Wednesday, August 24, 2016

642-883 SPROUTE Deploying Cisco Service Provider Network Routing

Exam Number 642-883 SPROUTE
Associated Certifications CCNP Service Provider
Duration 90 minutes (65 - 75 questions)
Available Languages English

The 642-883 SPROUTE Deploying Cisco Service Provider Network Routing exam is associated with the CCNP Service Provider certification. This exam tests a candidate's knowledge in configuring, verifying, and troubleshooting IPv4 and IPv6 advanced OSPF and IS-IS configuration, BGP configuration, using Cisco IOS-XR RPL to implement routing policies, and implementing high availability routing supporting a service provider network. This exam covers the Cisco IOS, IOS-XE and IOS-XR operating systems. Candidates can prepare for this exam by taking the Deploying Cisco Service Provider Network Routing (SPROUTE) course. The exam is closed book and no outside reference materials are allowed.

The 642-883 SPROUTE Deploying Cisco Service Provider Network Routing exam is associated with the CCNP® Service Provider certification. This 90-minute, 65−75 questions exam tests a candidate's knowledge in configuring, verifying, and troubleshooting IPv4 and IPv6 advanced OSPF and IS-IS configuration, BGP configuration, using Cisco IOS-XR RPL to implement routing policies, and implementing high availability routing supporting a service provider network. This exam covers the Cisco IOS, IOS-XE and IOS-XR operating systems. Candidates can prepare for this exam by taking the Deploying Cisco Service Provider Network Routing (SPROUTE) course. The exam is closed book and no outside reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 OSPFv2 and OSPFv3 Routing in Service Provider Environments 19%
1.1 Describe multi-area OSPFv2 and OSPFv3 operations
1.2 Implement multi-area OSPFv2 and OSPFv3 on IOS-XR and IOS-XE
1.3 Implement different OSPF areas (stubby, totally stubby, NSSA) on IOS-XR and IOS-XE
1.4 Implement OSPF neighbor authentication on IOS-XR and IOS-XE
1.5 Troubleshoot OSPF IOS-XR and IOS-XE configuration errors

2.0 IS-IS, IPv4, and IPv6 in Service Provider Environments 19%
2.1 Describe multi-area IS-IS operations
2.2 Implement multi-area IS-IS for IPv4 and IPv6 on IOS-XR and IOS-XE
2.3 Implement IS-IS neighbor authentication on IOS-XR and IOS-XE
2.4 Troubleshoot IS-IS IOS-XR and IOS-XE configuration errors

3.0 BGP Routing in Service Provider Environments 22%
3.1 Describe the Internet routing hierarchy: Network Service Providers (NSP), Network Access Point (NAP), ISP Tiers (Tier 1, 2 and 3)
3.2 Describe connectivity between an enterprise network and an SP that requires the use of BGP
3.3 Describe connectivity between a SP and upstream SPs
3.4 Describe BGP transit AS operations
3.5 Implement EBGP and IBGP on IOS-XR and IOS-XE
3.6 Implement BGP neighbor authentication on IOS-XR and IOS-XE
3.7 Optimize BGP IOS-XR configurations using af-groups, session-groups, and neighbor-groups
3.8 Optimize BGP IOS-XE configurations using peer-groups
3.9 Influence BGP route selection by using various BGP attributes on IOS-XR and IOS-XE
3.10 Troubleshoot BGP IOS-XR and IOS-XE configuration errors

4.0 Route Manipulations in Service Provider Environments 21%
4.1 Implement Routing Policy Language (RPL) to configure a desired routing policy on IOS-XR
4.2 Implement Route-Maps to configure a desired routing policy on IOS-XE
4.3 Implement route filterings using prefix-list, distribute-list, and as-path list on IOS-XE
4.4 Implement route redistributions on IOS-XR and IOS-XE

5.0 High Availability Routing Features 19%
5.1 Implement NSF/NSR/Graceful Restart for OSPF on IOS-XR and IOS-XE
5.2 Implement NSF/NSR/Graceful Restart for IS-IS on IOS-XR and IOS-XE
5.3 Implement Bidirectional Forwarding Detection (BFD) for OSPF on IOS-XR and IOS-XE
5.4 Implement Bidirectional Forwarding Detection (BFD) for IS-IS on IOS-XR and IOS-XE

QUESTION 1
When troubleshooting OSPF neighbor errors, which three verification steps should be considered?
(Choose three.)

A. Verify if neighboring OSPF interfaces are configured in the same area.
B. Verify if neighboring OSPF interfaces are configured with the same OSPF process ID.
C. Verify if neighboring OSPF interfaces are configured with the same OSPF priority.
D. Verify if neighboring OSPF interfaces are configured with the same hello and dead intervals.
E. Verify if neighboring OSPF interfaces are configured with the same area type.

Answer: A,D,E

Explanation:


QUESTION 2
On Cisco IOS XR Software, which set of commands is used to enable the gi0/0/0/1 interface for
OSPF in area 0?

A. interface gi0/0/0/0
ip address 10.1.1.1 255.255.255.0
!
router ospf 1
network 10.1.1.1 0.0.0.0 area 0
B. interface gi0/0/0/0
ip address 10.1.1.1 255.255.255.0
!
router ospf 1
network 10.1.1.1 255.255.255.255 area 0
C. router ospf 1
area 0
interface GigabitEthernet0/0/0/1
D. interface gi0/0/0/0
ip address 10.1.1.1 255.255.255.0
ip ospf 1 area 0
E. router ospf 1
address-family ipv4 unicast
interface GigabitEthernet0/0/0/1 area 0
F. router ospf 1
address-family ipv4 unicast
interface GigabitEthernet0/0/0/1
area 0

Answer: C

Explanation:


QUESTION 3
Which three statements are true regarding the OSPF router ID? (Choose three.)

A. The OSPF routing process chooses a router ID for itself when it starts up.
B. The router-id command is the preferred procedure to set the router ID.
C. If a loopback interface is configured, its address will always be preferred as the router ID over
any other methods.
D. After the router ID is set, it does not change, even if the interface that the router is using for the
router ID goes down. The router ID changes only if the router reloads or if the OSPF routing
process restarts.
E. In OSPF version 3, the OSPF router ID uses a 128-bit number.

Answer: A,B,D

Explanation:


QUESTION 4
Which two OSPF network scenarios require OSPF virtual link configuration? (Choose two.)

A. to connect an OSPF non-backbone area to area 0 through another non-backbone area
B. to connect an NSSA area to an external routing domain
C. to connect two parts of a partitioned backbone area through a non-backbone area
D. to enable route leaking from Level 2 into Level 1
E. to enable route leaking from Level 1 into Level 2
F. to enable OSPF traffic engineering

Answer: A,C

Explanation:


QUESTION 5
In comparing IS-IS with OSPF, a Level-1-2 IS-IS router is similar to which kind of OSPF router?

A. ASBR on a normal OSPF area
B. ASBR on NSSA
C. ABR on totally stubby OSPF area
D. ABR on stubby OSPF area
E. ABR on a normal OSPF area

Answer: C

Explanation:


Tuesday, August 16, 2016

642-737 IAUWS Implementing Advanced Cisco Unified Wireless Security

Exam Number 642-737 IAUWS
Last day to test: September 21, 2016
Associated Certifications CCNP Wireless
Duration 90 minutes (50 - 60 questions)
Available Languages English
Register Pearson VUE

The Implementing Advanced Cisco Unified Wireless Security exam is the exam associated with the CCNP Wireless certification. This exam assesses a candidate's capability to secure the wireless network from security threats via appropriate security policies and best practices, to properly implement security standards, and to properly configure wireless security components. Candidates can prepare for this exam by taking the IAUWS Implementing Advanced Cisco Unified Wireless Security course.

Exam Description
The Implementing Advanced Cisco Unified Wireless Security (IAUWS) version 2.0 642-737 exam is a 90-minute test with 55−75 questions that are associated with the Cisco CCNP® Wireless certification. This exam assesses a candidate's ability to secure the wireless network from security threats via appropriate security policies and best practices, properly implement security standards, and properly configure wireless security components. The exam is closed book and no outside reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Integrate Client Device Security 22%

1.1 Describe the EAP authentication process

1.2 Configure client for secure EAP authentication

1.3 Configure the Cisco any connect client

1.4 Describe the impact of security configurations on application and client roaming

1.5 Troubleshoot client wireless authentication issues

1.5.a Packet analyzers
1.5.b Debugs
1.5.c Logs
1.5.d Cisco WCS
1.5.e ACS

1.6 Identify client security risks

1.6.a Driver update
1.6.b MS hot fixes

2.0 Design and Integrate Wireless Network with NAC 11%

2.1 Describe the architectures

2.1.a In-band
2.1.b Out-of-band
2.1.c Agent versus agentless
2.1.d Cisco NAC appliance

2.2 Describe the high-level authentication process flow

2.2.a CAS
2.2.b CAM
2.2.c RADIUS/ACS
2.2.d WLC
2.2.e External authentication sources

2.3 Configure the WLC for the NAC

2.4 Verify wireless authentication with NAC

3.0 Implement Secure Wireless Connectivity Services 22%

3.1 Configure authentication

3.1.a Controller local EAP with or without external
3.1.b LDAP database
3.1.c Client authentication on H-REAP APs
3.1.d 802.1X authentication for AP authentication to the switch

3.2 Configure autonomous AP for RADIUS authentication

3.3 Configure management frame protection on clients, APs, and controllers

3.4 Configure IBN

3.4.a RADIUS-based VLAN and ACLs
3.4.b AAA override

3.5 Define ACS parameters for integration with wireless network

3.6 Define client and server-side digital certificate requirements

3.7 Implement ACLs on controller

3.7.a CPU ACLs
3.7.b WLAN, interface, and client identity ACL

3.8 Troubleshoot secure wireless connectivity services

3.8.a Packet analyzers, debugs, logs, WCS, and ACS
3.8.b Verify firewall ports
3.8.c ACS and controller authorization and authentication for clients

4.0 Design and Implement Guest Access Services 12%

4.1 Describe the architectures for guest access services

4.1.a VLAN-based
4.1.b Anchor, DMZ, redundancy, and scaling
4.1.c NAC guest server
4.1.d Wired guest access
4.1.e Bandwidth limiting

4.2 Configure guest access accounts

4.2.a Lobby ambassador (controller and WCS-based)
4.2.b Guest roles

4.3 Configure controller web authentication

4.3.a Pass-through
4.3.b Internal and external
4.3.c Authentication (local/RADIUS)
4.3.d Custom splash page (internal, external, and per WLAN)
4.3.e Understand design considerations (DNS, proxy)
4.3.f Pre-authentication ACL
4.3.g Wired guest access
4.3.h Install third-party certificate on controller

4.4 Configure the anchor and internal controllers

4.5 Troubleshoot guest access issues

4.5.a Packet analyzers, debugs, logs, WCS, and ACS
4.5.b Verify firewall ports
4.5.c Mping and eping
4.5.d Proxies

5.0 Translate Organizational and Regulatory Security Policies and Enforce Security Compliance 11%

5.1 Describe regulatory compliance considerations

5.1.a HIPAA
5.1.b PCI
5.1.c SOX
5.1.d FERPA

5.2 Segment traffic into different VLANs, based upon these functions:

5.2.a Security
5.2.b Application
5.2.c QoS

5.3 Configure administration security on controller and WCS

5.3.a TACACS+ and ACS integration
5.3.b Local
5.3.c RADIUS and AAA server integration
5.3.d Access point administration credential
5.3.e Admin roles

5.4 Manage WLC and WCS alarms

5.4.a SNMP and trap receivers
5.4.b Syslog
5.4.c SMTP
5.4.d ACS log
5.4 e Modify WCS alarm levels

5.5 Utilize security audit tools

5.5.a Packet captures
5.5.b Penetration testing
5.5.c Third-party software (air magnet, air wise)
5.5.d PCI audit tool in WCS

6.0 Configure Native WLC Security Feature Sets: IPS/IDS 11%

6.1 Utilize WCS or controller for IDS and threat mitigation strategies

6.1.a Signature
6.1.b Custom signature
6.1.c Rogue classification management and (auto) containment
6.1.d Rogue reporting and location (WCS only)
6.1.e Switch port tracing (WCS only)
6.1.f Integrate Cisco spectrum expert with WCS
6.1.g Client exclusion
6.1.h Clean air

6.2 Identify and mitigate wireless vulnerabilities

6.2.a Wireless packet injection (can't be mitigated)
6.2.b Client misconfiguration
6.2.c DoS (RF jamming)
6.2.d Anomalous behavior attacks (association and authentication attacks)
6.2.e Signature attacks (net stumbler and undetectable at this time)
6.2.f Eavesdropping (wild packets and honeypot)
6.2.g Hijacking and mimicry (evil twin and honey potting)
6.2.h Social engineering (human attack)

7.0 Integrate Wireless Network with Advanced Security Platforms 11%

7.1 Describe Cisco end-to-end security solutions and how they integrate with Cisco wireless solutions

7.1.a any connect 3.0 and above
7.1.b NAC appliance
7.1.c NAC guest server
7.1.d Wired IPS
7.1.e ACS

7.2 Describe the Cisco unified wireless network firewall port configuration requirements

7.2.a ACLs
7.2.b IP port pass-through
7.2.c DMZ

7.3 Configure the controller for wired IPS and IDS

7.4 Configure wireless intrusion prevention system (MSE)

QUESTION 1
Which statement describes the major difference between PEAP and EAP-FAST client
authentication?

A. EAP-FAST requires a backend AAA server, and PEAP does not.
B. EAP-FAST is a Cisco-only proprietary protocol, whereas PEAP is an industry-standard
protocol.
C. PEAP requires a server-side certificate, while EAP-FAST does not require certificates.
D. PEAP authentication protocol requires a client certificate, and EAP-FAST requires a secure
password.

Answer: C

Explanation:


QUESTION 2
Which one best describes the EAP Identity Request frame when a wireless client is connecting to
a Cisco WLC v7.0-based AP WLAN?

A. sourced from the Cisco ACS Server to the client
B. sourced from the client to the Cisco ACS Server
C. sourced from the WLC to the client
D. sourced from the client to the WLC
E. sourced from the AP to the client
F. sourced from the client to the AP

Answer: C

Explanation:


QUESTION 3
What are the four packet types that are used by EAP? (Choose four.)

A. EAP Type
B. EAP Request
C. EAP Identity
D. EAP Response
E. EAP Success
F. EAP Failure
G. EAP Authentication

Answer: B,D,E,F

Explanation:


QUESTION 4
When a supplicant and AAA server are configured to use PEAP, which mechanism is used by the
client to authenticate the AAA server in Phase One?

A. PMK
B. shared secret keys
C. digital certificate
D. PAC

Answer: C

Explanation:


QUESTION 5
Which EAP types are supported by MAC 10.7 for authentication to a Cisco Unified Wireless
Network?

A. LEAP and EAP-Fast only
B. EAP-TLS and PEAP only
C. LEAP, EAP-TLS, and PEAP only
D. LEAP, EAP-FAST, EAP-TLS, and PEAP

Answer: D

Explanation:

Thursday, August 11, 2016

642-732 CUWSS Conducting Cisco Unified Wireless Site Survey

Exam Number 642-732 CUWSS
Associated Certifications CCNP Wireless
Duration 75 minutes (50 - 60 questions)
Available Languages English
Register Pearson VUE

The CUWSS Conducting Cisco Unified Wireless Site Survey exam is the exam associated with the CCNP Wireless certification. This exam assesses a candidate's capability to plan and conduct a wireless site survey, to design the RF network and to conduct a post installation assessment to ensure compliancy. Candidates can prepare for this exam by taking the CUWSS Conducting Cisco Unified Wireless Site Survey course.

The Conducting Cisco Unified Wireless Site Survey (CUWSS) version 2.0 642-732 exam is a 75-minute test with 45−65 questions that are associated with the Cisco CCNP® Wireless certification. This exam assesses a candidate's ability to plan and conduct a wireless site survey, design the RF network, and conduct a post installation assessment to ensure compliance. The exam is closed book and no outside reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Prepare for the Site Survey 16%

1.1 Identify customer requirements

1.1.a Business and RF application needs (voice, data, location)
1.1.b Industry vertical
1.1.c Customer questionnaire

1.2 Identify customer facility requirements

1.2.a Single floor
1.2.b Multi floor
1.2.c Campus (indoor and outdoor)
1.2.d Warehouse
1.2.e Obtain digital floor plans from customer

1.3 Identify customer requirements for type of client devices

1.4 Identify regulatory issues

1.4.a Country codes (-e, -i, -a, -n)

1.5 Identify safety and aesthetic considerations

1.5.a NEC ratings
1.5.b Fire codes
1.5.c OSHA
1.5.d MSHA
1.5.e Site-specific hazard awareness

1.6 Assess existing network infrastructure

1.7 Assess logistical considerations

1.7.a Resources
1.7.b Time
1.7.c Access
1.7.d Deployment requirements

1.8 Determine IEEE 802.11n impact on network infrastructure

2.0 Plan for the Site Survey 16%

2.1 Select proper survey model

2.1.a Data
2.1.b Voice
2.1.c Video
2.1.d Location
2.1.e Bridging (point-to-point; point-to-multipoint)
2.1.f Hybrid

2.2 Determine proper deployment characteristics

2.2.a Dense deployment
2.2.b Highly mobile (many cells, high reliability, and fast-moving clients) versus nomadic (temporary position)
2.2.c Indoor and outdoor mesh
2.2.d Use predictive Cisco WCS planning tools

2.3 Select survey equipment

2.4 Determine site survey best practices for customer environment

2.5 Identify impact of material attenuation

2.6 Identify survey documentation needed for customer report

3.0 Conduct the Site Survey 30%

3.1 Conduct a layer 1 survey (Cisco Spectrum Expert)

3.2 Select proper antenna to conduct the site survey

3.3 Conduct the layer 2 site survey for indoor environment

3.3.a Select proper access point to conduct the site survey (use what is purchased)
3.3.b Configure access point
3.3.c Survey with proper client
3.3.d Utilize proper survey techniques

3.4 Conduct the layer 2 site survey for outdoor point-to-point and point-to-multipoint networks

3.5 Conduct the layer 2 site survey for outdoor mesh network

4.0 Design the RF Network 12%

4.1 Determine infrastructure requirements


4.1.a AC power and PoE
4.1.b Understand cable plant considerations
4.1.c Mounting considerations: NEMA
4.1.d Outdoor grounding and lightning protection
4.1.e Rack capacity
4.1.f Switch port capacity

4.2 Determine the AP count and subsequent controller and license requirements

4.2.a Autonomous versus controller-based deployment

4.3 Generate the WLAN design documentation

4.3.a Indoor
4.3.b Outdoor mesh
4.3.c Outdoor point-to-point and multipoint

5.0 Conduct Post-Deployment Assessment 26%

5.1 Verify RF coverage

5.1.a Utilize tools (for example, air magnet) for audit
5.1.b RRM, controller, network appliance tweaks

5.2 Verify network applications and performance

5.2.a Apply WCS tools (voice readiness, location readiness, site calibration)

5.3 Reconcile any deployment issues

5.4 Assemble and deliver installation report to customer

QUESTION 1
During the site survey kick-off meeting with your customer, they ask why you need to verify the existing network infrastructure. Which two reasons do you give them? (Choose two.)

A. You need to verify the make, model, and software versions of all the equipment that will connect to the WLAN components in order to ensure compatibility.
B. You need to verify that the equipment the WLAN components will connect to has sufficient memory capacity to support the additional WLAN connections.
C. You need to verify that there are sufficient switch ports to support the new WLAN connections.
D. You need to verify that the switches the WLAN components will connect to can supply 802.3af inline power, and that they have sufficient ports to support all the new WLAN devices.
E. Depending on the type of APs that are planned for, the deployment may require different types of PoE to be supplied by the LAB switches.

Answer: C,D


QUESTION 2
You have a customer that is building a new campus of four 3-story buildings that you have just completed the site survey for. The customer is interested in the amount of rack space they will need to allocate in either the building MDF or in the data center for controllers.
Each building is going to require 75 APs to support voice and data. How should the controllers be deployed to provide the least number of controllers, the highest redundancy, and the easiest management?

A. Use the distributed deployment method in each building MDF with the N + N redundancy method.
B. Use the centralized deployment method in the data center with the N + N + 1 redundancy method.
C. Use the distributed deployment method in each building MDF with the N + 1 redundancy method.
D. Use the centralized deployment method in the data center with the N + 1 redundancy method.
E. Use the distributed deployment method in each building MDF with the N + N +1 redundancy method.
F. Use the centralized deployment method in the data center with the N + N redundancy method.

Answer: B


QUESTION 3
What is the result of a Cisco 1250 AP deployed for 802.11a/b/g/n using optimized power (16.8 W) with software version 7.0?

A. One spatial stream per radio
B. One spatial stream on 2.4 GHz and two spatial streams on 5 GHz
C. One spatial steam on 5 GHz and two spatial streams on 2.4 GHz
D. Reduced power on both radios
E. Reduced power on 2.4 GHz radio only
F. Reduced power on 5 GHz radio only

Answer: E


QUESTION 4
Which piece of information gathered during a WLAN site survey should be included in the customer report?

A. Analysis of server location and applications supported.
B. Analysis of fiber-optic backbone infrastructure.
C. Output from Cisco WCS Location Quality Inspector.
D. Output from Cisco WCS VoWLAN Voice Readiness Tool.
E. Output from Cisco WCS Planning Mode Tool.

Answer: E


QUESTION 5
In evaluating a post-installation WLAN deployment, problems are occurring when a client roams from one AP to another. The client bounces back and forth between APs. Which three items can be checked to resolve this issue? (Choose three.)

A. When a client roams from one AP to the next, check the client RSSI and SNR levels for both APs at the roaming point.
B. Simplify 802.1X/EAP by moving from external RADIUS to local authentication.
C. Verify the authentication being used for the same test that the client would use under production.
D. Check if the roaming settings in the AP are set properly for non-CCX clients.
E. Check the RF levels of the first AP as the client moves toward the second AP.
F. Check that the client roaming parameters are set properly.

Answer: A,C,E

Sunday, August 7, 2016

640-916 DCICT Introducing Cisco Data Center Technologies

640-916 DCICT Introducing Cisco Data Center Technologies

Exam Number 640-916 DCICT
Associated Certifications CCNA Data Center Certification
Duration 90 minutes (65-75 questions)
Available Languages English
Register Pearson VUE

This exam tests a candidate's knowledge of fundamental Data center technologies like network and server Virtualization, Storage, Convergent I/O and network services like load balancing.

The 640-916 DCICT "Introducing Cisco Data Center Technologies" is one of the exams associated with the CCNA® Data Center certification. This 90-minute, 65−75 questions exam tests a candidate's knowledge of fundamental Data Center technologies like network and server Virtualization, Storage, Convergent I/O and network services like load balancing.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Cisco Data Center Fundamentals Concepts 30%

1.1 Describe network architectures for the Data Center describe the purpose and functions of various network devices

1.1.a LAN
1.1.b SAN

1.2 Describe the Modular Approach in Network Design

1.3 Describe the data center core layer

1.4 Describe the data center aggregation layer

1.5 Describe the data center access layer

1.6 Describe the collapse core model

1.7 Describe FabricPath

1.8 Identify key differentiator between DCI and network interconnectivity

1.9 Describe, configure, and verify vPC

1.10 Describe the functionality of and configuration of port channels

1.11 Describe and configure virtual device context (VDC)

1.12 Describe the edge/core layers of the SAN

1.13 Describe the Cisco Nexus product family

1.14 Configure and verify network connectivity

1.15 Identify control and data plane traffic

1.16 Perform initial set up

2.0 Data Center Unified Fabric 20%

2.1 Describe FCoE

2.2 Describe FCoE multihop

2.3 Describe VIFs

2.4 Describe FEX products

2.5 Perform initial set up

3.0 Storage Networking 18%

3.1 Describe initiator target

3.2 Verify SAN switch operations

3.3 Describe basic SAN connectivity

3.4 Describe the different storage array connectivity

3.5 Verify name server login

3.6 Describe, configure, and verify zoning

3.7 Perform initial set up

3.8 Describe, configure, and verify VSAN

4.0 DC Virtualization 14%

4.1 Describe device Virtualization

4.2 Describe Server Virtualization

4.3 Describe Nexus 1000v

4.4 Verify initial set up and operation for Nexus 1k

5.0 Unified Computing 17%

5.1 Describe and verify discovery operation

5.2 Describe, configure, and verify connectivity

5.3 Perform initial set up

5.4 Describe the key features of UCSM

6.0 Data Center Network Services 1%

6.1 Describe standard ACE features for load balancing

6.2 Describe server load balancing virtual context and HA

6.3 Describe server load balancing management options

6.4 Describe the benefits of Cisco Global Load Balancing Solution

6.5 Describe how the Cisco global load balancing solution integrates with local Cisco load balancers

6.6 Describe Cisco WAAS needs and advantages in the Data Center.

QUESTION 1
Which SAN port type allows multihop FCoE between two SAN switches?

A. VN
B. VE
C. VF
D. E

Answer: B


QUESTION 2
Which two switches does Cisco recommend for small and medium-sized organizations to provide a cost-effective solution for the Fibre Channel SAN edge? (Choose two.)

A. Cisco MDS 9250i
B. Cisco MDS 9506
C. Cisco MDS 9148
D. Cisco MDS 9509

Answer: A,C


QUESTION 3
Which interface provides heartbeat messages between the VSM and VEM?

A. control
B. management
C. packet
D. backplane
E. SVI

Answer: A


QUESTION 4
Which command issued on the Cisco Nexus 1000V VSM validates the connection to the VMware vCenter server?

A. N1000v-VSM# show vmware-vim
B. N1000v-VSM# show connections vmware
C. N1000v-VSM# show svs connections
D. N1000v-VSM# show vcenter status

Answer: C


QUESTION 5
An engineer is configuring the UCS Fabric Interconnects for network connectivity to the data center LAN and SAN. What two ports types need to be configured to allow traffic to flow properly? (Choose two.)

A. Ethernet uplink
B. server
C. appliance
D. Fibre Channel uplink
E. Fibre Channel storage

Answer: A,D

Monday, August 1, 2016

640-878 SPNGN2 Building Cisco Service Provider Next-Generation Networks Part 2

Exam Number 640-878 SPNGN2
Associated Certifications CCNA Service Provider
Duration 90 minutes (65-75 questions)
Available Languages English
Register Pearson VUE

The 640-878 Building Cisco Service Provider Next-Generation Networks, Part 2 exam is associated with the Cisco CCNA Service Provider certification. This exam tests the knowledge and skills that are necessary to implement and support a service provider network. Candidates can prepare for this exam by taking the Building Cisco Service Provider Next-Generation Networks, Part 2 (SPNGN2) course.

The "Building Cisco Service Provider Next-Generation Networks (SPNGN2), Part 2" (640-875) exam is associated with the CCNA® SP certification. This exam tests a candidates knowledge and skills necessary to implement and support a service provider network. Candidates can prepare for this 90-minute, 65-75 questions exam by taking the "Building Cisco Service Provider Next-Generation Networks (SPNGN2), Part 2" course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 IP NGN Architecture 21%
1.1 Identify the functional components required to meet a given network specification

1.2 Troubleshoot common network problems at layers 1, 2, 3, 4, and 7 using a layered model approach

1.3 Describe the different types of service providers

1.4 Describe service provider principal and reference NGN architecture

1.5 Describe the IP address and AS number allocation process via IANA/RIRs

2.0 Switched Network Technologies II 23%
2.1 Configure enhanced switching technologies (including RSTP, MST, and PVSTP) on Cisco IOS switches

2.2 Describe how VLANs create logically separate networks and the need for routing between them

2.3 Configure VLANs on Cisco IOS switches

2.4 Configure trunking on Cisco IOS switches

2.5 Configure InterVLAN routing

2.6 Configure REP on Cisco IOS switches

2.7 Configure QinQ on Cisco IOS Switches

3.0 Routed Network Technologies II 24%
3.1 Configure basic single area OSPFv2 and OSPFv3 routing on Cisco Routers

3.2 Configure basic single area IS-IS routing on Cisco routers

3.3 Describe the differences between static versus dynamic routing, as well as distance vector versus link-state routing protocol operations

3.4 Configure basic BGP routing on Cisco routers

3.5 Describe the address family concept on Cisco routers

3.6 Describe IPv6 transitioning technologies

3.7 Configure first hop router redundancy protocol (HSRP, VRRP, GLBP on Cisco routers

3.8 Implement ACL on Cisco routers

3.9 Describe Carrier Grade NAT and NAT64

3.10 Describe MPLS functions in the SP IP NGN

3.11 Configure LDP on Cisco routers

4.0 Cisco Operating Systems and Platforms II 32%

4.1 Manage the IOS XR configurations and software packages

4.2 Describe IOS XE software packagings

4.3 Describe Cisco SP router platforms, their operating system and placement in the SP IP NGN



QUESTION 1
Which spanning-tree mode can be used to map several VLANs to a single spanning-tree
instance?

A. MST
B. PVST+
C. PVRST+
D. RSTP

Answer: A

Explanation:


QUESTION 2
Which spanning-tree mode uses the name command to configure a region name?

A. MST
B. PVST+
C. PVRST+
D. RSTP

Answer: A

Explanation:


QUESTION 3
Which procedure is used as the last resort disaster recovery procedure to completely replace the
currently installed IOS XR software on Cisco IOS XR routers?

A. netboot
B. turboboot
C. install recovery
D. install rollback
E. install add and install activate

Answer: B

Explanation/Reference:
http://www.cisco.com/en/US/docs/routers/crs/software/crs_r4.0/migration/guide/tbupgapp.pdf


QUESTION 4
Which file extension indicates a bootable installation file in Cisco IOS XR software?

A. .bin
B. .tar
C. .smu
D. .pie
E. .vm
F. .mini

Answer: E

Explanation/Reference:




QUESTION 5
When configuring an ACL entry, which network and wildcard mask matches only IP addresses
10.8.144.0 to 10.8.151.255?

A. 10.8.144.0 0.0.3.255
B. 10.8.144.0 0.0.7.255
C. 10.8.144.0 0.0.15.255
D. 10.8.144.0 0.0.252.255
E. 10.8.144.0 0.0.248.255
F. 10.8.144.0 0.0.240.255

Answer: B

Explanation: