Adobe certification Adobe
Apple certification Apple
Avaya certification Avaya
Check Point certification Check Point
Cisco certification Cisco
Citrix certification Citrix
CIW certification CIW
CompTIA certification CompTIA
CWNP certification CWNP
EC-Council certification EC-Council
EMC certification EMC
Exin certification Exin
F5 certification F5
Fortinet certification Fortinet
GIAC certification GIAC
Hitachi certification Hitachi
HP certification HP
IBM certification IBM
Isaca certification Isaca
ISC certification ISC
ISEB certification ISEB
Juniper certification Juniper
LPI certification LPI
Microsoft certification Microsoft
Oracle certification Oracle
PMI certification PMI
Riverbed certification Riverbed
SAP certification SAP
Sun certification Sun
Sybase certification Sybase
Symantec certification Symantec
VMware certification VMware
All Exams

Cisco 640-816 Exam -

Free 640-816 Sample Questions:

1.What is the default Local Management Interface frame type transmitted by a Cisco router on a Frame Relay circuit?
D.Cisco E.ANSI
Answer: D

2.What are three valid reasons to assign ports to VLANs on a switch? (Choose three.) make VTP easier to implement isolate broadcast traffic increase the size of the collision domain allow more devices to connect to the network logically group hosts according to function increase network security
Answer: B E F

3.The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork? A.
Answer: E

4.A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC­level security on all these ports?
A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport­port security mac­address command.
B.Have end users e­mail their MAC addresses. Telnet to the switch to enter the switchport­port security mac­address command.
C.Use the switchport port­security MAC address sticky command on all the switch ports that have end devices connected to them.
D.Use show mac­address­table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port­security.
Answer: C

5.When are packets processed by an inbound access list?
A.before they are routed to an outbound interface
B.after they are routed to an outbound interface
C.before and after they are routed to an outbound interface
D.after they are routed to an outbound interface but before being placed in the outbound queue
Answer: A

6.In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?
A.during high traffic periods
B.after broken links are re­established
C.when upper­layer protocols require high reliability an improperly implemented redundant topology E.when a dual ring topology is in use
Answer: D

7.Which PPP subprotocol negotiates authentication options?
Answer: D

8.Which statements are true about EIGRP successor routes? (Choose two.)
A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.
Answer: A, D