CCNA INCD2 640-816 Real Exam Questions

The 640-816 Interconnecting Cisco Networking Devices Part 2 (ICND2) is the exam associated with the Cisco Certified Network Associate certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices Part 2 (ICND2) v1.0 course. This exam tests a candidate’s knowledge and skills required to successfully install, operate, and troubleshoot a small to medium size enterprise branch network. The exam covers topics on VLSM and IPv6 addressing; extending switched networks with VLANs; configuring, verifying and troubleshooting VLANs; the VTP, RSTP, OSPF and EIGRP protocols; determining IP routes; managing IP traffic with access lists; NAT and DHCP; establishing point-to- point connections; and establishing Frame Relay connections.

1: A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?

A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
Correct Answers: C

2: In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

A.during high traffic periods
B.after broken links are re-established
C.when upper-layer protocols require high reliability
D.in an improperly implemented redundant topology
E.when a dual ring topology is in use
Correct Answers: D

3: Which PPP subprotocol negotiates authentication options?

A.NCP
B.ISDN
C.SLIP
D.LCP
E.DLCI
Correct Answers: D

4: A network administrator is configuring the routers in the graphic for OSPF. The OSPF process has been started and the networks have been configured for Area 0 as shown in the diagram. The network administrator has several options for configuring RouterB to ensure that it will be preferred as the designated router (DR) for the 172.16.1.0 /24 LAN segment. What configuration tasks could be used to establish this preference? (Choose three.)

A.Configure the priority value of the Fa0/0 interface of RouterB to a higher value than any other interface on the Ethernet network.
B.Change the router id of Router B by assigning the IP address 172.16.1.130/24 to the Fa0/0 interface of RouterB.
C.Configure a loopback interface on RouterB with an IP address higher than any IP address on the other routers.
D.Change the priority value of the Fa0/0 interface of RouterB to zero.
E.Change the priority values of the Fa0/0 interfaces of RouterA and RouterC to zero.
F.No further configuration is necessary.
Correct Answers: A C E

5: Which statements are true about EIGRP successor routes? (Choose two.)

A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.
Correct Answers: A D

6: When are packets processed by an inbound access list?

A.before they are routed to an outbound interface
B.after they are routed to an outbound interface
C.before and after they are routed to an outbound interface
D.after they are routed to an outbound interface but before being placed in the outbound queue
Correct Answers: A

7: The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

A.255.255.255.224
B.255.255.255.248
C.0.0.0.224
D.0.0.0.8
E.0.0.0.7
F.0.0.0.3
Correct Answers: E

8: What is the purpose of the command shown below?
vtp password Fl0r1da

A.It is used to validate the sources of VTP advertisements sent between switches.
B.It is used to access the VTP server to make changes to the VTP configuration.
C.It allows two VTP servers to exist in the same domain, each configured with different passwords.
D.It is the password required when promoting a switch from VTP client mode to VTP server mode.
E.It is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.
Correct Answers: A

9: What is the purpose of the OSPF router ID in a DR/BDR election?

A.It is used with the OSPF priority values to determine which OSPF router will become the DR or BDR in a point-to-point network.
B.It is used with the OSPF priority values to determine which interface will be used to form a neighbor relationship with another OSPF router.
C.It is used with the OSPF priority values to determine which router will become the DR or BDR in a multiaccess network.
D.It is used to determine which interfaces will send Hello packets to neighboring OSPF routers.
Correct Answers: C

10: When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the interface clock rate determined?

A.It is supplied by the CSU/DSU.
B.It is supplied by the far end router.
C.It is determined by the clock rate command.
D.It is supplied by the Layer 1 bit stream timing.
Correct Answers: A

Download  |  Password: ciscobibles.com