Home > Share your ARCH Experience

Share your ARCH Experience

March 20th, 2011 in ARCH Go to comments

Please share with us your experience after taking the ARCH v2.1 642-874 exam, your materials, the way you learned, your recommendations…

Your posts are warmly welcome!

Please don’t ask for links to download copyright materials here…

Comments (50) Comments
Comment pages
1 20 21 22 23 24 169 390
  1. crabber
    December 13th, 2011

    I read some where that couldn’t you have user-side loops without spanning vlans across access switches?

  2. Asad
    December 13th, 2011

    i can’t understand you question.

  3. crabber
    December 13th, 2011

    Can you have a user-side loop if the vlans do not span across switches? If each access switch has it’s own VLAN? I may not be understanding what a user-side loop is.

  4. crabber
    December 13th, 2011

    Asad,
    I’m struggling with understanding what they mean

    Q14 The 3 steps to confirm range of IP address can be summarized. What of the following is used in each step

    (A) The first number in the contiguous block of addresses
    (C) The size of the contiguous block of addresses (pg 103 2nd edition study guide)

    I’m debating between A and C but leaning on C. I believe I answered A on the test. Only got 22% in that area. I think if I would have answered one more question correctly I would have passed the exam and wouldn’t be reviewing all of these.

    I agree with your changes to Q49 with designing a multicast implementation and I believe I answered it as such on the test. The wording between A & D is unclear to me. But I know F is correct.

    D. only the low-order 23 bits of the IP address are used to map MAC addresses
    F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

  5. crabber
    December 13th, 2011

    Asad,
    Q22 When is a first-hop redundancy protocol needed in the distribution layer
    Believe it or not the test had answer A the same as F. I even wrote a comment, which I doubt they read. I answered F but was thinking E may be correct. Now I’m liking D. A FHRP is needed when deploying Layer 2 between Access and Distribution.
    D. when a robust method of backing up the default gateway is needed
    E. when the design implements Layer 2 between the access switch and the distribution blocks
    F. when the design implements Layer 2 between the access and distribution blocks

  6. Asad
    December 13th, 2011

    yes i think your are right.

    Q22 D. when a robust method of backing up the default gateway is needed is correct.

    self-study p66

    “HSRP and VRRP with Cisco enhancements both provide a robust method of backing up the default gateway”

  7. Asad
    December 14th, 2011

    Hi Guys

    Finally It’s Finished. Dump is ready

    * All Answers are corrected.
    * Some of the Duplicated & VoWLAN questions are removed.

    Download Link :
    http://www.multiupload.com/O5FMV49JBR

    Waiting for you Feedback…….

  8. crabber
    December 14th, 2011

    Asad,

    Thanks for the work. I’m still going through all of the questions. The following are questions in my mind:

    Q12 – There are 3 steps to confirm whether a range of IP address can be summarized. When of the following is used in each of these 3 steps?
    Don’t understand why A and not C
    A. The first number in the contiguous block of addresses
    C. The size of the contiguous block of addresses

    Q18 – From a design perspective which two of the following OSPF Statements are most relevant?
    I didn’t think transit a non-backbone area is perfered, can’t find any reference for this. Leaning toward B.
    B. OSPF cannot filter intra area routes (pg 111 study guide)
    D. Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area

    Q49 Which of the following is an advantage of device clustering utilizing Virtual Port Channels (vPC)?
    I’m thinking A is the answer
    A. A logical star topology provides a loop free environment so that all links will be used forward traffic
    (pg 243 ARCH 3rd edition) The biggest advantage of vPC is that it enables loop-free topologies where STP is no longer actively involved in maintaining the network topology and where no links between the access and aggregation layers are blocked.

    C. The control plane functions of the Nexus switches are merged to hide the use of virtualization (I can’t find any supporting references)

    Q68 Acme Nutrition manufactures a wide variety of vitamin supplements. It has a single manufacturing facility with 3 regional warehouses and 16 district sales offices….
    Would like someone to explain how to figure this one out.

    Q176 Which of these is a benefit of ESM?
    (pg 571 ARCH 3rd edition) The Embedded Syslog Manager (ESM) feature provides a programmable framework that allows a network manager to filter, escalate, correlate, route, and customize system logging messages before delivery by the Cisco IOS system message logger.

  9. Asad
    December 14th, 2011

    crabber

    for Q12, i cant find any reason. i cant choose between A & C

    for Q18 , Yes , i’m agree with you, i think A & B are right answers.

    for Q49 , refrence: (page 241 Arch 3rd edition) “”The vPC technology is a clustering technique that allows two Cisco Nexus 7000 switches to represent themselves
    as a single switch to other network devices””

    for Q68 , i have no idea why. me too, i can’t undersstand why. i didnt edite this question.

    for Q176, (pg 571 ARCH 3rd edition) “”ESM also allows system messages to
    be logged independently as standard messages, XML-formatted messages, or ESM-filtered messages. These outputs can be sent to any of the
    traditional syslog targets. A network manager, for example, could enable standard logging to the console connection, XML-formatted message
    logging to the buffer, and ESM-filtered message logging to the monitor. Similarly, each type of output could be sent to different remote hosts. A
    benefit of separate logging processes is that if there is some problem with the ESM filter modules, standard logging will not be affected.””

  10. ccdp vce
    December 14th, 2011

    hello guys i finally found a mobi version of the book …you can read it with mobipocket reader desktop …. here the link http://www.multiupload.com/LCWWZVFERB
    Asad wonderful job i m still reading the book when i start the vce i will give you my update
    Ciscogeek could you share your corrected answers? thx

  11. CCDP
    December 14th, 2011

    Dear Asad,

    I am not able to download the dump, can you please upload on other site.

    http://www.multiupload.com/O5FMV49JBR

    The link is just getting timeout.

    thanks.

  12. Pete
    December 14th, 2011

    Does someone have this book in PDF? Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide: (CCDP ARCH 642-874) (3rd Edition). Really really appreciate if you would share it.

  13. CCDP
    December 14th, 2011

    Dear Asad,

    Thanks for your effort with the VCE, but still the answers are wrong. Is different that the corrected Actual Test.

  14. Paul
    December 14th, 2011

    Use JTA’s its the closest thing weve got

  15. kiko
    December 14th, 2011

    Dear CCDP, can you please explain which questions are not corrected. Thanks

  16. CCDP
    December 14th, 2011

    Thanks Paul,

    I agree JTA’s is the closest but not fully correct.

  17. CiscoGeek
    December 14th, 2011

    Pete , check my last post to get access to the book for 45 days.

  18. crabber
    December 14th, 2011

    Asad, thanks for the input, here are my thoughts,

    Q12 – There are 3 steps to confirm whether a range of IP address can be summarized.
    I’m going with “C. The size of the contiguous block of addresses” (pg 103 2nd edition study guide) “A block of IP addresses might be able to be summarized if it contains sequential numbers in one of the octets”

    for Q49 , refrence: (page 241 Arch 3rd edition) “”The vPC technology is a clustering technique that allows two Cisco Nexus 7000 switches to represent themselves as a single switch to other network devices””

    What sticks out about “The control plane functions of the Nexus switches are merged to hide the use of virtualization” is the phrase “control plane”.

    The control plane deals with determining the information about where each destination IP address in the network is.
    The data plane deals with the physical operations that are required to actually forward the packet to the next hop; this refers to the operation of storing the packet in memory while control plane information (such as the next hop address and egress interface) is determined, placing the appropriate Layer 2 addressing and encapsulation (depending on the egress interface Layer 2 protocol) on the frame, and then forwarding the packet out the appropriate egress interface to the next hop.

    vPC is much like VSS. To the Access layer they look like one switch. That’s why I think “A. A logical star topology provides a loop free environment so that all links will be used forward traffic” is a better answer.

    for Q176 Which of these is a benefit of ESM?
    (pg 571 ARCH 3rd edition) “The Embedded Syslog Manager (ESM) feature provides a programmable framework that allows a network manager to filter, escalate, correlate, route, and customize system logging messages before delivery by the Cisco IOS system message logger.” Sounds too much like answer D for me to pass up.
    “D. includes a predefined framework for filtering and correlating messages”

    My issue with answer “E. supports two logging processes so output can be sent in standard and ESM format” is there are three output options and the EMS option is filtered, not just EMS. I could be reading into this too much.
    (pg 571 ARCH 3rd edition) “ESM also allows system messages to be logged independently as standard messages, XML-formatted messages, or ESM-filtered messages.”

  19. Asad
    December 14th, 2011

    Hi guys
    As i said, i have corrected most of the questions and cross check most of them with both v2 & v3 self-study. If see any wrong answer please tell us!!!

    Do you have any opinion about “crabber”s points ?

    Please conterbute.

  20. Paul
    December 14th, 2011

    Hi CCDP

    can we go throught the JTA exam collection vce file and rectify those questions that are wrong

    Thanks for the help

  21. Asad
    December 14th, 2011

    Crabber
    For Q12, yes I think you are right. Based on book “C” seems a better answer.
    For Q49, I have a problem with “logical star topology” phrase. Because in book I can’t find “logical star topology” anywhere.
    For Q176, Book said “The Embedded Syslog Manager (ESM) feature provides a programmable framework that allows a network manager to filter, escalate, correlate, route, and customize system logging messages before delivery by the Cisco IOS system message logger”

    And in option we have ”D) includes a predefined framework for filtering and correlating messages”

    There is a big difference between “ programmable” and “predefined”

  22. Mapi
    December 14th, 2011

    Asad,
    Q59 is it true for jitter? and Q52 for functionality?

  23. Asad
    December 14th, 2011

    Mapi

    For Q59, I’m not sure about jitter. It seems Q59 is a CCVP question and should be removed.

    For Q52, I’ve done a lot of research about this question, but didn’t get any straight answer, so I’m not sure about the answer.

    If you find a good answer with reference, please let me know.

  24. crabber
    December 14th, 2011

    Asad,

    for Q49 “Which of the following is an advantage of device clustering utilizing Virtual Port Channels (vPC)?”

    The answer “The control plane functions of the Nexus switches are merged to hide the use of virtualization” I don’t believe can be correct.
    After much research it appears VSS share the control plane and look like one switch and vPC does not share the control plane and does use FHRP. Someone correct me if I’m wrong.

    For Q176 Which of these is a benefit of ESM, I didn’t pick on the wording “ programmable” vs. “predefined”. I can see your point. If I get it in the next test I’ll go with “supports two logging processes so output can be sent in standard and ESM format”

  25. crabber
    December 14th, 2011

    If Q52 is “Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?”

    (pg 18 2nd edition study guide)
    Functionality: Supports the organizational requirements.
    Performance: Provides desired responsiveness, throughput, and utilization on a per-application basis through the network infrastructure and services.

    I didn’t see the same text in ARCH 3rd edition

    I would go with “functionality” due to the question containing “network supports the required applications”

  26. Asad
    December 14th, 2011

    Crabber

    When you will take the exam ?

    I have an appointment for Exam on Friday.

  27. Anonymous
    December 14th, 2011

    I have it on next thursday…can you please share your experience with the others.

    Thanks!

  28. crabber
    December 14th, 2011

    Asad,

    Just scheduled it for Wednesday 12/21. Good luck.

    I’m still going through 642-874-AT5.8-1Sept2011. I believe I’ve research all of the questions I remember seeing on the first exam. I’ve presented the questions that I haven’t been able to confirm with your version that you post (thanks). I hope to re-read most of the ARCH 3rd edition book before the exam.

  29. Asad
    December 14th, 2011

    Sure, I will

    But please review questions and share you opinion about answers..

  30. crabber
    December 14th, 2011

    I’ll will continue post any that I disagree/don’t understand/can’t find references. Debating helps me learn as well.

  31. crabber
    December 15th, 2011

    Q49 Which two design concerns must be addressed when designing a multicast implementation

    (A) only the low-order 23 bits of the MAC address are used to map IP addresses
    x (D) only the low-order 23 bits of the IP address are used to map MAC addresses
    (F) the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

    Found the following in previous discussion on this forum. Makes me think A & F are the correct answer.

    As you indicated in the explanation from page 457 its says map the IP to the MAC. Not MAC to IP.

    It’s TRICKY but D actually says you are going to use the lower-order 23 bits of the IP to map the mac address into. So in english…map the MAC to the IP. That is the reverse of what you are looking for.

    Correct answer:
    A: only the low-order 23 bits of the MAC address are used to map IP addresses

    As you study guide indicates….it answer A…….Map IP to the lower 23 of the MAC.

    Q49 – answer is A, F and NOT D, F. I’m absolutely certain of this. It’s in the Cisco Official Curriculum (version 2.1) word for word. Page 10-11 near bottom of page. “Only the low-order 23 bits of the Layer 2 MAC address are used to map Layer 3 IP addresses.”

  32. Anonymous
    December 15th, 2011

    OK

    Thanks. i will go with your opinion on this one.

  33. Asad
    December 15th, 2011

    OK

    Thanks. i will go with your opinion on this one.

  34. crabber
    December 15th, 2011

    Q97 You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBAR and NetFlow?
    B. NBAR examines data in Layers 3 and 4.
    C. NetFlow examines data in Layers 3 and 4.

    Both are correct, according to ARCH 3rd edition:
    (pg 584) The NBAR packet classification engine provides full packet inspection that identifies
    applications and protocols using information from Layer 3 through Layer 7

    (pg 581) Flexible NetFlow enhances the rich feature capabilities of traditional NetFlow by allowing the tracking of information at Layer 2 for switching environments, at Layers 3 and 4 for IP information, and up to Layer 7 with deep packet inspection for application monitoring.

    If they both examine layers 3 & 4 which one do you pick?

  35. Asad
    December 15th, 2011

    Point is NBAR examines only L3 + L4 and Netflow examines L2 + L3 + L4.

    C. NetFlow examines data in Layers 3 and 4. (L2 is missing)

  36. Asad
    December 15th, 2011

    and Only the NBAR examines Data not NFlow .

    Netflow is only for exporting RAW Data.
    but i’m not so sure about B.

  37. crabber
    December 15th, 2011

    I believe Netflow is what they are looking for, but the docs say NBAR is 3 – 7 and traditional Netflow is 2 – 4 (just 3 – 4 on a router).

  38. crabber
    December 15th, 2011

    Asad,

    Q149 (your Q142) You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?
    A. Layer 2 mode
    B. Layer 2 Edge mode

    I looked and looked and can’t find a “Layer 2 Edge mode” Just “Layer 2” or “Layer 3” modes.
    Unless they mean Layer 2 mode on the edge (instead of central).

  39. crabber
    December 15th, 2011

    Asad,
    “and Only the NBAR examines Data not NFlow”. Ok, that I agree with. In your edited version you have Netflow. I think you have me convinced it’s NBAR.

  40. crabber
    December 15th, 2011

    Asad,
    Your edited version Q147 “When is site-to-site remote access model appropriate”, duplicate of Q85 which I believe is correct “C. for a group of users in the same vicinity sharing a connection”.
    Just FYI

  41. Asad
    December 15th, 2011

    But i’m just convinced it’s Netflow. becuse netflow monitor Data only on “L3 + L4 + only input interface”

    for Q124 i have selected A. Layer 2 mode NOT B. Layer 2 Edge mode

  42. Asad
    December 15th, 2011

    i think our dumps is different. how many questions do you have in you dump ?

  43. crabber
    December 15th, 2011

    You’re right, I was looking at the original JTA version. Let me look at yours again.
    Netflow will do ingress and egress on the interface.

  44. crabber
    December 15th, 2011

    Asad, starting over, using your question numbers. I guess since they only mention layer 3&4 maybe netflow it the better answer.
    Q7 When designing the IP routing for the Enterprise Campus network, which of these following two iBGB considerations should be taken into account
    Technically I believe and have found to be true:
    (C) Routers will not advertise iBGP learned routers to other iBGP peers (does it really mean “routers”)
    (pg 145 3rd editon) The full mesh of IBGP routers is needed because IBGP routers do not re-advertise routes learned via IBGP to other IBGP peers
    (E) iBPG peers do not add any information to the AS path
    (pg 147 3rd edition) IBGP peers are in the same autonomous system, they do not add anything to the autonomous system path

    Found on the forum some believe
    (D) Use of route reflectors or Confederation eliminate any full mesh requirement while helping to scale iBGP (“any full mesh” ?)
    (pg 145) scale iBGP: route reflectors and confederations

    Wondering if adding information to the AS path is more important in a “design” than route reflectors (not reflections) or confederation.

  45. crabber
    December 15th, 2011

    Q12 The 3 steps to confirm range of IP address can be summarized. What of the following is used in each step
    x (A) The first number in the contiguous block of addresses
    (C) The size of the contiguous block of addresses
    (pg 103 2nd edtion) A block of IP addresses might be able to be summarized if it contains sequential numbers in one of the octets

    Previous comments on the forum have 14 as C, which I believe is the same question on that dump. It does make more sense to me. You are always looking for contiguous blocks.

  46. crabber
    December 15th, 2011

    Q18 From a design perspective which 2 OSPF statements are most relevant
    (A) OSFP stub areas can be thought of as a simple form of summarization (pg 111 2nd edition)
    (B) OSFP cannot filter intra area routes (pg 111 2nd edition)
    (D) Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area

    I believe A & B are technically correct statements. I can’t find referances for D, and from what I remember it should only be used in temporary situation only.

  47. crabber
    December 15th, 2011

    Q49 Which of the following is an advantage of device clustering utilizing Virtual Port Channels (vPC)
    (A) A logical star topology provides a loop free environment so that all links will be used forward traffic
    (pg 243 3rd edition) The biggest advantage of vPC is that it enables loop-free topologies where STP is no longer actively involved in maintaining the network topology and where no links between the access and aggregation layers are blocked.
    x (C) The control plane functions of the Nexus switches are merged to hide the use of virtualization

    From what I read vPC doesn’t have a common control plane like VSS does.

  48. crabber
    December 15th, 2011

    Q73 Please match the Cisco STP enahancement term to its definition.
    I don’t believe any of the answers are correct.
    My opinion:
    a – 1
    b – 3
    c – 5
    d – 2
    f – 4

  49. crabber
    December 15th, 2011

    Q81 You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBAR and NetFlow.
    Per our previous discussion. Your edited dump has
    B) NBAR examines data in Layers 3 and 4.

    I’m with you via the thread that it should be
    (C) NetFlow examines data in Layers 3 and 4.

  50. crabber
    December 15th, 2011

    Q84 To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?
    x (C) GRE with IPSec in transport mode
    (D) GRE with IPSec in tunnel mode

    ARCH 3rd edition only talks about tunnel mode, which would allow VPN through NAT-T devices. Do you have supporting references for transport mode? I’ve looked for a while.


  51. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 20 21 22 23 24 169 390
Add a Comment

CAPTCHA Image
Reload Image