Cisco 640-816 Exam, High Pass Rate Cisco 640-816 Exam Questions For Download

As for Cisco 640-816 exam sample questions, a myriad of record checks tend to be computer-based therefore, the examinees might find out their very own exam effects soon after quality. Working with a Cisco https://www.pass4itsure.com/640-816.html exam sample questions is your facts that you will be staying professional. When you order the FLYDUMPS Cisco 640-816 exam sample questions, we shall offer you free update on time for one year. Superior and also Benefit to the Cisco 640-816 test questions, 100% Assure to feed An individual’s Cisco 640-816 test Review, Downloadable, Interactive Cisco 640-816 Screening sites, Proved Answers Reviewed through Specialist, Pull and also Lose questions seeing that familiar with the very Examinations, Cisco 640-816 study materials, Process Examination Issues along with shows. Your Cisco 640-816 exam sample questions tend to be endorsed through the 100% Money-back guarantee.

QUESTION 85
The VTP status of two Certkiller devices is displayed below:

You work as a network technician at Certkiller and you have configured two switches, named Certkiller 1 and Certkiller 2 to use VTP. However, the switches are not sharing VTP messages. Given the command output shown in the graphic above, why are these switches not sharing VTP messages?
A. The VTP domain name is not correctly configured
B. VTP traps generation is disabled
C. VTP V2 mode is disabled
D. VTP pruning mode is disabled
E. The VTP operating mode is not correctly configured
F. The VTP version is not correctly configured
G. VTP has not been enabled on one of the Certkiller devices
H. None of the above

Correct Answer: A
QUESTION 86
The VTP status of switch Certkiller 1 is shown below: Given the output of the Certkiller 1 switch shown above, which statement best describes the operation of this switch?
A. VTP is disabled on this switch
B. The switch can create, change and delete VLANs
C. The switch learns VLAN information but does not have save it to NVRAM
D. The switch can create VLANs locally but will not forward this information to other switches
E. The switch learns VLAN information and updates the local VLAN database in NVRAM
F. None of the above

Correct Answer: C
QUESTION 87
Which VTP mode should a Cisco switch be set to if this switch is to add or delete VLANs to a management domain?
A. Transparent
B. Server
C. Auto
D. Client
E. User
Correct Answer: B
QUESTION 88
Refer to the following output shown on router Certkiller 2: The “show vtp status” command is executed on the Certkiller 2 switch as shown above. Based on this information, which statement is true for this switch?

A. The VLAN database is updated when VTP information is received from other switches.
B. The configuration revision number increments each time the VLAN database is updated.
C. The switch forwards its VLAN database to other switches in the ICND VTP domain.
D. The switch forwards VTP updates that are sent by other switches in the ICND domain.
E. None of the above.

Correct Answer: D
QUESTION 89
What are two results of entering the CKSwitch(config)# vtp mode client command on a Catalyst switch in the Certkiller LAN? (Choose two.)
A. The switch will ignore VTP summary advertisements
B. The switch will forward VTP summary advertisements
C. The switch will process VTP summary advertisements
D. The switch will originate VTP summary advertisements
E. The switch will create, modify and delete VLANs for the entire VTP domain
Correct Answer: BC
QUESTION 90
Exhibit:

Study the Exhibit carefully. Switch Certkiller A sends a VTP advertisement and Switch Certkiller B receives it. Which statement accurately describes how Switch Certkiller B will respond?
A. Switch Certkiller B will add 2 VLANs to its VLAN database and change the configuration revision number to 232
B. Switch Certkiller B will remove 2 VLANs from its VLAN database and change the configuration revision number to 232
C. Switch Certkiller B will enable VTP pruning, add two VLANs, and increment the configuration revision number to 233
D. Switch Certkiller B will ignore the VTP advertisement
E. None of the above

Correct Answer: D
QUESTION 91
Given the output of the London switch displayed in the graphic below, what VTP functions will this switch perform?

A. It will pass on information about the VTP configuration
B. VTP is disabled on this device
C. It will learn and save VTP configuration in the running configuration but does not save it to NVRAM
D. It will create, change and delete VLANs
E. None of the above

Correct Answer: C
QUESTION 92
Study the Exhibit below carefully: London#show vtp VTP Version: 2 Configuration Revision: 0 Maximum VLANs supported locally: 64 Number of existing VLANs: 5 VTP Operating Mode: Client VTP Domain Name: London VTP Pruning Mode: Disabled VTP V2 Mode: Disabled VTP Traps Generation: Disabled Based on the information given above, what is the VTP function of this particular switch?
A. Learn and save VTP configuration in the running configuration.
B. Create and change VLANs.
C. Forwards information about VTP configuration.
D. VTP is disabled on this device.
E. VTP is not saved to NVRAM.
Correct Answer: C
QUESTION 93
Exhibit: Study the Exhibit carefully. The network administrator has configured the switches in the school network to use VTP. The switches are not sharing VLAN information. Which sequence of commands should be issued to correct this problem?

A. Offices(config)# vtp mode client Labs(config)# vtp mode client
B. Offices(config)# vtp domain School Labs(config)# vtp domain School
C. Offices(config)# vtp pruning Labs(config)# vtp pruning
D. Offices(config)# vtp version 2 Labs(config)# vtp version 2
Correct Answer: B
QUESTION 94
Two Certkiller switches are connected together as shown below: Switches CK1 and CK2 have been configured with a trunked line that has been verified as working correctly. However, VTP is not propagating VLANs from one switch to the other. Based on the command output shown, what is the problem?

A. The revision number is not the same on both switches.
B. Only one switch can be in server mode.
C. The VTP domain name is not correctly configured.
D. VLANs have not been configured on the VTP server.
E. The VTP pruning mode is not correctly configured.
Correct Answer: C
QUESTION 95
Network topology exhibit:

Certkiller 1 exhibit:

Certkiller 2 exhibit:

Certkiller 3 exhibit:

Study the exhibits carefully. You are told by your boss, Mrs. Certkiller, that the VLAN configuration of switch Certkiller 3 is not synchronized with the other parts of the network. She tells you that you need to find out why Certkiller 3 is not receiving VTP updates. What should you tell her?
A. Certkiller 1 supports a greater number of VLANs than does switch Certkiller 3.
B. Certkiller 2 is not relaying VTP advertisments to Certkiller 3.
C. Certkiller 2 should be operating in VTP server or client mode to relay VTP updates.
D. Certkiller 3 has fewer existing VLANs than does Certkiller 1.
E. Certkiller 3 should be operating in VTP mode to relay VTP updates.
F. Certkiller 3 has a revision number higher than that being advertised.
Correct Answer: F
QUESTION 96
A simple Certkiller network is displayed in the diagram below: When PC1 sends an ARP requests for the MAC address of PC2, network performance slows dramatically, and the Certkiller switches detect an unusually high number of broadcast frames. What is the most likely cause of this?

A. The portfast feature is not enabled on all switch ports.
B. The PCs are in two different VLANS.
C. Spanning Tree Protocol is not running on the switches.
D. PC2 is down and is not able to respond to the request.
E. The VTP version running on the two switches do not match.
F. None of the above

Correct Answer: C
QUESTION 97
Four Certkiller switches are connected together as shown in the network below:

Study the Exhibit carefully. Based on the Spanning Tree Protocol port states shown, over which path will frames flow when set from PC1 to PC2?
A. CK1 – CK3 – CK4
B. CK1 – CK2 – CK4
C. CK1 – CK2 – CK3 – CK4
D. CK1 – CK3 – CK2 – CK4
E. None of the above
Correct Answer: B
QUESTION 98
The Certkiller LAN network for one of the offices is displayed below:

Assuming there is only one VLAN in this network, which switch is acting as the root bridge?
A. Certkiller 1
B. Certkiller 2
C. Certkiller 3
D. A root bridge is not required in this network.
E. None of the above

Correct Answer: C
QUESTION 99
Four Certkiller switches are connected as shown in the exhibit below:

Refer to the exhibit above. Based on the information given, which switch will be elected root bridge and why?
A. Switch A, because it has the lowest MAC address
B. Switch A, because it is the most centrally located switch
C. Switch B, because it has the highest MAC address
D. Switch C, because it is the most centrally located switch
E. Switch C, because it has the lowest priority
F. Switch D, because it has the highest priority

Correct Answer: E
QUESTION 100
Certkiller is experiencing network delays. The network administrator discovers that a worker in a location far from the MDF has connected an old 10BASE-T switch with redundant links to the existing network. How could this action be responsible for the impaired network performance?
A. Connecting a host to the old switch has created a broadcast storm.
B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.
C. The old switch does not support VLANs, which has disabled the VLAN configuration of the entire the network.
D. The old switch does not support full-duplex operation, effectively forcing half-duplex operation throughout the network.
E. Spanning Tree Protocol has elected the old switch as the root bridge, creating inefficient data paths through the switched network.
F. None of the above

Correct Answer: E
QUESTION 101
In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the Certkiller Switched LAN?
A. During high traffic periods
B. In an improperly implemented redundant topology
C. After broken links are re-established
D. When upper-layer protocols require high reliability
E. When a dual ring topology is in use
F. None of the above

Correct Answer: B
QUESTION 102
Exhibit:

You work as a network administrator at Certkiller .com. Study the exhibit carefully. The switches on the Certkiller campus network has been interconnected as displayed in the exhibit. All of the switches are running the Spanning Tree Protocol with its default settings. Unusual traffic patterns are observed and it is discovered that Switch Certkiller 9 is the root bridge. Which change will ensure that Switch Certkiller 1 will be selected as the root bridge instead of Switch Certkiller 9?
A. Disable spanning tree on Switch Certkiller 9.
B. Lower the bridge priority on Switch Certkiller 1.
C. Lower the bridge priority on Switch Certkiller 9.
D. Physically replace switch Certkiller 9 with Switch Certkiller 9 in the topology.
E. Raise the bridge priority on Switch Certkiller 1.
F. Raise the bridge priority on Switch Certkiller 9.
G. None of the above

Correct Answer: B
QUESTION 103
The “show interfaces” command was issued on a Certkiller router as shown below: Assume that the router is configured with the default settings. Based on the information shown above, what type of router interface is this?

A. Ethernet
B. Gigabit Ethernet
C. FastEthernet
D. Synchronous Serial
E. Asynchronous Serial

Correct Answer: C
QUESTION 104
The following output was displayed on a Certkiller device:

Study the exhibit above. Switch- Certkiller 1 needs to send data to host with a MAC address of 00b0.d056.efa4. What will Switch- Certkiller 1 do with this data?
A. Switch- Certkiller 1 will send an ARP request out all its ports except the port from which the data originated
B. Switch- Certkiller 1 will drop the data because it does not have an entry for the MAC address
C. Switch- Certkiller 1 will forward the data to its default gateway
D. Switch- Certkiller 1 will flood the data out all of its ports except the port from which the data originated
E. None of the above

Correct Answer: D
QUESTION 105
Some Certkiller devices are connected as shown below: The router shows the FastEthernet port as being up, and the computer on VLAN 3 can ping all of the FastEthernet IP addresses on the router. Computer 1 is used to console into switch CertkillerA. From the command prompt of switch Certkiller A, the switch cannot ping the computer on VLAN 3. The switch configuration shown in the exhibit lists only the commands that are different from the default configuration. What is the problem, based on the information shown?

A. Computer 1 must be connected to a switch port in order to communicate with a device located on VLAN 3.
B. Switch Certkiller A does not have a default gateway assigned.
C. The router is not routing VLAN 3 information.
D. The computer on VLAN 3 is assigned an incorrect IP address.
E. Switch A does not have an IP address assigned to the management VLAN.
Correct Answer: B
QUESTION 106
Two Certkiller switches are connected together as shown below:

The interface status of Certkiller A is shown below: The Certkiller network administrator has verified that a functioning cable connects Switch Certkiller 1 and Switch Certkiller 2 shown above. From the output that is shown above, what two pieces of information below are true? (Choose two)

A. Using a source MAC address of 0009.11f3.8848, Switch Certkiller 2 is sending frames to Switch Certkiller 1
B. The status of fa0/2 should be checked on Switch Certkiller 2
C. The interface is functional at OSI layer 1
D. There is likely to be an IP address issue on Switch Certkiller 1 Fa0/1
E. Interface fa0/1 on Switch Certkiller 1 is in a shutdown state
F. Switch Certkiller B is not powered on

Correct Answer: BC
QUESTION 107
You are the administrator of the Certkiller LAN and you have been reviewing error logs of networking devices and notice a large number of errors associated with several MAC addresses. You suspect that some of the errors are being generated by the routers. Which router commands will allow you to find the ip address associated with each MAC address? (Choose two)
A. show arp
B. show version
C. show address
D. show hosts
E. show interface
F. show protocols

Correct Answer: AE
QUESTION 108
The Certkiller network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)
A. ARP
B. CDP
C. DHCP
D. DNS
E. ICMP
Correct Answer: AE
QUESTION 109
Exhibit: You work as a network engineer at Certkiller .com. You study the exhibit carefully. You are told by your boss, Mrs. Certkiller, to study the interfaces of switch Certkiller 3 in particular. What can you tell her? (Select two)

A. A hub is connected directly to FastEthernet0/5.
B. FastEthernet0/1 is connected to a host with multiple network interface cards.
C. Interface FastEthernet0/2 has been disabled.
D. Mutliple devices are connected directly to FastEthernet0/1.
E. FastEthernet0/1 is configured as a trunk link.
F. FastEthernet0/5 has statically assigned MAC addresses.
Correct Answer: EF
QUESTION 110
The Certkiller network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch’s FastEthernet 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)
A. Configure port Fa0/1 to accept connections only from the static IP address of the server
B. Configure the MAC address of the server as a static entry associated with port Fa0/1
C. Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectors
D. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server
E. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address
Correct Answer: BD
QUESTION 111
The network administrator has configured port security on a Certkiller switch. Why would a network administrator configure port security on this Certkiller device?
A. To prevent unauthorized hosts from getting access to the LAN
B. To limit the number of Layer 2 broadcasts on a particular switch port
C. To prevent unauthorized Telnet or SSH access to a switch port
D. To prevent the IP and MAC address of the switch and associated ports
E. None of the above

Correct Answer: A
QUESTION 112
The network security policy for Certkiller requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should be automatically disabled. Which two commands must the Certkiller network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two)
A. SW Certkiller 1(config-if)# switchport port-security maximum 1
B. SW Certkiller 1(config)# mac-address-table secure
C. SW Certkiller 1(config)# access-list 10 permit ip host
D. SW Certkiller 1(config-if)# switchport port-security violation shutdown
E. SW Certkiller 1(config-if)# ip access-group 10

Correct Answer: AD
QUESTION 113
Three hosts connect to a Certkiller switch as shown below:

Certkiller 3 Mac Address Table Exhibit:

Ethernet FrameExhibit:

You work as a network technician at Certkiller and are working on the network shown above. You are administering the 2950 Cisco switch named Certkiller 3 and you enter the following commands on interface fa0/1 of the switch. Certkiller 3(config-if)# switchport port-security Certkiller 3(config-if)# switchport port-security mac-address sticky Certkiller 3(config-if)# switchport port-security maximum 1 The Ethernet frame that is shown arrives on interface fa0/1. Based on the information provided, what two functions will occur when this frame is received by Certkiller 3? (Choose two) A. All frames arriving on Certkiller 3 with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.
B. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.
C. Only frames from source 0000.00bb.bbbb, the first learned MAC address of Certkiller 3, will be forwarded out fa0/1.
D. This frame will be discarded when it is received by Certkiller 3.
E. Only host Certkiller A will be allowed to transmit frames on fa0/1.
F. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.

Correct Answer: AE
QUESTION 114
You have configured a Certkiller switch as shown below:
Certkiller 3(config-if)# switchport port-security
Certkiller 3(config-if)# switchport port-security mac-address sticky Select the action below that results from
executing these commands.

A. A dynamically learned MAC address is saved in the VLAN database.
B. A dynamically learned MAC address is saved in the startup-configuration file.
C. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.
D. A dynamically learned MAC address is saved in the running-configuration file.
E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.
F. None of the above

Correct Answer: D
QUESTION 115
DRAG DROP Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.151.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address. The administrator plans to configure “ip subnet-zero” and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth. Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host address choices will be used.

A.
B.
C.
D.

Correct Answer:
QUESTION 116
DRAG DROP Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.151.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address. The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth. Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.

A.
B.
C.
D.

Correct Answer:
QUESTION 117
If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which this host belongs?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.18
Correct Answer: D
QUESTION 118
Which two of the addresses below are available for host addresses on the Certkiller subnet 192.168.15.19/28? (Select two answer choices)
A. 192.168.15.17
B. 192.168.15.14
C. 192.168.15.29
D. 192.168.15.16
E. 192.168.15.31
F. None of the above
Correct Answer: AC
QUESTION 119
Certkiller has a Class C network and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. None of the above
Correct Answer: C
QUESTION 120
You have a single Class C IP address and a point-to-point serial link that you want to implement VLSM on. Which subnet mask is the most efficient for this point to point link?
A. 255.255.255.0
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
E. 255.255.255.254
F. None of the above
Correct Answer: D
QUESTION 121
You have a network that supports VLSM and you need to reduce IP address waste in your point to point WAN links. Which of the masks below would you use?
A. /38
B. /30
C. /27
D. /23
E. /18
F. /32
Correct Answer: B
QUESTION 122
What is the maximum number of IP addresses that can be assigned to hosts on a Certkiller subnet that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 32
Correct Answer: D
QUESTION 123
In a Certkiller network that supports VLSM, which network mask should be used for point-to-point WAN links in order to reduce waste of IP addresses?
A. /24
B. /30
C. /27
D. /26
E. /32
F. None of the above
Correct Answer: B
QUESTION 124
The network 172.25.0.0 has been divided into eight equal subnets. Which of the following IP addresses can be assigned to hosts in the third subnet if the ip subnet-zero command is configured on the router? (Choose three)
A. 172.25.78.243
B. 172.25.98.16
C. 172.25.72.0
D. 172.25.94.255
E. 172.25.96.17
F. 172.25.100.16
Correct Answer: ACD
QUESTION 125
The Certkiller network administrator has designed the IP scheme as shown in the diagram below:

Based on the information shown above, what effect will this addressing scheme have on the network?
A. IP traffic between subnet A and B will be prevented.
B. Routing information will not be exchanged.
C. The addressing scheme will allow all IP traffic between the LANs.
D. IP traffic between all the LANs will be prevented.
E. None of the above

Correct Answer: C
QUESTION 126
The network with the IP address 172.31.0.0/19 is to be configured on the Certkiller router with the partial configuration shown in the graphic. Which of the following statements describes the number of available subnets and hosts that will result from this configuration?
Exhibit:

A. There are 7 usable subnets, with 2046 usable host addresses.
B. There are 8 usable subnets, with 30 usable host addresses.
C. There are 7 usable subnets, with 30 usable host addresses.
D. There are 8 usable subnets, with 2046 usable host addresses.
E. There are 7 usable subnets, with 8190 usable host addresses.
F. There are 8 usable subnets, with 8190 usable host addresses.

Correct Answer: F
QUESTION 127
A portion of he Certkiller network is shown in the diagram below:

Consider the 192.1.1.0/24 network in this exhibit. This network uses RIP v2. Which combination of subnetwork assignments will satisfy the requirements for networks A, B, and C of this design? (Select three)
A. Network A = 192.1.1.128/25
B. Network A = 192.1.1.0/25
C. Network B = 192.1.1.252/30
D. Network B = 192.1.1.4/30
E. Network C = 192.1.1.64/26
F. Network C = 192.1.1.224/27

Correct Answer: ADE QUESTION 128
If an ethernet port on router CK1 was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this LAN subnet?
A. 2046
B. 1024
C. 4096
D. 8190
E. 4094
F. None of the above
Correct Answer: E
QUESTION 129
Part of the Certkiller WAN is shown below:

A new subnet with 12 hosts has been added to the Certkiller network shown above. Which subnet address should this network use to provide enough useable addresses, while wasting the fewest number of IP addresses?
A. 192.168.10.80/29
B. 192.168.10.80/28
C. 192.168.10.96/28
D. 192.168.10.96/29
E. None of the above
Correct Answer: C
QUESTION 130
DRAG DROP Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.151.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address. The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth. Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.

A.
B.
C.
D.
Correct Answer:
QUESTION 131
Part of the Certkiller WAN is shown below:

All of the Certkiller routers in this network segment are configured with the “ip subnet-zero” IOS command. Because of this, which network addresses should be used for Link Certkiller and Network Certkiller shown above? (Choose two.)
A. Network Certkiller – 172.16.3.128/25
B. Link Certkiller – 172.16.3.40/30
C. Network Certkiller – 172.16.3.192/26
D. Link Certkiller – 172.16.3.112/30
E. Link Certkiller – 172.16.3.0/30
F. Network Certkiller – 172.16.3.48/26

Correct Answer: AE
QUESTION 132
DRAG DROP Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.151.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address. The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth. Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.

A.
B.
C.
D.

Correct Answer:
QUESTION 133
A host on the Certkiller network has been configured with the IP address 10.16.3.66/23. Which two statements describe this IP address? (Choose two)
A. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
B. This network is not subnetted.
C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0
D. The subnet address is 10.16.3.0 255.255.254.0.
E. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
Correct Answer: AE
QUESTION 134
Part of the Certkiller network is shown below: In the Certkiller network shown above the IP address space of 128.107.7.0/24 has been allocated for all devices. All devices must use the same subnet mask and all subnets are usable. Which subnet mask is required to apply the allocated address space to the configuration that is shown?

A. 255.255.255.192
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.255.224
E. 255.255.254.0
F. None of the above
Correct Answer: A
QUESTION 135
DRAG DROP Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.151.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address. The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth. Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.

A.
B.
C.
D.

Correct Answer:
QUESTION 136
Part of the Certkiller network is shown below:

Based on the information shown above, what is the most efficient summarization that Router Certkiller 1 can use to advertise its networks to Router Certkiller 2?
A. 172.1.4.0/24 172.1.5.0./24 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24
B. 172.1.0.0/22
C. 172.1.0.0/21
D. 172.1.4.0/24 172.1.4.128/25 172.1.5.0/24 172.1.6.0/24 172.1.7.0/24

E. 172.1.4.0/22
F. None of the above
Correct Answer: E
QUESTION 137
You need subnet a Certkiller network segment. How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class C network?
A. 30 networks and 6 hosts.
B. 6 networks and 30 hosts.
C. 8 networks and 32 hosts.
D. 32 networks and 18 hosts.
E. 16 networks and 14 hosts.
F. None of the above

Correct Answer: E
QUESTION 138
The Certkiller network was assigned the Class C network 199.166.131.0 from the ISP. If the administrator at Certkiller were to subnet this class C network using the 255.255.255.224 subnet mask, how may hosts will they be able to support on each subnet?
A. 14
B. 16
C. 30
D. 32
E. 62
F. 64
Correct Answer: C
QUESTION 139
What is the subnet for the host IP address 172.16.210.0/22?
A. 172.16.42.0
B. 172.16.107.0
C. 172.16.208.0
D. 172.16.252.0
E. 172.16.254.0
F. None of the above
Correct Answer: C
QUESTION 140
What is the subnet for the host IP address 201.100.5.68/28?
A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65

E. 201.100.5.31
F. 201.100.5.1
Correct Answer: C QUESTION 141
Your network uses the172.12.0.0 class B address. You need to support 459 hosts per subnet, while accommodating the maximum number of subnets. Which mask would you use?
A. 255.255.0.0.
B. 255.255.128.0.
C. 255.255.224.0.

D. 255.255.254.0.
E. None of the above
Correct Answer: D
QUESTION 142
Using a subnet mask of 255.255.255.224, which of the IP addresses below can you assign to the hosts on this subnet? (Select all that apply)
A. 16.23.118.63
B. 87.45.16.159
C. 92.11.178.93
D. 134.178.18.56
E. 192.168.16.87
F. 217.168.166.192
Correct Answer: CDE
QUESTION 143
Your ISP has assigned you the following IP address and subnet mask:
IP address: 199.141.27.0
Subnet mask: 255.255.255.240
Which of the following addresses can be allocated to hosts on the resulting subnet? (Select all that apply)

A. 199.141.27.2
B. 199.141.27.175
C. 199.141.27.13
D. 199.141.27.11
E. 199.141.27.208
F. 199.141.27.112
Correct Answer: ACD
QUESTION 144
The IP network 210.106.14.0 is subnetted using a /24 mask. How many usable networks and host addresses can be obtained from this?
A. 1 network with 254 hosts
B. 4 networks with 128 hosts
C. 2 networks with 24 hosts
D. 6 networks with 64 hosts
E. 8 networks with 36 hosts

Correct Answer: A
QUESTION 145
Given that you have a class B IP address network range, which of the subnet masks below will allow for 100 subnets with 500 usable host addresses per subnet?
A. 255.255.0.0
B. 255.255.224.0
C. 255.255.254.0
D. 255.255.255.0
E. 255.255.255.224
Correct Answer: C
QUESTION 146
You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. Which of the following network masks should you use?
A. 225.225.224.0.
B. 225.225.240.0.
C. 225.225.255.0.
D. 255.255.255.224
E. 225.225.255.240
Correct Answer: D
QUESTION 147
The 213.115.77.0 network was subnetted using a /28 subnet mask. How many usable subnets and host addresses per subnet were created as a result of this?
A. 2 networks with 62 hosts
B. 6 networks with 30 hosts
C. 16 networks and 16 hosts
D. 62 networks and 2 hosts
E. 14 networks and 14 hosts
F. None of the above

Correct Answer: F
QUESTION 148
The 201.145.32.0 network is subnetted using a /26 mask. How many networks and IP hosts per network exists using this subnet mask?
A. 4 networks and 64 hosts
B. 64 networks and 4 hosts
C. 4 networks and 62 hosts
D. 62 networks and 2 hosts
E. 6 network and 30 hosts

Correct Answer: C
QUESTION 149
You have a class B network with a 255.255.255.0 mask. Which of the statements below are true of this network? (Select all valid answers)
A. There are 254 usable subnets.
B. There are 256 usable hosts per subnet.
C. There are 50 usable subnets.
D. There are 254 usable hosts per subnet.
E. There are 24 usable hosts per subnet.
F. There is one usable network.
Correct Answer: AD QUESTION 150
How many usable IP addresses can you get from a conventional Class C address?
A. 128
B. 192
C. 254
D. 256
E. 510
Correct Answer: C

You could go through each and every Cisco 640-816 question and answer given in this format thoroughly, and be confident about appearing in your final Cisco 640-816 exam. Once you have gone through the entire Cisco 640-816 practice exam, you could analyze your learning with the self test engine. The FLYDUMPS provide two more forms of study material for Cisco https://www.pass4itsure.com/640-816.html exam sample questions. The Cisco 640-816 study guide is meant for those professionals, who do not get enough time to study. FLYDUMPS Cisco 640-816 exam sample questions come with 80 real exam questions and answers for preparing the Cisco 640-816 Test.

Author: markrandom