Cisco 642-892 ExamComposite Exam

Total Question: 334 Last Updated: Jul 13,2019
  • Updated 642-892 Dumps
  • Based on Real 642-892 Exams Scenarios
  • Free 642-892 pdf Demo Available
  • Check out our 642-892 Dumps in a new PDF format
  • Instant 642-892 download
  • Guarantee 642-892 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $39.99

Buy Now Free Trial

Up to date 642-892: Actualtests real Q&A from 151 to 165

Exam Code: 642-892 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Composite Exam
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 642-892 Exam.

2016 Mar 642-892 Study Guide Questions:

Q151. Which two statements are true about port security? (Choose two.)

A. With port security configured, four MAC addresses are allowed by default.

B. Port security cannot be configured for ports supporting VoIP.

C. With port security configured, only one MAC address is allowed by default.

D. The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.

E. Port security can be configured for ports supporting VoIP.

Answer: CE


Q152. Refer to the exhibit. Which two statements are true about how the IP phone can be configured to perform CoS markings? (Choose two.)


A. The IP phone can tag voice traffic in the access or voice VLAN with a Layer 2 CoS value.

B. The IP phone can only tag voice traffic with a Layer 2 CoS value in the voice VLAN.

C. The default configuration of the IP phone is to pass traffic from the host without changing the CoS value.

D. The IP phone can be configured to pass traffic from the host without changing the CoS value.

E. By default, the IP phone tags traffic from the host with the default CoS value of 5.

Answer: AD


Q153. Which statement describes the difference between a manually configured IPv6 in IPv4 tunnel versus an automatic 6to4 tunnel?

A. A manually configured IPv6 in IPv4 tunnel allows multiple IPv4 destinations.

B. An automatic 6to4 tunnel allows multiple IPv4 destinations.

C. A manually configured IPv6 in IPv4 tunnel does not require dual-stack (IPv4 and IPv6) routers at the tunnel endpoints.

D. An automatic 6to4 tunnel does not require dual-stack (IPv4 and IPv6) routers at the tunnel endpoints.

Answer: B


Q154. Which three components are included in the Cisco autonomous WLAN solution? (Choose three.)

A. Wireless LAN Solution Engine (WLSE)

B. Access Control Server (ACS)

C. Wireless Control System (WCS)

D. Wireless Services Module (WiSM)

E. Wireless Domain Services (WDS)

F. Lightweight Access Point Protocol (LWAPP)

Answer: ABE


Q155. Which statement describes Dynamic Trunking Protocol (DTP) mode 'desirable'?

A. The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.

B. The interface actively attempts to convert the link to a trunk link.

C. The interface is put into permanent trunking mode but prevented from generating DTP frames.

D. The interface is put into a passive mode, waiting to convert the link to a trunk link.

Answer: B


642-892 exam cram

Latest 642-892 practice exam:

Q156. Refer to the exhibit. DHCP snooping is enabled for selected VLANs to provide security on the network. How do the switch ports handle the DHCP messages?


A. Ports Fa2/1 and Fa2/2 source DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages and respond to DHCP requests.

B. Ports Fa2/1 and Fa2/2 respond to DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages.

C. Ports Fa2/1 and Fa2/2 are eligible to source all DHCP messages and respond to DHCP requests. Port Fa3/1 can source DHCP request only.

D. All three ports, Fa2/1, Fa2/2, and Fa3/1, are eligible to source all DHCP messages and respond to DHCP requests.

Answer: C


Q157. Refer to the exhibit. Which statement is true about the configuration that is shown?


A. Untagged ingress traffic will be dropped.

B. Untagged ingress traffic will be marked with the default CoS value of the port.

C. Tagged and untagged ingress traffic will be carried on VLAN 1.

D. Ingress traffic from the host will be tagged with the CoS value of 5.

Answer: B


Q158. Refer to the exhibit. Which statement is true about the 6.6.6.0/24 prefix?


A. If another path advertises the 6.6.6.0/24 path and has the default local preference, that path is more preferred.

B. The command neighbor send-community is configured on BGP neighbor 10.10.23.3.

C. The route 10.10.23.3 is not being advertised to other BGP neighbors.

D. Route 6.6.6.0/24 is learned by an IBGP peer.

Answer: B


Q159. Refer to the exhibit. On the basis of the output generated by the show commands, which two statements are true? (Choose two.)


A. All interfaces on the switch have been configured as access ports.

B. Because it has not been assigned to any VLAN, interface gigabitethernet 0/1 does not appear in the show vlan output.

C. Because it is configured as a trunk interface, interface gigabitethernet 0/1 does not appear in the show vlan output.

D. There are no native VLANs configured on the trunk.

E. VLAN 1 will not be encapsulated with an 802.1q header.

F. VLAN 2 will not be encapsulated with an 802.1q header.

Answer: CE


Q160. Refer to the exhibit. Routers R1 and R2 have established a neighbor relationship and are exchanging routing information. The network design requires that R1 receive routing updates from R2, but not advertise any routes to R2. Which configuration command sequence will successfully accomplish this task?


A. R1(config)# router eigrp 1

R1(config-router)# passive-interface serial 0

B. R2(config)# router eigrp 1

R2(config-router)# passive-interface serial 0

C. R1(config)# access-list 20 deny any

R1(config)# router eigrp 1

R1(config-router)# distribute-list 20 out serial 0

D. R2(config)# access-list 20 deny any

R2(config)# router eigrp 1

R2(config-router)# distribute-list 20 out serial 0

E. R1(config)# access-list 20 permit any

R1(config)# router eigrp 1

R1(config-router)# distribute-list 20 in serial 0

F. R2(config)# access-list 20 permit any

R2(config)# router eigrp 1

R2(config-router)# distribute-list 20 in serial 0

Answer: C


642-892 book

Virtual 642-892 exam question:

Q161. Refer to the exhibit. Which two Lightweight Access Point statements are true? (Choose two.)


A. An AP that has been upgraded from an autonomous AP to lightweight AP will only function in conjunction with a Cisco Wireless LAN controller.

B. Autonomous APs receive control and configuration information from a WLAN controller.

C. LWAPP increases the amount of processing within the APs, enabling them to support filtering and policy enforcement features.

D. Real time events such as authentication, security management, and mobility are handled by the lightweight AP.

E. Lightweight APs require local configurations using local management.

F. WLAN controllers provide a single point of management.

Answer: AF


Q162. Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option permits the configuration of host-based Extensible Authentication Protocol (EAP)?


A. WPA/WPA2/CCKM

B. WPA/WPA2 Passphrase

C. 802.1x

D. Pre-Shared Key (Static WEP)

Answer: C


Q163. A network administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true? (Choose two.)

A. DR and BDR elections will occur.

B. DR and BDR elections will not occur.

C. All routers must be configured in a fully meshed topology with all other routers.

D. The neighbor command is required to build adjacencies.

E. Interfaces will automatically detect and build adjacencies with neighbor routers.

Answer: AD


Q164. If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the routes?

A. 0

B. 1

C. 10

D. 20

Answer: A


Q165. Which two statements correctly describe the association process between a lightweight access point and a WLAN controller? (Choose two.)

A. In order to associate in Layer 3 mode, the access point must have been preconfigured with an IP address.

B. An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.

C. Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP address from the controller.

D. An access point will search for a controller using a broadcast address if using LWAPP Layer 2 mode and a unicast address if using LWAPP Layer 3 mode.

E. If multiple wireless controllers are detected by an access point, the controller with the fewest associated access points is chosen to associate with.

Answer: BE


Related 642-892 Articles