Cheat-Test.com - The Worldwide Renowned IT Certification Material Provider!
The safer, easier way to help you pass any IT Certification exams.
We provide high quality IT Certification exams practice questions and answers
(Q&A). Especially Cisco, Microsoft, HP, IBM, Oracle, CompTIA,
Adobe, Apple, Citrix, EMC, Lotus, Nortel, SUN and so on.
And help you pass any IT Certification exams at the first try.
Cheat-Test product Features:
Verified Answers Researched by Industry Experts
Questions updated on regular basis
Like actual certification exams our product is in multiple-choice questions (MCQs).
Our questions and answers are backed by our GUARANTEE.
7x24 online customer service: email@example.com
Click Here to get more Free Cheat-Test Certification exams!
Note:This pdf demo do not include the question's picture.
Exam : Cisco 642-892
Title : Composite Exam
1. Which three IP multicast address related statements are true? (Choose three.)
A. Multicast addresses 22.214.171.124 through 126.96.36.199 are always forwarded because they are transmitted with Time
to Live (TTL) greater than 1.
B. Multicast addresses 188.8.131.52 and 184.108.40.206 are source multicast addresses for OSPF routers.
C. Multicast addresses 220.127.116.11 and 18.104.22.168 are reserved link-local addresses used by PIMv2 and IGMPv3.
D. Because they would map to overlapping IP multicast MAC addresses, multicast addresses 22.214.171.124 and
126.96.36.199 could not be used together.
E. Multicast address 188.8.131.52 has been reserved for the Network Time Protocol (NTP) by the IANA.
F. The administratively scoped multicast addresses 184.108.40.206 through 220.127.116.11 are similar in purpose to RFC
1918 private unicast addresses.
2. Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the
master virtual router and the backup virtual router?
A. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will
become the master virtual router. When Router A recovers, Router B will maintain the role of master virtual router.
B. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will
become the master virtual router. When Router A recovers, it will regain the master virtual router role.
C. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will
become the master virtual router. When Router B recovers, Router A will maintain the role of master virtual router.
D. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will
become the master virtual router. When Router B recovers, it will regain the master virtual router role.
3. In what three ways is QoS applied in the campus network? (Choose three.)
A. No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distribution layer switches and
used to prioritize and queue the traffic as it traverses the core.
B. IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the
access layer as it passes traffic to the distribution layer. The distribution layer, once it has made a switching decision
to the core layer, strips these off.
C. MAC address, Multiprotocol Label Switching (MPLS), the ATM cell loss priority (CLP) bit, the Frame Relay discard
eligible (DE) bit, and ingress interface are established by the voice submodule (distribution layer) as traffic passes to
the core layer.
D. The distribution layer inspects a frame to see if it has exceeded a predefined rate of traffic within a certain time
frame, which is typically a fixed number internal to the switch. If a frame is determined to be in excess of the
predefined rate limit, the CoS value can be marked up in a way that results in the packet being dropped.
E. The access layer is the initial point at which traffic enters the network. Traffic is marked (or remarked) at Layers 2
and 3 by the access switch as it enters the network, or is "trusted" that it is entering the network with the appropriate
F. Traffic inbound from the access layer to the distribution layer can be trusted or reset depending upon the ability of
the access layer switches. Priority access into the core is provided based on Layer 3 QoS tags.
4. Which three statements are true about the voice VLAN feature on a Catalyst 2950 switch? (Choose three.)
A. The CoS value is trusted for 802.1p or 802.1q tagged traffic.
B. The voice VLAN feature is disabled by default.
C. The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.
D. When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the
E. PortFast is automatically disabled when a voice VLAN is configured.
F. The default CoS value for incoming traffic is set to 0.
5. Which three IP multicast group concepts are true? (Choose three.)
A. If a packet is sent to a multicast group address, all members of the multicast group will receive it.
B. If a packet is sent to a multicast group address, the multicast frame contains the source multicast address.
C. A router does not have to be a member of a multicast group to receive multicast data.
D. A router does not have to be a member of a multicast group to send to the group.
E. A router must be a member of a multicast group to receive multicast data.
F. A router must be a member of a multicast group to send to the group.
6. Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?
A. reduction of processing in wireless controllers
B. distributed approach to authentication, encryption, and policy enforcement
C. provides security by blocking communication between access points and wireless clients
D. access point discovery, information exchange, and configuration
7. Refer to the exhibit. Which two statements are correct? (Choose two.)
A. All six routes will be installed in the routing table.
B. Two routes will be installed in the routing table.
C. Four routes will be installed in the routing table.
D. All the routes were redistributed into BGP from an IGP.
E. All the routes were originated by BGP with the network command.
8. Refer to the exhibit. Which two statements are true about the partial configuration that is provided. (Choose two.)
A. All the configured neighbors are in autonomous system 100.
B. The peer group shortens the IBGP configuration.
C. The peer group shortens the EBGP configuration.
D. Only the outgoing filters are applied to BGP updates.
E. Three AS-path filters are applied to each BGP neighbor.
9. Refer to the exhibit. Which statement is true about a voice VLAN?
A. Physically the voice network and the data network are separate.
B. The voice traffic will normally be on a different IP subnet than will the data traffic.
C. End user intervention is necessary to place the phone into the proper VLAN.
D. The same security policy should be implemented for both voice and data traffic.
E. The data VLAN must be configured as the native VLAN.
10. Which three restrictions apply to OSPF stub areas? (Choose three.)
A. No virtual links are allowed.
B. The area cannot be a backbone area.
C. Redistribution is not allowed unless the packet is changed to a type 7 packet.
D. The area has no more than 10 routers.
E. No autonomous system border routers are allowed.
F. Interarea routes are suppressed.
11. Refer to the exhibit. Which statement is true about the 18.104.22.168/24 prefix?
A. If another path advertises the 22.214.171.124/24 path and has the default local preference, that path is more preferred.
B. The command neighbor send-community is configured on BGP neighbor 10.10.23.3.
C. The route 10.10.23.3 is not being advertised to other BGP neighbors.
D. Route 126.96.36.199/24 is learned by an IBGP peer.
12. Refer to the exhibit. Which statement is true?
A. Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor.
B. Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor.
C. Only traffic with a destination from 10.10.0.0/19 will be permitted.
D. Only traffic going to 10.10.0.0/19 will be permitted.
13. Which three WLAN statements are true? (Choose three.)
A. A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B. A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN.
C. Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D. Another term for infrastructure mode is independent service set (IBSS).
E. The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access
F. WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
14. Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)
A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A.
C. If another router were added to this GLBP group, there would be two backup AVGs.
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG.
15. Refer to the exhibit. What is the effect on the trust boundary of configuring the command mls qos trust cos on the
switch port that is connected to the IP phone?
A. Effectively the trust boundary has been moved to the IP phone.
B. The host is now establishing the CoS value and has effectively become the trust boundary.
C. The switch is rewriting packets it receives from the IP phone and determining the CoS value.
D. The switch will no longer tag incoming voice packets and will trust the distribution layer switch to set the CoS.
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.
16. Refer to the output. What IOS command produces this output?
A. show ip ospf
B. show ip ospf interface
C. show ipv6 ospf interface
D. show ipv6 ospf
17. Which two multicast protocol statements are true? (Choose two.)
A. Dense mode multicast requires explicit join messages from their members.
B. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted
C. Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.
D. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E. The primary use of sparse mode multicast is for test labs and router performance testing.
18. What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp
command output? (Choose two.)
A. The network was originated via redistribution of an interior gateway protocol into BGP.
B. The network was defined by a static route.
C. The network was originated via a network or aggregate command.
D. The network was learned via EBGP.
E. The network was learned via IBGP.
19. Refer to the exhibit. What is the effect when the switchport priority extend cos 3 command is configured on the
switch port interface connected to the IP phone?
A. Effectively, the trust boundary has been moved to the PC attached to the IP phone.
B. The computer is now establishing the CoS value and has effectively become the trust boundary.
C. The IP phone is enabled to override with a CoS value of 3 the existing CoS marking of the PC attached to the IP
D. The switch will no longer tag incoming voice packets and will extend the trust boundary to the distribution layer
E. RTP will be used to negotiate a CoS value based upon bandwidth utilization on the link.
20. Which statement about the Lightweight Access Point Protocol (LWAPP) is true?
A. LWAPP encrypts control traffic between the AP and the controller.
B. LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP.
C. LWAPP encrypts both control traffic and user data.
D. When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
21. Which two Aironet enterprise solution statements are true? (Choose two.)
A. A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request
frames from clients.
B. A Cisco Aironet solution includes intelligent Cisco Aironet access points (APs) and Cisco Catalyst switches.
C. In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command
D. The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those
items which are not time sensitive.
E. Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN
22. Into which two types of areas would an area border router (ABR) inject a default route? (Choose two.)
A. the autonomous system of a different interior gateway protocol (IGP)
B. area 0
C. totally stubby
F. the autonomous system of an exterior gateway protocol (EGP)
23. Which command enables OSPF for IPv6?
A. router ospf process-id
B. ipv6 ospf process-id
C. ipv6 router ospf process-id
D. router ospf ipv6 process-id
24. Which statement is true about IP telephony calls?
A. A Voice over IP (VoIP) packet consists of the voice payload, IP header, TCP header, RTP header, and Layer 2 link
B. The voice carrier stream uses H.323 to set up, maintain, and tear down call endpoints.
C. Call control signaling uses Real-Time Transport Protocol (RTP) packets that contain actual voice samples.
D. The sum of bandwidth necessary for each major application, including voice, video, and data, should not exceed 75
percent of the total available bandwidth for each link.
25. Which three IP multicast related statements are true? (Choose three.)
A. Multicast addresses 188.8.131.52 through 184.108.40.206 are called globally scoped addresses. They are used to
multicast data between organizations and across the Internet.
B. The multicast address 220.127.116.11 is a globally scoped address that has been reserved for the Network Time
Protocol (NTP) by the IANA.
C. Multicast addresses 18.104.22.168 through 22.214.171.124 are called limited scope addresses. They are constrained
to a local group or organization.
D. Multicast addresses 126.96.36.199 and 188.8.131.52 are limited scoped addresses that have been reserved for OSPF.
E. Multicast addresses 184.108.40.206 through 220.127.116.11 are used for network protocols on local LAN segments.
Because they are always transmitted with a Time to Live (TTL) of 1, they are never forwarded by a router.