Adobe certification Adobe
Apple certification Apple
Avaya certification Avaya
BlackBerry certification BlackBerry
CA Technologies certification CA Technologies
Check Point certification Check Point
Cisco certification Cisco
Citrix certification Citrix
CIW certification CIW
CompTIA certification CompTIA
CWNP certification CWNP
EC-Council certification EC-Council
EMC certification EMC
Exin certification Exin
FileMaker certification FileMaker
Fortinet certification Fortinet
GIAC certification GIAC
GIAC certification Google
HP certification HP
HRCI certification HRCI
IBM certification IBM
Isaca certification Isaca
ISC certification ISC
ISEB certification ISEB
iSQI certification iSQI
Juniper certification Juniper
LPI certification LPI
McAfee certification McAfee
NetApp certification NetApp
Oracle certification Oracle
Pegasystems certification Pegasystems
PMI certification PMI
Riverbed certification Riverbed
SAP certification SAP
SAS certification SAS Institute
SOA certification SOA
Symantec certification Symantec
Teradata certification Teradata
VMware certification VMware
All Exams

Cisco 640-822 Exam -

Free 640-822 Sample Questions:

1. Why would a network administrator configure port security on a switch?
A. to prevent unauthorized Telnet access to a switch port
B. to limit the number of Layer 2 broadcasts on a particular switch port
C. to prevent unauthorized hosts from accessing the LAN
D. to protect the IP and MAC address of the switch and associated ports
E. to block unauthorized access to the switch management interfaces over common TCP ports
Answer: C

2. Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)
A. It specifies use of a static encryption key that must be changed frequently to enhance security.
B. It requires use of an open authentication method.
C. It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
D. It requires that all access points and wireless devices use the same encryption key.
E. It includes authentication by PSK.
Answer: C, E

3. Which two statements describe the operation of the CSMA/CD access method? (Choose two.)
A. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.
D. After a collision, the station that detected the collision has first priority to resend the lost data.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
Answer: B, E

4. Assuming a subnet mask of, which three addresses are valid host addresses? (Choose three.)
Answer: B, D, F

5. Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports?
A. static NAT
B. dynamic NAT
C. overloading
D. overlapping
E. port loading
Answer: C

6. What should be part of a comprehensive network security plan?
A. Allow users to develop their own approach to network security.
B. Physically secure network equipment from potential access by unauthorized individuals.
C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
D. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
E. Minimize network overhead by deactivating automatic antivirus client updates.
Answer: B

7. A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.)
A. mismatched TKIP encryption
B. null SSID
C. cordless phones
D. mismatched SSID
E. metal file cabinets
F. antenna type or direction
Answer: C, E, F

8. What two actions must a router take in order to route incoming packets? (Choose two.)
A. Identify the destination network address of each packet.
B. Identify the source network address of each packet.
C. Validate sources of routing information.
D. Inspect the routing table to select the best path to the destination network address.
E. Verify the receipt of routed packets by the next hop router.
F. Inspect the ARP table to verify a legitimate source MAC address for each packet.
Answer: A, D

9. What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
A. Allow unrestricted access to the console or VTY ports.
B. Use a firewall to restrict access from the outside to the network devices.
C. Always use Telnet to access the device command line because its data is automatically encrypted.
D. Use SSH or another encrypted and authenticated transport to access device configurations.
E. Prevent the loss of passwords by disabling password encryption.
Answer: B, D

10. Which two statements describe the IP address (Choose two.)
A. The subnet address is
B. The lowest host address in the subnet is
C. The last valid host address in the subnet is
D. The broadcast address of the subnet is
E. The network is not subnetted.
Answer: B, D

11. At which layer of the OSI model does the protocol that provides the information displayed by the show cdp neighbors command operate?
A. physical
B. data link
C. network
D. transport
E. application
Answer: B

12. Which of the following describe private IP addresses? (Choose two.)
A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization
Answer: B, D

13. WAN data link encapsulation types include which of the following? (Choose two.)
A. T1
B. Frame Relay
Answer: B, D

14. Which of the following are found in a TCP header, but not in a UDP header? (Choose three.)
A. sequence number
B. acknowledgment number
C. source port
D. destination port
E. window size
F. checksum
Answer: A, B, E

15. What is the subnet address of
Answer: C