Cisco 640-816 Practice Exam, 100% Pass Rate Cisco 640-816 Exam Tests Online Store

Welcome to download the newest Newcerts 070-480 VCE dumps:

Where to find the new Cisco 640-816 exam questions to pass the exam easily? Now,Flydumps has publised the new version of Cisco 642-311 exam dumps with new added exam questions.Flydumps offer the latest Cisco 640-816 PDF and VCE dumps with New Version VCE Player for free download, and the new Cisco 640-816 practice tests ensure your exam 100% pass.

The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?
A. subnetted with mask
B. subnetted with mask
C. subnetted with mask
D. subnetted with mask
E. subnetted with mask

Correct Answer: D
Which address is the IPv6 all-RIP-routers multicast group address that is used by RIPng as the destination address for RIP updates?FF02::6
A. FF02::6
B. FF02::9
C. FF05::101
D. FF02::A

Correct Answer: B
Which command shows your active Telnet connections?
A. show cdp neigbors
B. show session
C. show users
D. show vty logins
Correct Answer: B
What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?
A. B514 : 82C3 : 0029 : EC7A : EC72
B. B514 : 82C3 :: 0029 : EC7A : EC72
C. B514 : 82C3 : 0029 :: EC7A : 0000 : EC72
D. B514 : 82C3 :: 0029 : EC7A : 0 : EC72
Correct Answer: D
In which integration method is an IPv6 packet encapsulated within an IPv4 protocol?
A. dual-stack
B. proxy
C. dot1q
D. tunneling

Correct Answer: D
Which command is used to display the collection of OSPF link states?
A. show ip ospf link-state
B. show ip ospf lsa database
C. show ip ospf neighbors
D. show ip ospf database

Correct Answer: D
What is the default administrative distance of OSPF?
A. 90
B. 100
C. 110
D. 120

Correct Answer: C
Select the action that results from executing these commands.
Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address sticky
A. A dynamically learned MAC address is saved in the startup-configuration file.
B. A dynamically learned MAC address is saved in the running-configuration file.
C. A dynamically learned MAC address is saved in the VLAN database.
D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.
E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

Correct Answer: B
Two switches are connected through a trunk link. Which two commands show that there is a native VLAN mismatch on that link? (Choose two.)
A. show vlan brief
B. show interface trunk
C. show interface vlan
D. show interface switchport
E. show interface interface
F. show switchport trunk

Correct Answer: BD
A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted.
Which set of commands will accomplish this task?
A. service password-encryption access-listl permit line vty0 4 login password cisco access-class 1
B. enable password secret line vty0 login password cisco
C. service password-encryption line vty0 login password cisco
D. service password-encryption line vty0 4 login password cisco

Correct Answer: C
Unauthorized users have used Telnet to gain access to a company router. The network administrator wants to configure and apply an access list to allow Telnet access to the router, but only from the network administrator’s computer. Which group of commands would be the best choice to allow only the IP address to have Telnet access to the router?
A. access-list 101 permit tcp any host eq telnet interface s0/0 ip access-group 101 in
B. access-list 3 permit host line vty 0 4 access-class 3 in
C. access-list 101 permit tcp any host eq telnet access-list 101 permit ip any any interface s0/0 ip access-group 101 in
D. access-list 3 permit host line vty 0 4 ip access-group 3 in

Correct Answer: B
The output of the show frame-relay pvc command shows “PVC STATUS = INACTIVE”. What does this mean?
A. The PVC is configured correctly and is operating normally, but no data packets have been detected for more than five minutes.
B. The PVC is configured correctly, is operating normally, and is no longer actively seeking the address of the remote router.
C. The PVC is configured correctly, is operating normally, and is waiting for interesting traffic to trigger a call to the remote router.
D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC.
E. The PVC is not configured on the local switch.
Correct Answer: D
A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks,,, and only. Which two ACL statements, when combined, are the best for accomplishing this task? (Choose two.)
A. access-list 10 permit ip
B. access-list 10 permit ip
C. access-list 10 permit ip
D. access-list 10 permit ip
E. access-list 10 permit ip
F. access-list 10 permit ip
Correct Answer: AC Exam B
Which three elements must be used when you configure a router interface for VLAN trunking? (Choose three.)
A. one physical interface for each subinterface
B. one IP network or subnetwork for each subinterface
C. a management domain for each subinterface
D. subinterface encapsulation identifiers that match VLAN tags
E. one subinterface per VLAN
F. subinterface numbering that matches VLAN tags
Correct Answer: BDE
Which three statements about VTP features are true? (Choose three.)
A. VTP works at Layer 3 of the OSI model and requires that a management VLAN IP address be configured.
B. When properly configured, VTP minimizes VLAN misconfigurations and configuration inconsistencies.
C. When properly configured, VTP maintains VLAN configuration consistency and accelerates trunk link negotiation.
D. Each broadcast domain on a switch can have its own unique VTP domain.
E. VTP pruning is used to increase available bandwidth in trunk links.
F. To configure a switch to be part of two VTP domains, each domain must have its own passwords.
G. Client, server, and transparent are valid VTP modes.
Correct Answer: BEG
Which two of these statements are true of IPv6 address representation? (Choose two.)
A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B. A single interface may be assigned multiple IPv6 addresses of any type.
C. Every IPv6 interface contains at least one loopback address
D. The first 64 bits represent the dynamically created interface ID.
E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.
Correct Answer: BC

Which statement about IPv6 is true?
A. Addresses are not hierarchical and are assigned at random.
B. Only one IPv6 address can exist on a given interface.
C. There are 2.7 billion addresses available.
D. Broadcasts have been eliminated and replaced with multicasts.
Correct Answer: D
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?
Correct Answer: B
How does using the service password-encryption command on a router provide additional security?
A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router
Correct Answer: B
A router is running three routing processes: RIP, OSPF, and EIGRP, each configured with default characteristics. Each process learns a route to the same remote network. If there are no static routes to the destination and none of the routes were redistributed, which route will be placed in the IP routing table?
A. the route learned through EIGRP
B. the route learned through OSPF
C. the route learned through RIP
D. the route with the lowest metric
E. all three routes with the router load balancing
Correct Answer: A
Which command can be used from a router to verify the Layer 3 path to a host?
A. tracert address
B. traceroute address
C. telnet address
D. ssh address
Correct Answer: B
An access list has been designed to prevent Telnet traffic from the Graphics Department from reaching the HR server attached to the Eastfield router but allow Telnet traffic to other destinations. Given the following access list:
access-list 101 deny tcp any any eq 23 permit ip any any
On which router, interface, and in what direction should the access list be placed to most efficiently implement this list? (Choose three.)
A. Westfield
B. Eastfield
C. e0
D. s0
E. in
F. out
Correct Answer: BCF
Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports?
A. static NAT
B. dynamic NAT
C. overloading
D. overlapping
E. port loading
Correct Answer: C
Which two statements about static NAT translations are true? (Choose two.)
A. They allow connections to be initiated from the outside.
B. They require no inside or outside interface markings because addresses are statically defined.
C. They are always present in the NAT table.
D. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
Correct Answer: AC
What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)
A. reduced cost
B. better throughput
C. broadband incompatibility
D. increased security
E. scalability
F. reduced latency
Correct Answer: ADE
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? (Choose two.)
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
Correct Answer: CE
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)
A. 802.1Q native VLAN frames are untagged by default.
B. 802.1Q trunking ports can also be secure ports.
C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D. 802.1Q trunks require full-duplex, point-to-point connectivity.
E. 802.1Q trunks should have native VLANs that are the same at both ends.
Correct Answer: ACE
Which set of commands is recommended to prevent the use of a hub in the access layer?
A. switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
B. switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
C. switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
D. switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1
Correct Answer: C
Which three statements about RSTP are true? (Choose three.)
A. RSTP significantly reduces topology reconverging time after a link failure.
B. RSTP expands the STP port roles by adding the alternate and backup roles.
C. RSTP port states are blocking, discarding, learning, or forwarding.
D. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.
E. RSTP also uses the STP proposal-agreement sequence.
F. RSTP uses the same timer-based process as STP on point-to-point links.
Correct Answer: ABD
Assuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch?
A. 1 through 1001
B. 2 through 1001
C. 1 through 1002
D. 2 through 1005
Correct Answer: B
The ROUTE company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter-VLAN routing. A trunk is configured to connect the switch to the router. What is the minimum number of router subinterfaces that are required for all the VLANs to communicate?
A. zero
B. one
C. two
D. three
Correct Answer: C
Identify the four valid IPv6 addresses. (Choose four.)
A. ::
B. ::192:168:0:1
C. 2000::
D. 2001:3452:4952:2837::
E. 2002:c0a8:101::42
F. 2003:dead:beef:4dad:23:46:bb:101
Correct Answer: ABEF
A network administrator receives an error message while trying to configure the Ethernet interface of a router with IP address Which statement explains the reason for this issue?
A. VLSM-capable routing protocols must be enabled first on the router.
B. This address is a network address.
C. This address is a broadcast address
D. The Ethernet interface is faulty.
Correct Answer: B
You are working in a data center environment and are assigned the address range You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?
Correct Answer: D
Which IPv6 address is valid?
A. 2001:0db8:0000:130F:0000:0000:08GC:140B
B. 2001:0db8:0:130H::87C:140B
C. 2031::130F::9C0:876A:130B
D. 2031:0:130F::9C0:876A:130B
Correct Answer: D

Which statements are true about EIGRP successor routes? (Choose two.)
A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as “active” in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.
Correct Answer: AD
What can be done to secure the virtual terminal interfaces on a router? (Choose two.)
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
Correct Answer: DE
Which command reveals the last method used to powercycle a router?
A. show reload
B. show boot
C. show running-config
D. show version
Correct Answer: D
Which two statements are characteristics of a distance vector routing protocol? (Choose two.)
A. Each router has its own view of the topology.
B. Updates are periodic and include the entire routing table.
C. Routing updates are sent only after topology changes.
D. Convergence is usually faster than with link state protocols.
E. RIP is an example of distance vector routing protocols.
F. The protocol can be useful in hub-and-spoke and hierarchical networks.
Correct Answer: BE
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two.)
A. terminal monitor
B. logging host ip-address
C. no logging console
D. snmp-server enable traps syslog
E. show logging | redirect flash:output.txt
Correct Answer: AB
Which parameter can be tuned to affect the selection of a static route as a backup, when a dynamic protocol is also being used?
A. hop count
B. administrative distance
C. link bandwidth
D. link delay
E. link cost
Correct Answer: B QUESTION 29
Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?
A. transport output all
B. transport preferred all
C. transport type all
D. transport input all

Correct Answer: D QUESTION 30
In which solution is a router ACL used?
A. filtering packets that are passing through a router
B. to change the default administrative distance of a route in the route table
C. protecting a server from unauthorized access
D. controlling path selection, based on the route metric

Correct Answer: A QUESTION 31
Which IPsec security protocol should be used when confidentiality is required?
A. MD5

Correct Answer: D QUESTION 32
What is the result of issuing the frame-relay map ip 202 broadcast command?
A. defines the destination IP address that is used in all broadcast packets on DCLI 202
B. defines the source IP address that is used in all broadcast packets on DCLI 202
C. defines the DLCI on which packets from the IP address are received
D. defines the DLCI that is used for all packets that are sent to the IP address

Correct Answer: D QUESTION 33
Select and Place:

Correct Answer:

DRAG DROP Refer to exhibits:

Select and Place: Correct Answer:

Flydumps is an excellent source of information on IT Certifications. In the Flydumps, you can find study skills and learning materials for your exam. Flydumps Dynamics Cisco 640-816 dumps are studied by the experienced IT experts. It has a strong accuracy and logic. To encounter Flydumps,  you will encounter the best Dynamics Cisco 640-816 dumps. You can rest assured that using our Dynamics Cisco 640-816 dumps. With it, you have done fully prepared to meet this exam.

Newcerts 070-480 dumps with PDF + Premium VCE + VCE Simulator: