Download New Latest (May) Cisco 642-437 Actual Tests 71-80

Ensurepass

 

QUESTION 71  (Topic 1)

 

Which three Cisco IOS commands are required to configure a voice gateway as a DHCP server to support a data subnet with the IP address of 10.1.30.0/24 and a default gateway of 10.1.30.1/24? (Choose three.)

 

A.

ip dhcp pool

B.

subnet 10.1.30.1 255.255.255.0

C.

ip dhcp pool data

D.

network 10.1.30.1/24

E.

network 10.1.30.0 255.255.255.0

F.

default-gw 10.1.30.1/24

G.

default-router 10.1.30.1

 

Answer: CEG

Explanation:1) To configure the DHCP address pool name and enter DHCP pool configuration mode, use the following command in global configuration mode:

 

Router(config)# ip dhcp pool name – Creates a name for the DHCP Server address pool and places you in DHCP pool configuration mode

 

2) To configure a subnet and mask for the newly created DHCP address pool, which contains the range of available IP addresses that the DHCP Server may assign to clients, use the following command in DHCP pool configuration mode:

 

Router(dhcp-config)# network network-number [mask | /prefix-length] – Specifies the subnet network number and mask of the DHCP address pool. The prefix length specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the network mask of the client. The prefix length must be preceded by a forward slash (/).

 

 

 

3) After a DHCP client has booted, the client begins sending packets to its default router. The IP address of the default router should be on the same subnet as the client. To specify a default router for a DHCP client, use the following command in DHCP pool configuration mode:

 

Router(dhcp-config)# default-router address [address2 … address8] – Specifies the IP address of the default router for a DHCP client. One IP address is required; however, you can specify up to eight addresses in one command line.

 

http://www.cisco.com/en/US/docs/ios/12_2/ip/configuration/guide/1cfdhcp.html#wp1000999

 

 

QUESTION 72  (Topic 1)

 

The router with the IP address of 10.1.120.1 needs to be configured to use the device 10.1.140.1 as the clock source. Which configuration command will accomplish this task?

 

A.

clock source 10.1.140.1

B.

ntp server 10.1.140.1

C.

clock set 10.1.140.1

D.

ntp source ip addr 10.1.140.1

E.

ntp client 10.1.120.1 server 10.1.140.1

 

Answer: B

Explanation: To configure your routers to use a NTP server for time synchronization, the command ntp server, followed by the IP address or hostname of the NTP server, is used. To specify additional timeservers for redundancy, simply repeat the ntp server command with the IP address of each additional server.

http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a00801 0e97e.shtml

 

 

QUESTION 73  (Topic 1)

 

Refer to the exhibit. Which class is always present even though it is not in the configuration snip?

 

 

 

clip_image001

 

A.

class best-effort

B.

class class-default

C.

default class

D.

best-effort class

E.

class class-scavenger

 

Answer: B

Explanation: The class-default is in every policy-map by default and it cannot be removed. The class-default class is used to classify traffic that does not fall into one of the defined

 

 

 

classes. Once a packet is classified, all of the standard mechanisms that can be used to differentiate service among the classes apply. The class-default class was predefined when you created the policy map, but you must configure it. If no default class is configured, then by default the traffic that does not match any of the configured classes is flow classified and given best-effort treatment.

http://www.cisco.com/en/US/docs/ios/12_0t/12_0t5/feature/guide/cbwfq.html#wp25297

 

 

QUESTION 74

DRAG DROP  (Topic 1)

 

clip_image002

Answer:

clip_image003

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 75  (Topic 1)

 

In a voice gateway, the configured codec complexity of the DSPs on a voice card can be changed. What is the impact on the DSPs if high codec complexity is configured?

 

A.

The codec complexity affects call density, which is the number of calls that are reconciled on the DSPs. This results in lower call density when high complexity is configured.

B.

With higher codec complexity, more calls can be processed.

C.

Lower codec complexity supports the fewest number of voice channels, provided that the lower complexity is compatible with the particular codecs that are in use.

D.

The DSP will process codecs that support high complexity transparently and shift to flex mode for those codecs that are not high complexity.

 

Answer: A

Explanation: The difference between medium and high complexity codecs is the amount of CPU utilization necessary to process the codec algorithm, and therefore, the number of voice channels that can be supported by a single DSP. For this reason, all the medium complexity codecs can also be run in high complexity mode, but fewer (usually half) of the channels are available per DSP.

 

http://www.cisco.com/en/US/tech/tk1077/technologies_tech_note09186a00800b6710.shtml #code_com

 

 

QUESTION 76  (Topic 1)

 

Refer to the exhibit. When an inbound PSTN call from 4087071222 arrives at the ISDN port that is shown in the exhibit, which dial peer will be matched for the inbound leg?

 

 

 

clip_image004

 

A.

Dial-peer 123, because incoming called-number takes precedence over answer- address.

B.

Dial-peer 2123, because answer-address takes precedence over incoming called- number.

C.

The matching inbound dial peer will be selected at random.

D.

Although dial-peer 123 takes precedence, there is no direct-inward-dial that is configured, therefore 2123 will be selected.

E.

Although dial-peer 123 takes precedence, there is no port that is configured under dial- peer 123, therefore dial-peer 2123 will be selected.

 

Answer: B

 

 

QUESTION 77  (Topic 1)

 

Which three methods are used by a Cisco Unified Border Element to provide network hiding? (Choose three.)

 

A.

Back-to-back user agent, replacing all H.323-embedded IP addressing

B.

IP network security boundary

C.

Media flow-through

D.

RSVP

E.

IP network privacy and topology hiding

F.

Intelligent IP address translation for RTP flows

 

Answer: BEF

Explanation: Cisco Unified Border Element can protect the network by hiding the network addresses and names for both the access (customer) side and the backbone (network core) side. A CUBE is designed to provide IP network privacy and topology hiding, IP network security boundary, Intelligent IP address translation for call media and signaling, Back-to-back user agent, replacing all SIP-embedded IP addressing, History information based topology hiding and call routing.

http://www.cisco.com/en/US/docs/routers/asr1000/configuration/guide/sbc/sbc_topology_hi de.html

 

 

QUESTION 78

DRAG DROP  (Topic 1)

 

Assume a SIP voice network. Drag each characteristic to the type of SIP call setup the characteristics best describes.

 

clip_image005

Answer:

 

 

Free VCE & PDF File for Cisco 642-437 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 79  (Topic 1)

 

What are the PHBs that DiffServ use?

 

A.

resource reservation and admission control

B.

default, AF, and EF PHBs

C.

AF, EF, and CS PHBs

D.

AF and EF PHBs

E.

default, AF, EF, and CS PHBs

 

Answer: E

Explanation: A Per Hop Behavior refers to the packet scheduling, queuing, policing, or shaping behavior of a node on any given packet belonging to a Behavior Aggregate, and as configured by a Service Level Agreement (SLA) or policy. To date, four standard PHBs are available to construct a DiffServ-enabled network and achieve coarse-grained, end-to- end CoS and QoS: The Default PHB, Class-Selector PHBs, Expedited Forwarding PHB and Assured Forwarding PHB.

 

http://www.cisco.com/en/US/technologies/tk543/tk766/technologies_white_paper09186a00 800a3e2f_ps6610_Products_White_Paper.html

 

 

QUESTION 80  (Topic 1)

 

In which situation would the trust boundary be located at the access layer?

 

A.

if the endpoints, both IP phones and PCs, are incapable of marking traffic properly

B.

if PCs are switched through an IP phone and the IP phone traffic can be trusted to mark both traffic streams properly

C.

if the access layer switch cannot trust or re-mark incoming traffic from endpoints properly

D.

if there are endpoints that cannot be trusted and connect directly to the distribution layer

 

Answer: A