Cisco 640-822 Questions And Answers,Provide New Cisco 640-822 Online Store

Your worries about Cisco 640-822 exam complexity no more exist because Flydumps is here to serves as a guide to help you to pass the lead for passĀ  Cisco 640-822 exam. All the exam questions and answers is the latest and covering each and every aspect of Cisco 640-822 exam.It 100% ensure you pass the exam without any doubt.

QUESTION 56
The Wi-Fi logo is a registered mark of the Wi-Fi Alliance. When the Wi-Fi logo appears on a wireless access point or client adapter, which two of these does it signify? (Choose two.)
A. The Wi-Fi Alliance has tested this device and determined that it meets IEEE WLAN standards.
B. The access point or client adapter has been manufactured by the Wireless Fidelity company.
C. The manufacturer of the equipment has paid the Wi-Fi Alliance to market its products.
D. The Wi-Fi Alliance has verified that the device can interoperate with other devices using the same standards.

Correct Answer: AD QUESTION 57
As the certways network administrator, you need to troubleshoot an interference issue with the certways wireless LAN. Which two devices can interfere with the operation of this network because they operate on similar frequencies? (choose two)
A. AM radio
B. microwave oven
C. toaster
D. cordless phone

Correct Answer: BD QUESTION 58
Install and configure three access points to cover a small office. Which one of the following terms defines the wireless topology?
A. BSS
B. IBSS
C. ESS
D. SSID

Correct Answer: C QUESTION 59
You are a network technician. You have just installed a single 802.11g access point in the center of a square office. Some wireless users come across slow performance and drops when most users are operating at peak efficiency. Which three items most likely cause this problem? (Choose three.)
A. mismatched TKIP encryption
B. cordless phones
C. metal file cabinets
D. antenna type or direction

Correct Answer: BCD QUESTION 60
Which encryption type will be used by WPA2?
A. AES-CCMP
B. PSK
C. TKIP/MIC
D. PPK via IV

Correct Answer: A QUESTION 61
Refer to the exhibit. What two facts can be determined from the WLAN diagram? (Choose two.)

A. The area of overlap of the two cells represents a basic service set (BSS).
B. The network diagram represents an extended service set (ESS).
C. Access points in each cell must be configured to use channel 1.
D. The two APs should be configured to operate on different channels.

Correct Answer: BD QUESTION 62
Assuming that you are a network technician, can you tell me which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)
A. assigning a private IP address to the AP
B. changing the default SSID value
C. configuring a new administrator password
D. changing the mixed mode setting to single mode

Correct Answer: BC QUESTION 63
Which protocol will be used by a network host to resolve a destination IPv4 address to a destination MAC address?
A. ARP
B. RARP
C. DHCP
D. DNS

Correct Answer: A QUESTION 64
Topic – Identify security threats to a network and describe general methods to mitigate those threats.
Explain today’s increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats
Explain general methods to mitigate common security threats to network devices, hosts, and applications Describe the functions of common security appliances and applications Describe security recommended practices including initial steps to secure network devices
A.
B.
C.
D.

Correct Answer:
QUESTION 65
As a network administrator, you would configure port security on a switch. Why?
A. in order to prevent unauthorized hosts from accessing the LAN
B. in order to prevent unauthorized Telnet access to a switch port
C. in order to protect the IP and MAC address of the switch and associated ports
D. in order to limit the number of Layer 2 broadcasts on a particular switch port

Correct Answer: A
QUESTION 66
What objective does an IDS accomplish?
A. hide the private IP addressing structure from outside attackers
B. perform stateful firewall functions
C. detect malicious traffic and send alerts to a management station
D. block suspicious network activity from entering the network

Correct Answer: C
QUESTION 67
The certways administrator is concerned with enhancing network security. To do this, what are two recommended ways of protecting network device configuration files from outside security threats on the network?(Choose two.)
A. Always use Telnet to access the device command line because its data is automatically encrypted.
B. Use a firewall to restrict access from the outside to the network devices.
C. Allow unrestricted access to the console or VTY ports.
D. Use SSH or another encrypted and authenticated transport to access device configurations.
Correct Answer: BD
QUESTION 68
Choose from the following the effect of using the service password-encryption command.
A. Only the enable password will be encrypted.
B. It will encrypt all current and future passwords.
C. Only the enable secret password will be encrypted.
D. Only passwords configured after the command has been entered will be encrypted.

Correct Answer: B
QUESTION 69
To protect network device configuration files from outside network security threats, what should you do? (Choose two.)
A. Allow unrestricted access to the console or VTY ports.
B. Use a firewall to restrict access from the outside to the network devices.
C. Use SSH or another encrypted and authenticated transport to access device configurations.
D. Always use Telnet to access the device command line because its data is automatically encrypted.

Correct Answer: BC
QUESTION 70
Match the corresponding command and configuration task. (Not all options are used.)
1.
login password certways1

2.
enable password certways2

3.
enable secret certways4

4.
service password-encryption

5.
line vty 0 4 password certways5

6.
line console 0 password certways3
A. encrypt all clear text passwords II.protect access to the user mode prompt III.set privileged mode encrypted password IV.set password to allow Telnet connections
B. set privileged mode clear text password
C. I-4,II-3,III-5,IV-2,V-6
D. I-4,II-5,III-3,IV-2,V-6
E. I-4,II-6,III-3,IV-5,V-2
F. I-4,II-6,III-5,IV-3,V-2

Correct Answer: C
QUESTION 71
You need to create a security plan for the certways network. What should be part of a comprehensive network security plan?
A. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
B. Physically secure network equipment from potential access by unauthorized individuals.
C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
D. Allow users to develop their own approach to network security.
Correct Answer: B
QUESTION 72
Topic – Implement and verify WAN links.
Describe different methods for connecting to a WAN Configure and verify a basic WAN serial connection
A.
B.
C.
D.

Correct Answer:
QUESTION 73
You need to create a security plan for the certways network. What should be part of a comprehensive network security plan?
A. 64 Kbit/sec
B. 32 Kbit/sec
C. 512 Kbit/sec
D. 128 Kbit/sec

Correct Answer: C
QUESTION 74
Look at the following exhibit. You are a network administrator for certways. You are configuring P4S-R to connect to a non-Cisco network. Which two commands would be applied to the S0/0 WAN interface, but not to the Fa0/0 LAN interface? (Choose two.)

A. ip address
B. no shutdown
C. encapsulation ppp
D. authentication pap

Correct Answer: CD
QUESTION 75
Look at the following exhibit. You are a network administrator for certways.You want to make each connection that is identified by the numbers shown. What kind of cable should be used?

A. 1 – Ethernet crossover cable 2 – Ethernet straight-through cable 3 – fiber optic cable 4 – rollover cable
B. 1 – Ethernet straight-through cable 2 – Ethernet crossover cable 3 – serial cable 4 – rollover cable
C. 1 – Ethernet straight-through cable 2 – Ethernet straight-through cable 3 – serial cable 4 – rollover cable
D. 1 – Ethernet rollover cable 2 – Ethernet crossover cable 3 – serial cable 4 – null modem cable

Correct Answer: C

All our Cisco products are up to date! When you buy any Cisco 640-822 product from Certpaper, as “Cisco 640-822 Questions & Answers with explanations”, you are automatically offered the 640-822 updates for a total of 90 days from the day you bought it. If you want to renew your Cisco 640-822 purchase during the period of these 90 days, your Cisco 640-822 product is renewed and you are further enabled to enjoy the free Cisco updates.

, , ,