[Exact] 642-384 Cisco real exam 81-96 (Apr 2016)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 642-384 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/642-384-dumps.html


Real of 642-384 training materials and testing software for Cisco certification for candidates, Real Success Guaranteed with Updated 642-384 pdf dumps vce Materials. 100% PASS Cisco Express Foundation for Field Engineers(CXFF) exam Today!

2016 Apr 642-384 Study Guide Questions:

Q81. Which command can be used to verify that RIPv2 is running on a router?

A. show startup-config

B. show ip route

C. showip route rip

D. Show ip protocols

Answer: D


Q82. Refer to the Exhibit. According to Cisco VPN Client Software output Shown, Which two Statement are correct about the connection entry named isr? (Choose Two)


A. HMAC.SHA1 is used to authenticate the remote users.

B. Preshared key is used to authenticate the remote peer

C. AES is used to provide data confidentiality.

D. The Cisco VPN Client software is assigned an internal IP address of 192.168.1.1.

E. The PC that is running the Cisco vpn Client software win not have access to the local LAN once the PC is connected into the VPN

Answer: BE


Q83. Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System? (Choose two)

A. allow for guest access

B. increase connection speeds

C. add additional access points

D. network management with CLI

Answer: AC


Q84. Which two statements best describe the wireless core feature set using autonomous access points when implementing repeater topology? (Choose two.)

A. RF overlap between access points should be 10 to 15 percent with unique channels configured.

B. RF overlap between primary and repeater access points should be 10 to 15 percent with the same channel configured.

C. RF overlap between primary and repeater access points should be 50 percent with the same channel configured

D. RF overlap between primary and repeater access points should be 50 percent with unique channels configured.

E. Clients that are associated with the repeater access point will have 10 to 15 percent less data throughput than clients that are associated with the primary root access point.

F. Clients that are associated with the repeater access point will have 50 percent less data throughput than clients that are associated with the primary root access point

Answer: CF


Q85. What are two ways to secure traffic across a network? (Choose two)

A. Cisco ISR G2

B. Identify-management devices

C. ACLs

D. Firewalls

E. VPN connection

F. VLANs

Answer: DE


642-384 simulations

Latest 642-384 exam question:

Q86. What is used to prevent outside resources from accessing private information within the company?

A. IPsec

B. VPN

C. PIN

D. Firewalls

Answer: D


Q87. Which definition best describes the implementation service component within the implement phase?

A. providing a step-by-step plan that details the installation andservicE.commission tasks required in order to create a controlleD.implementation environment that emulates a customer network

B. assessing the ability of site facilities to accommodate proposed infrastructure changes

C. developing and executingprooF-oF-concept tests, validating high-level infrastructure design, and identifying any design enhancements

D. Installing, configuring and integrating systems components based on an implementation plan developed in earlier phases

E. improving a customer's infrastructure security system

Answer: D


Q88. You connect via Telnet to a Cisco access point and enter the command show dot11 link test.

Which output might you obtain?

A. signal-to-noise ratio

B. incoming and outgoing signal strength

C. TX packets dropped

D. RX packets per second

Answer: B


Q89. What are two areas in which PoE can be applied? (Choose two)

A. building management

B. data center management

C. retail video kiosks

D. digital telephony

E. virtual networks

Answer: AC


Q90. Which two features are only supported when using the Cisco Router and Security Device Manager (SDM) Advanced Firewall wizard and not supported when using the Cisco SDM Basic Firewall wizard? (Choose two.)

A. deep-packet inspections

B. IP unicast Reverse Path Forwarding on the outside (untrusted) interface

C. DMZ services

D. Custom inspection rules

E. proxy authentication

Answer: CD


642-384 book

Breathing 642-384 dumps:

Q91. Which statement is true about a Cisco Aironet 350 Series wireless client when its green LED appears to be off and its amber LED is blinking?

A. The client adapter is scanning for a network.

B. The client adapter is in ad hoc mode.

C. The client adapter is performing a self-test.

D. The client adapter is in power-save mode.

Answer: D


Q92. In what location is it recommended that the Cisco Catalyst 6500 Series WLSM be placed?

A. distribution layer

B. core layer

C. access layer

D. network management functional module

Answer: A


Q93. A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which two of these might have caused this problem? (Choose two.)

A. Theip https server command is missing from the running configuration.

B. The ip http securE.server command is missing from the running configuration

C. The user is trying to launch Cisco Router and Security Device Manager from the inside (secured) interface with a firewall enabled.

D. The user has a privilege level lower than 15.

E. The browser security level is set too high.

Answer: BD


Q94. You are troubleshooting OSPF neighbor establishment problems, which are occurring over Frame Relay interfaces that use the default OSPF network type. What should you verify in the router configuration?

A. theip ospf network point-to point statement under the Frame Relay interface

B. theip ospf priority statement on the Frame Relay interface on the designated router

C. the neighbor statements on the Frame Relay interface

D. the frame-relay map statement on the Frame Relay interface

Answer: D


Q95. Which two benefits will a client see from adding a Wireless LAN Controller to their Smart Business Communications System? (Choose two).

A. allow for guest access

B. increase connection speeds

C. add additional access points

D. network management with CLI

Answer: AC


Q96. Refer to the exhibit. The tables contain information from the Cisco Router and Security Device Manager configurations of Router A and Router B. Traffic between Host 1 and Host 2 is not successfully establishing the sitE.to-site VPN between Router A and Router B.

What is the mostly likely cause of this fault?


A. Router A is using a standard IP ACL (100-149) while Router B is using a Turbo ACL (150-199).

B. The IKE encryption methods on the two routers are different

C. the IPSec policy map names on the two routers are different.

D. the IPSec rules on the two routers are not permitting the correct interesting traffic.

Answer: B