLAN 20 must be active

C. The Layer3 routing protocol must be operational and receiving routing updated from neighboring peer devices

D. Because this is a virtual interface, the operational status is always in an

QUESTION NO:17

hostname Switch1 interface Vlan10 ip address 172.16.10.32 255.255.255.0 no ip redirects standby 1 ip 172.16.10.110 standby 1 timers msec 200 msec 700 standby 1 preempt

hostname Switch2 interface Vlan10 ip address 172.16.10.33 255.255.255.0 no ip redirects standby 1 ip 172.16.10.110 standby 1 timers msec 200 msec 750 standby 1 priority 110 standby 1 preempt

hostname Switch3

interface Vlan10

ip address 172.16.10.34 255.255.255.0

no ip redirects

standby 1 ip 172.16.10.110

standby 1 timers msec 200 msec 750

standby 1 priority 150

standby 1 preempt

Refer to the above. Three switches are configured for HSRP

Switch1 remains in the HSRP listen state. What is the most likely cause of this status?

A. This is normal operation

B. The standby group number does not match de VLAN number

C. Ip addressing is incorrect

D. Priority commands are incorrect

E. Standby timers are incorrect

Correct Answer: A Explanation

Explanation/Reference:

QUESTION NO:10

Refer to the exhibit

Host A has sent an ARP message to the default gateway IP address 10.10.10.1. Which statement is true?

A. Because of the invalid timers that are configured, DSw1 does not reply

B. DSw1 replies with the IP address of the next AVF

C. DSw1 replies with the MAC address of the next AVF

D. Because of the invalid timers that are configured, DS2 does not reply

E. DSw2 replies with the IP address of the next AVF

F. DSw2 replies with the MAC address of the next AVF

Correct Answer: F Explanation

Explanation/Reference:

QUESTION NO:2

When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?

A. No more than one secure MAC address should be set

B. The default is set

C. The IP phone should use a dedicated port, therefore only one MAC address is needed per port

D. No value is needed if the switchport priority extend command is configured

E. No more than two secure MAC addresses should be set

Correct Answer: E Explanation

Explanation/Reference:

QUESTION NO:6

Which statements about the configuration and application of port access control lists is true?

A. PACLs can be applied in the inbound or outbound direction of a Layer2 physical interface

B. At Layer 2, a MAC address PACL takes precedence over any existing Layer 3 PACL

C. When you apply a port ACL trunk port, the ACL filters traffic on all VLANs present on the trunk port

D. PACL are not supported on EtherChannel interfaces

Correct Answer: C Explanation

Explanation/Reference:

QUESTION NO:16

Which statement best describes implementing a Layer 3 EtherChannel?

A. EtherChannel is a Layer2 feature and not a Layer 3 feature

B. Implementation requires switchport mode trunk and matching parameters between switches

C. Implementation requires disabling switchport mode

D. A Layer3 address is assigned to the physical interface

Correct Answer: C Explanation

Explanation/Reference:

QUESTION NO:15

Which description correctly describes a MAC address flooding attack?

A. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device

B. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device the becomes the source address found in the Layer2 frames sent by the valid network device

C. The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch the forwards frames destined for the valid host to the attacking device

D. The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch the forward frames destined for the valid host to the attacking device.

E. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

F. Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

Correct Answer: F Explanation

Explanation/Reference:

642-813 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mdG9zQXJKcHZuczg/view?usp=sharing

642-813 exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/ [100% Exam Pass Guaranteed]

Why select/choose CertBus?

Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.

BrandCertbusTestkingPass4sureActualtestsOthers
Price$45.99$124.99$125.99$189$69.99-99.99
Up-to-Date Dumps
Free 365 Days Update
Real Questions
Printable PDF
Test Engine
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back
Secure Payment
Privacy Protection