The actual Cisco 640-863 exam questions and answers will sharpen your skills and expand your knowledge to obtain a definite success.save your money and time on your preparation for your Cisco 640-863 certification exam. You will find we are a trustful partner if you choose us as your assistance on your Cisco 640-863 certification exam. Now we add the latest Cisco 640-863 content and to print and share content.

Exam A
QUESTION 1
Enterprise Composite Model is used for designing networks. Which Enterprise Composite Netowork Model Component interfaces with the service provider (SP)?
A. Access Layer
B. Enterprise Edge
C. Campus Infrastructure
D. Edge distribution
Correct Answer: B QUESTION 2
How may more bits does IPv6 use for addresses than IPv4?
A. 128
B. 32
C. 64
D. 96

Correct Answer: D QUESTION 3
What is ASBR short for?
A. Autonomous System Bondary Router
B. Area System Border Router
C. Auxiliary System Border Router
D. Area Border Router

Correct Answer: A QUESTION 4
In which layer of the OSI model does Real-Time Transport Protocol (RTP) operate?
A. Session
B. Transport
C. Application
D. Network

Correct Answer: B QUESTION 5
When using a top-down netowrk design plan, which description identifies a benefit obtained?
A. Allows quick responses to design requests
B. Facilitates design based on previous experience
C. Is less time-consuming than using a bottom-up approach
D. Incorporates customer organizational requirements

Correct Answer: D QUESTION 6
In a network with Enhanced Interior Gateway Routing Protocol (EIGRP) and IGRP using same autonomous system number, what will happen on the router configured with both protocols?
A. Redistribution does not occur automatically
B. EIGRP assumes IGRP is a less capable protocol and overtakes it
C. Redistribution is not necessary
D. Redistribution occurs automatically

Correct Answer: D
QUESTION 7
Which type encryption transform will be used by both ESP and AH for authentication?
A. HMAC-MD5 or Hash Message Authentication Code-Secure Hash Algorithm-1(HMAC-SHA-1)
B. DES or 3DES
C. DES or Hash Message Authentication Code-Message Digest 5 (HMAC-MD5)
D. 3DES or MD5
Correct Answer: A
QUESTION 8
The network-design process is limited by many external constratins. Which origins are of these constraints?
A. Technological, politial, socail and economical
B. Technological, worldwide standards, socail and managerial
C. Managerial, politial, socail, and economical
D. Technological, cost, socail and economical
Correct Answer: A
QUESTION 9
How often does a RIPv1 router broadcast its routing table by default?
A. RIPv1 does not broadcast periodically
B. Every 90 seconds
C. Every 60 seconds
D. Every 30 seconds
Correct Answer: D
QUESTION 10
Which statements are true regarding RIPv1 and RIPv2?
A. RIPv1 sends update on Broadcast Address
B. RIPv1 sends update on Multicast Address
C. RIPv2 sends update on Broadcast Address
D. RIPv2 sends updateon Multicast Address
Correct Answer: AD
QUESTION 11
Which International Telecommunication Union (ITU) standard provides a framework for multimedia protocols for the transport of voice, video and data over packet switched networks?
A. Voice over IP (VoIP)
B. Session Initiation Protocol (SIP)
C. Weighted fair queuing (WFQ)
D. H.323
Correct Answer: D QUESTION 12

A lightweight access point is added to a working network. Which sequence will be used by it to assocaite itself with wireless LAN controller?
A. Greatest AP Capacity,Primary, Secondary, Tertiary, Master
B. Primary, Secondary, Tertiary, master,Greatest AP capacity
C. Primary, Secondary, Tertiary, Greatest AP capacity, Master
D. Master,Primary, Secondary, Tertiary, Greatest AP capacity
Correct Answer: B
QUESTION 13
Which IPv4 field are the precedence bits located in?
A. IP destinaton address
B. Type-of-service field
C. IP Protocols field
D. IP options field
Correct Answer: B
QUESTION 14
Which three security measurs will you use to mitigat DoS attacks that are directed at exposed hosts within the E-Commerce module? Select three
A. Use NIDs and HIPS to detect signs of attack and to identify potentiallyt successful breaches
B. Partition the exposed hosts into a seperate LAN or VLAN
C. Use a VPN concentrator (IPSec) to protect and verify each connection to the expores host or hosts.
D. Use firewalls to block all unneccesary connections to the exposed hosts.
E. Use LAN switch VTP pruning to seperate hosts on the same segment.
Correct Answer:
QUESTION 15
Which is the remote monitoring agent in the RMON architecture called?
A. Agent
B. Station
C. Probe
D. Tree
Correct Answer: C

QUESTION 16
Which WAN scenario might be appropriate for queuing solutions?
A. A WAN connection is rarely congested and data transfers never suffer
B. A WAN connection features consistent congestion problems and data transfers often suffer
C. A WAN connection features occasional periods of congestion and data transfers have occasionally suffered as a result
D. A newly implemented WAN connection has yet to demonstrte sufficient WAN statistics for congestion-level tracking
Correct Answer: C
QUESTION 17
As a network engineer, can you tell me accounting management on a network-management system allows a netowrk manager to perform which fuction?
A. Assess the network’s effectiveness and throughout
B. Performance management
C. Charge back to users for network resources
D. Identify problem areas in the network
Correct Answer: C
QUESTION 18
Which feature will not transfer packets when there is silence?
A. Ear and Mouth (E&M)
B. Dial Peers
C. Voice Activity Detection (VAD)
D. Digital Silence Suppressor (DSS)
Correct Answer: C
QUESTION 19
For which technology is IPSec required for a site-to-site enterprise WAN/MAN architecture?
A. ATM
B. ISP Service
C. Frame Relay
D. SP MPLS VPN
Correct Answer: B
QUESTION 20
What is important for the top-down design concept?
A. Engagement of the employees working on the top floors in the building during the design process
B. Engagement of the top executives during the desing process
C. Enagement of the HR representatives during the design process
D. Engagement of the top executives once the design process is finalized
Correct Answer: B

QUESTION 21
Which FCAPS function includes finding network problems that reduce a vailability?
A. Performance Management
B. Fault Management
C. Security Management
D. Accounting Management
Correct Answer: B

QUESTION 22
Which type of routing protocol will be used when connecting to an Internt Service Provider(ISP)?
A. Interior Gateway Protocol
B. Exterior gateway protocol
C. Classful Routing Protocol
D. Classless routing protocol
Correct Answer: B
QUESTION 23
Which item is not an SNMP operation?
A. Community
B. Trap
C. Set
D. GetNext
Correct Answer: A
QUESTION 24
With the rapid development of Internet, the available public IP addresses are badly needed, for this
situiation, IPv6 addresses have been gradually put into use.
Which two statements about IPv6 addresses are true? (Chooset two.)

A. A single interface will have multiple IPv6 addresses of different types
B. Leading zeros are required
C. Two colons (::) are used to separate fields
D. Two colons (::) are used to represent sucessive hedadecimal fields of zeros
Correct Answer: AD
QUESTION 25
Which H.323 protocol is in charge of call setup and signaling?
A. G.711
B. RTCP
C. H.225
D. H.245
Correct Answer: C
QUESTION 26
How many IP addresses are available for hosts in the subnet 198.10.100.64/27?
A. 62
B. 14
C. 30
D. 126
Correct Answer: C
QUESTION 27
What is the default coder-decoder (codec) used with VoIP dial peers?
A. G.723
B. G.728
C. G.711
D. G.729
Correct Answer: D Exam B

QUESTION 1
Which statement accurately describes one difference between a small office and medium office topology?
A. Small offices commonly use Rapid PVST+ for Layer 3 deployments.
B. Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks.
C. Medium offices use external access switches to support LAN connectivity.
D. Medium offices commonly use integrated route and switching platforms.
Correct Answer: C
QUESTION 2
Certkiller .com is planning to upgrade its current network. The chief technology officer has supplied a
topology diagram and an IP addressing scheme of the current network during an interview.
Certkiller .com has been growing at about twenty percent per year. It has been difficult to maintain
customer support at a satisfactory level. Therefore, the RST board has met with and directed the chief
technology officer to look into network improvements.
Which two items are most relevant in documenting Certkiller .com’s business requirements? (Choose two.)

A. network performance requirements
B. existing network topologies
C. the IP addresses assigned by the ISP
D. improved customer support requirements
E. projected growth estimates
Correct Answer: DE
QUESTION 3
Which of these accurately describes dial backup routing?
A. once the backup link is activated it will remain active even after the primary link is restored
B. it always uses permanent static routes
C. it is supplied by the service provider as a secondary PVC at no additional charge
D. the router intiates the dial backup link when a failure is detected on the primary link
E. it always uses distance vector routing protocols
Correct Answer: D
QUESTION 4
Western Associated News Agency recently acquired a large news organization with several sites, which will allow it to expand to worldwide markets. The new acquisition includes these connectivity technologies: Frame Relay ATM SONET cable DSL wireless From a Layer 1 viewpoint, which Enterprise Edge module will be most affected?
A. E-Commerce
B. Edge Distribution
C. PSTN
D. WAN/MAN
E. Internet Connectivity
F. ISP
Correct Answer: D
QUESTION 5
Which H.323 protocol controls call setup between endpoints?
A. RAS
B. RTCP
C. H.245
D. H.225
Correct Answer: D
QUESTION 6
Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point subinterfaces? (Choose two.)
A. OSPF
B. IS-IS
C. RIPv1
D. EIGRP
E. IGRP
F. RIPv2
Correct Answer: AD
QUESTION 7
Which two capabilities of NetFlow accounting assist designers with network planning? (Choose two.)
A. the monitoring of processor time on network devices
B. the calculation of packet and byte counts of network traffic
C. the monitoring of user network utilization
D. the decoding and analyzing of packets
E. the presentation of a time-based view of application usage on the network
Correct Answer: BC
QUESTION 8
Which two design criteria require VLANs in a proposed solution? (Choose two.)
A. video streaming on the LAN
B. a limited corporate budget
C. security between departments
D. the segmenting of broadcast domains
E. the segmenting of collision domains
F. the use of multivendor equipment
Correct Answer: CD

QUESTION 9
You design a network with the following network addresses:
192.168.168.0 192.168.169.0 192.168.170.0 192.168.171.0 192.168.172.0 192.168.173.0 192.168.173.0
192.168.174.0 192.168.175.0 Which route address is the best summary of these network addresses?
A. 192.168.0.0/16
B. 192.168.168.0/21
C. 192.168.0.0/24
D. 192.168.171.128/3
E. 192.168.175.0/3
Correct Answer: B
QUESTION 10
Which two of the following statements represent a preferred wireless LWAPP implementation? (Choose two.)
A. verify open ports for: Layer 2 LWAPP on ethertype OxBBBB Layer 3 LWAPP on UDP 12222 and UDP 12223
B. verify open ports for: Layer 2 LWAPP on ethertype OxBABA Layer 3 LWAPP on UDP 12222 and TCP 12223
C. verify open ports for: Layer 2 LWAPP on ethertype OxABAB Layer 3 LWAPP on TCP 12222 and TCP 12223
D. use of Layer 2 LWAPP is preferred over Layer 3 LWAPP
E. use of Layer 3 LWAPP is preferred over Layer 2 LWAPP
Correct Answer: AE