Cisco 640-822 Exams, Free Cisco 640-822 Certification Exam For Download

How To Pass Cisco https://www.pass4itsure.com/640-822.html Exam Easily? The 100% valid Flydumps latest Cisco 640-822 question answers ensure you 100% pass! Free download more Cisco 640-822 new PDF format updated exam questions on Flydumps.com.

QUESTION 50
The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 20 was performed on a router. No
routing protocols or other static routes are configured on the router.
Which statement
best describes this command?

A. The interface with IP address 192.168.10.2 is on this router.
B. The command sets a gateway of last resort for the router.
C. Packets that are destined for host 192.168.100.190 will be sent to 192.168.10.2.
D. The number 20 indicates the number of hops to the destination network.

Correct Answer: C
QUESTION 51
Tom is a network technician for the P4S company. Observe the exhibit carefully. He is trying to use
HyperTerminal to configure a new router by use of the settings presented.
Why Tom can’t
connect to the router?
A. The bits per second should be set to 9600.
B. Parity should be set to mark.
C. The stop bits should be set to 2.
D. The data bits should be set to 6.

Correct Answer: A
QUESTION 52
There are three locations in a school district of a large city: P4S-M, P4S-W and P4S-U. The network connection between two of these locations has already functioned. Configure the P4S-M router IP addresses on the E0 and S0 interfaces so that the E0 receives the first usable subnet while the S0 receives the second usable subnet from the network 192.168.160.0/28. Both interfaces would receive the last available IP address on the proper subnet.

A.
B.
C.
D.

Correct Answer:
QUESTION 53
Look at the following exhibit. You are a technician for certways. The configurations in the exhibit are pasted into the two new routers shown. Otherwise, the routers are configured with their default configurations. You cannot ping from P4S-Host1 to P4S-Host2, but you can ping the S0/0 interface of P4S-R2 from P4S-Host1. You have verified the configurations of the hosts and they are correct. What caused the problem?

A. The serial cable on P4S-R1 needs to be replaced.
B. P4S-R1 has no route to the 192.168.1.128 network.
C. The interfaces on P4S-R2 are not configured properly.
D. The IP addressing scheme has overlapping subnetworks.

Correct Answer: B QUESTION 54
In an effort to increase security within the certways wireless network, WPA is being utilized. Which two statements shown below best describe the wireless security standard that is defined by WPA? (Choose two)
A. It specifies use of a static encryption key that must be changed frequently to enhance security.
B. It requires use of an open authentication method.
C. It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D. It includes authentication by PSK.

Correct Answer: CD QUESTION 55
While moving from one access point to another, which wireless LAN design ensures that a mobile wireless client would not lose connectivity?
A. configuring all access points to use the same channel
B. recommended overlap in cell coverage is 15 to 20%
C. utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs
D. using adapters and access points manufactured by the same company

Correct Answer: B QUESTION 56
The Wi-Fi logo is a registered mark of the Wi-Fi Alliance. When the Wi-Fi logo appears on a wireless access point or client adapter, which two of these does it signify? (Choose two.)
A. The Wi-Fi Alliance has tested this device and determined that it meets IEEE WLAN standards.
B. The access point or client adapter has been manufactured by the Wireless Fidelity company.
C. The manufacturer of the equipment has paid the Wi-Fi Alliance to market its products.
D. The Wi-Fi Alliance has verified that the device can interoperate with other devices using the same standards.

Correct Answer: AD QUESTION 57
As the certways network administrator, you need to troubleshoot an interference issue with the certways wireless LAN. Which two devices can interfere with the operation of this network because they operate on similar frequencies? (choose two)
A. AM radio
B. microwave oven
C. toaster
D. cordless phone

Correct Answer: BD QUESTION 58
Install and configure three access points to cover a small office. Which one of the following terms defines the wireless topology?
A. BSS
B. IBSS
C. ESS
D. SSID

Correct Answer: C QUESTION 59
You are a network technician. You have just installed a single 802.11g access point in the center of a square office. Some wireless users come across slow performance and drops when most users are operating at peak efficiency. Which three items most likely cause this problem? (Choose three.)
A. mismatched TKIP encryption
B. cordless phones
C. metal file cabinets
D. antenna type or direction

Correct Answer: BCD QUESTION 60
Which encryption type will be used by WPA2?
A. AES-CCMP
B. PSK
C. TKIP/MIC
D. PPK via IV

Correct Answer: A QUESTION 61
Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)

A. The area of overlap of the two cells represents a basic service set (BSS).
B. The network diagram represents an extended service set (ESS).
C. Access points in each cell must be configured to use channel 1.
D. The two APs should be configured to operate on different channels.

Correct Answer: BD QUESTION 62
Assuming that you are a network technician, can you tell me which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)
A. assigning a private IP address to the AP
B. changing the default SSID value
C. configuring a new administrator password
D. changing the mixed mode setting to single mode

Correct Answer: BC QUESTION 63
Which protocol will be used by a network host to resolve a destination IPv4 address to a destination MAC address?
A. ARP
B. RARP
C. DHCP
D. DNS

Correct Answer: A QUESTION 64
Topic – Identify security threats to a network and describe general methods to mitigate those threats.
Explain today’s increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats
Explain general methods to mitigate common security threats to network devices, hosts, and applications Describe the functions of common security appliances and applications Describe security recommended practices including initial steps to secure network devices
A.
B.
C.
D.

Correct Answer:
QUESTION 65
As a network administrator, you would configure port security on a switch. Why?
A. in order to prevent unauthorized hosts from accessing the LAN
B. in order to prevent unauthorized Telnet access to a switch port
C. in order to protect the IP and MAC address of the switch and associated ports
D. in order to limit the number of Layer 2 broadcasts on a particular switch port

Correct Answer: A

Free practice questions for Cisco https://www.pass4itsure.com/640-822.html exam.These questions are aimed at giving you an idea of the type of questions you can expect on the actual exam. You will get an idea of the level of knowledge each topic goes into but because these are simple web pages you will not see the interactive and performance based questions – those are available in the Cisco 642-822.

Author: markrandom