Home Page > Cisco > 642-999

Download Cisco.Braindump2go.642-999.v2013-10-02.by.Maria.63q.vce

Exam: Implementing Cisco Data Center Unified Computing (DCUCI)
Size: 1.55 MB
Posted: 2013-10-02
Votes: 0
Download: Cisco.Braindump2go.642-999.v2013-10-02.by.Maria.63q.vce

Vote For This File

Verification:*
Type the characters from the picture.

Comments

* The most recent comments are at the top.

    • jimoh from nigeria from Nigeria 10 18 2011, 7:54 AM Report Spam
      i'll be writing the next month pls where can i download free ccna video
    • Bumex from Nigeria 08 21 2011, 4:39 PM Report Spam
      Passed yesterday 20 08 2011 with 920/1000. i had acl2, vtp, eigrp, though twisted a bit so u got 2 know something to solve it. used ACME and 9tut
    • Aravinda from Sri Lanka 08 16 2011, 6:46 AM Report Spam
      Read the comments in this dum and try this dum .. More valid questions update till today…
      http://www.examcollection.com/cisco/Cisco.Acme.640-802.v2011-07-09.by.Collisio.486q.vce.file.html
    • Kashif Manzoor from Pakistan 08 16 2011, 12:51 AM Report Spam
      Option "A" is the correct Answer
    • Newbie from Unknown 08 10 2011, 12:59 PM Report Spam
      Hi,

      What is the correct answer for this question?

      Which Statement about access lists that are applied to an interface is true?
      A. you can configure one access list, per direction, per layer 3 protocol
      B. You can apply multiple access lists with the same protocol or in different director
      c. You can apply only one access list on any interface
      D. you can plane as many access lists as you want on any interface

    • jeremy from Singapore 08 03 2011, 1:14 AM Report Spam
      @L4UR3NS

      Could you pls give the requirements you had for ACL 2. Thanks.

    • L4UR3NS from United States 08 02 2011, 12:23 PM Report Spam
      @ mkultra , o wow! No it is not E, thanks for the link and clearing that up. Well I am going for my test today and hope this question is not in there.
    • mkultra from United States 08 02 2011, 12:05 AM Report Spam
      @L4UR3NS
      (E) is not a valid answer as ACLs are anything but spoof safe. What provides a level of security against spoofing is encryption. Look at "Risk of Spoofing with Lock-and-Key" here http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scflock.html#wp1000970
      I agree with you. (A) seems a good general answer for implementing ACL. I think they threw that time-based option to distract us. The two next best answers are (C) and (F). ACLs can't authenticate users without telnet authentication first (an upper layer session) Once authentication is granted that changes and modifies the ACL entries dynamically. But F as a whole seems like a good general answer. Screw it, I'm going with A,F.
    • L4UR3NS from United States 08 01 2011, 1:22 PM Report Spam
      @ mkultra, Yes this got to be one of the most debatable questions in the dumps. And the is answer different in every dump. I can not think of one argument why A would be true. Answer D could be right because of the answer you are given, but the description fits more with a Time based acl then a dynamic one. I sometimes think E could be true also, because a dynamic acl would be good against ip and mac spoofing. But I would go with D and F too, but this question confuses me every time is see it.
    • mkultra from United States 08 01 2011, 7:22 AM Report Spam
      Gotta bring this one up again.

      Which two statements apply to dynamic access lists?(choose two)

      A. they offer simpler management in large internetworks.
      B. you can control logging messages.
      C. they allow packets to be filtered based on upper-layer session information.
      D. you can set a time-based security policy.
      E. they provide a level of security against spoofing.
      F. they are used to authenticate individual users.

      A&F seem to be the most common answers. But if you check the options for a dynamic ACL you'd see the keywords [timeout minutes] which implies that user has an X amount of time to access resources. So you could say this is a time-based security policy. Making D a viable answer as well? Thoughts?

      access-list (ACL number) dynamic (ACL name) [timeout
      minutes] {deny | permit} IP_protocol source_IP_address src_wildcard_mask
      destination_IP_address dst_wildcard_mask [established] [log]

    • shivam from India 07 31 2011, 1:59 PM Report Spam
      @Grayhat,
      Sir, i m gonna appear in exam in first week of august,Are these dumps valid till den,,or cisco will issue a set of new questions as a matter of new month..will it be enuf if i study dese dumps + 483q..I m really scared!!Coz the level of questions seems to be pretty gud!!Plz reply,,Need ur help!!!!
    • Newbie from Russian Federation 07 30 2011, 9:43 PM Report Spam
      Hey grayhat,

      Do you have dumps just for simulation? If you have, can you please post a link for us?

      Thanks

    • Dude from Nigeria 07 30 2011, 6:49 PM Report Spam
      This dump is 100% valid, I used it in combination with Acme and 9tut and I passed my ccna yesterday with a score of 960. Thanks grayhat!
    • L4UR3N5 from United States 07 29 2011, 4:34 PM Report Spam
      @ Dawood. F? I see no F option. But I agree with A and B. Because with a static nat command you can for example give a private web address to you web server. When the outside host is trying to reach you web server, the router will then translate the outside public address to the inside private address.

      I hope this helps.

    • dawood from Pakistan 07 29 2011, 9:48 AM Report Spam
      Which two statements about static NAT translations are true?(choose two)
      A. They are always present in the NAT table.
      B. They allow connection to be initiated from the outside.
      C. They can be configured with access lists, to allow two or more connections to be initiated from the
      outside.
      D. They require no inside or outside interface markings because addresses are statically defined.
      answer:AB…seems to me AF any one clear this Q
    • L4UR3N5 from United States 07 28 2011, 11:23 PM Report Spam
      Grayhat, great work I think you have fixed a lot off errors. Here are my doubts:
      Item 27. What is the function of the command switchport trunk vlan 999 on cisco catalyst switch?
      You gave answer D. I think A, because is the native vlan not for untagged traffic? I am not even sure what "unknow tagged traffic is.

      Will post more if I find it

    • greayhat from Portugal 07 26 2011, 5:49 PM Report Spam
      @peer-to-peer

      its your call really but if you chose those ones in an exame you will will fail that question!
      Dynamic ACL (or lock-and-key) are used along with 1 Extended ACL. The process is as follows: first the user which wants to access a network resource in an internal network, connects to a vty port, then when he is AUTHENTICATED, the user can gain access (now with the use of the extended ACL) to internal resources.
      Two examples of when you use lock-and-key access are listed here:

      1-When you want a remote host to be able to access a host in your internetwork through the Internet. Lock-and-key access limits the access beyond your firewall on an individual host or net basis.
      2-When you want a subset of hosts on a network to access a host on a remote network protected by a firewall. With lock-and-key access, you can enable only a desired set of hosts to gain access by having them authenticate through a TACACS+ or RADIUS server.

      http://www.cisco.com/en/US/tech/tk583/tk822/technologies_tech_note09186a0080094524.shtml#topic3

    • peer-2-peer from Spain 07 26 2011, 6:18 AM Report Spam
      @jeremy
      Regarding this question about dynamic ACL

      Which two statements apply to dynamic access lists?(choose two)
      A. they offer simpler management in large internetworks.
      B. you can control logging messages.
      C. they allow packets to be filtered based on upper-layer session information.
      D. you can set a time-based security policy.
      E. they provide a level of security against spoofing.
      F. they are used to authenticate individual users.

      I totally agree with you. Answers must be A & F

      As we can check in this cisco document, ( http://www.cisco.com/en/US/docs/ios/12_1/security/configuration/guide/scdlock.pdf)
      "Lock-and-key is configured using IP dynamic extended access lists"
      " Lock-and-key provides simpler management in large internetworks "

      Cheers

    • grayhat from Portugal 07 24 2011, 10:44 PM Report Spam
      @jeremy

      yes mate, 1 ACL per PROTOCOL, per DIRECTION, and per INTERFACE.
      dynamic access list: used to give access to a specific username and in specific time, or period of time. it is actually configured with an extended ACL which is usually applied to a vty port then the router or firewall disconnects that connection to the vty port, and establishes a connection to fastethernet or serial port so the user can enter the network and access internal resources.

      @megaL

      please use this in conjunction with this dump: http://www.examcollection.com/cisco/Cisco.BrainDump.640-802.v20011-07-04.by.Collisio.483q.vce.file.html

      which is an updated version of Acme.

    • megaL from Qatar 07 24 2011, 8:24 PM Report Spam
      Hi

      I just need to know if i can depend on this file (plus the simulations in 9tut) for my test on the 26th of 07y (after 2 days) ?
      please advice
      tq

    • jeremy from Unknown 07 24 2011, 5:55 PM Report Spam
      @Grayhat

      Yes I read that in Todd Lammle's book which actually has the similar question, thanks. So u say that the answer is
      you can config one access list,per direction,per layer 3 protocol correct ?

      U mind answering my question on dynamic access list ?
      Which statement about access lists that are applied to an interface is true?

    • grayhat from Portugal 07 24 2011, 1:03 PM Report Spam
      @jeremy

      These are the three P’s of access-lists and filtering traffic

      When it comes to filtering traffic, the rule of access-lists is the “three Per’s”. The rule goes like this: “You can have one access-list per PROTOCOL, per DIRECTION, and per INTERFACE”. So, you can have an access-list for each protocol (IP, IPX, Appletalk, bridging, etc). You can have an access-list for each direction- either IN, or OUT. You can have an access-list on each interface- FastEthernet0/0, Serial0/0, Serial1/0, etc. In other words, you can’t have two IN-BOUND IP access-lists on the same interface. Those access-lists would need to be combined to use both of them.

    • jeremy from Unknown 07 24 2011, 8:40 AM Report Spam
      @obione

      Just to confirm since I accidentally posted the same question twice.
      C. You can apply only one access list on any interface is the correct answer
      yes ?

    • obione from Nigeria 07 24 2011, 8:17 AM Report Spam
      @jeremy,
      d protocols @ layer 3 are routing protocls,but access-list is applied per transport protocol which is @ layer 4 (tcp,udp) or network layer routed protocol(ip.icmp).so C gives d best ans since it takes care of both
    • jeremy from Unknown 07 23 2011, 6:25 PM Report Spam
      @ Grayhat, all

      Which statement about access lists that are applied to an interface is true?

      A. you can apply multiple access lists with the same protocol or in different
      B. you can config one access list,per direction,per layer 3 protocol
      C. you can place as many access lists as you want on any interface
      D. you can apply ony one access list on any interface

      Is the answer B or D ?? different sources say different…. do help out thanks

    • jeremy from Unknown 07 23 2011, 6:23 PM Report Spam
      @Grayhat,all

      Which two statements apply to dynamic access lists?(choose two)

      A. they offer simpler management in large internetworks.
      B. you can control logging messages.
      C. they allow packets to be filtered based on upper-layer session information.
      D. you can set a time-based security policy.
      E. they provide a level of security against spoofing.
      F. they are used to authenticate individual users.

      Ans is D&F. Can't it be A & F ?? Do help out.. Thx

    • jeremy from Unknown 07 23 2011, 3:21 PM Report Spam
      @all

      Which statement about access lists that are applied to an interface is true?

      A. You can configure one access list, per direction, per Layer 3 protocol
      B. You can apply multiple access lists with the same protocol or in different director
      C. You can apply only one access list on any interface
      D. You can plane as many access lists as you want on any interface

      Hi guys could you help me out with this question many dumps say C is the answer, online ppl say A is the answer. According to Todd Lammle's CCNA book I think it should be A. (one access per interface, per direction, per protocol) Pls feedback. Thanks

    • 07ian from South Africa 07 23 2011, 8:44 AM Report Spam
      Hi guys I will be writting this exam on 08ust 2011 and I am slightly nervous. Thus far 9tut has been the only source of great help.If you know any other places where I can get assisted pls do mail me thanks.
    • timmi from India 07 23 2011, 8:18 AM Report Spam
      Just finished the ccna exam an hour ago. Scored 960 thanks be to Jesus. Simulation were acl, vtp and eigrp….
      100% of the question came out from this dump!
      http://www.examcollection.com/cisco/Cisco.BrainDump.640-802.v20011-07-04.by.Collisio.483q.vce
    • Ahiq from Nepal 07 23 2011, 3:37 AM Report Spam
      i score 947 but guys dont trust blindly on any dumps………..this dump is not 100% valid but you may got some question from this dump……….9tut.com is bestway to prepare for CCNA. thankx 9tut.com
    • francis from Malawi from Unknown 07 22 2011, 12:16 PM Report Spam
      Guyz is this Dump valid in Malawi? please iwant to sit for exam soon thanx in advance
    • Razan from United Arab Emirates 07 22 2011, 11:31 AM Report Spam
      hi guys,,i will take ccna ezam next week,is this dump is valid 100%
      thanks
    • grayhat from Portugal 07 22 2011, 10:44 AM Report Spam
      @SK

      search for CBT Nuggets ICND1 and ICND2, testout sucks!

    • grayhat from Portugal 07 22 2011, 10:43 AM Report Spam
      @Jerry

      between 54 and 60 questions.
      Study Materials:
      -CCNA: Cisco Certified Network Associate Study Guide: Exam 640-802, 6th Edition by Todd Lammle (the best one)
      -CBT Nuggets CCNA
      -GNS3 for simulations

    • SK from Australia 07 22 2011, 5:59 AM Report Spam
      Guys

      Is there a way to download the TESTOUT CCNA Video from the Internet.

      Please guys can you post the link. Thank you

    • Jerry from Unknown 07 21 2011, 8:20 PM Report Spam
      Hi, can those of you who took the exam let us know how many questions are there in the actual exam? Also, let us know what materials you were used for study or prepare for the exam. Additionally, anybody got any latest dump that can share with us all here for the exam, if you do have one please be kindly upload it for us.

      Thank so much!

      Jerry

    • grayhat from Portugal 07 21 2011, 1:05 PM Report Spam
      @jeremy
      "In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

      A. after broken links are re-established
      B. in an improperly implemented redundant topology
      C. when upper-layer protocols require high reliability
      D. during high traffic periods
      E. when a dual ring topology is in use

      Given answer: E (when a dual ring topology is in use) why ?

      Think answer should be B. (in an improperly implemented redundant topology)"
      Answer: B is correct, thank you for pointing out!!

      @jeremy
      "What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?

      A. It designates VLAN 999 for untagged traffic.
      B. It blocks VLAN 999 traffic from passing on the trunk.
      C. It creates a VLAN 999 interface.
      D

Close

Site Search:

Site Search:

Terms of Service

Proudly powered by www.iexamcollection.com