Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 640-816 Exam - Cheat-Test.com

Free 640-816 Sample Questions:

1.What is the default Local Management Interface frame type transmitted by a Cisco router on a Frame Relay circuit?
A.Q933a
B.B8ZS
C.IETF
D.Cisco E.ANSI
Answer: D

2.What are three valid reasons to assign ports to VLANs on a switch? (Choose three.)
A.to make VTP easier to implement
B.to isolate broadcast traffic
C.to increase the size of the collision domain
D.to allow more devices to connect to the network
E.to logically group hosts according to function
F.to increase network security
Answer: B E F

3.The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork? A.255.255.255.224
B.255.255.255.248
C.0.0.0.224
D.0.0.0.8
E.0.0.0.7
F.0.0.0.3
Answer: E

4.A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC­level security on all these ports?
A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport­port security mac­address command.
B.Have end users e­mail their MAC addresses. Telnet to the switch to enter the switchport­port security mac­address command.
C.Use the switchport port­security MAC address sticky command on all the switch ports that have end devices connected to them.
D.Use show mac­address­table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port­security.
Answer: C

5.When are packets processed by an inbound access list?
A.before they are routed to an outbound interface
B.after they are routed to an outbound interface
C.before and after they are routed to an outbound interface
D.after they are routed to an outbound interface but before being placed in the outbound queue
Answer: A

6.In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?
A.during high traffic periods
B.after broken links are re­established
C.when upper­layer protocols require high reliability
D.in an improperly implemented redundant topology E.when a dual ring topology is in use
Answer: D

7.Which PPP subprotocol negotiates authentication options?
A.NCP
B.ISDN
C.SLIP
D.LCP
E.DLCI
Answer: D

8.Which statements are true about EIGRP successor routes? (Choose two.)
A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.
Answer: A, D


© 2014 Cheat-Test.com, All Rights Reserved