Buy Latest Cisco 640-802 PDF and Vce Questions For Groundbreaking Results


Exam A
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)
A. to uniquely identify devices at Layer 2
B. to allow communication with devices on a different network
C. to differentiate a Layer 2 frame from a Layer 3 packet
D. to establish a priority system to determine which device gets to transmit first to
E. allow communication between different devices on the same network
F. to allow detection of a remote device when its physical address is unknown

Correct Answer: AE
What are two advantages of Layer 2 Ethernet switches over hubs? (Choose two.)
A. decreasing the number of collision domains
B. filtering frames based on MAC addresses
C. allowing simultaneous frame transmissions
D. increasing the size of broadcast domains
E. increasing the maximum length of UTP cabling between devices

Correct Answer: BC

Refer to the exhibit. Why has this switch not been elected the root bridge forVLAN1?
A. It has more than one interface that is connected to the root network segment
B. It is running RSTP while the elected root bridge is running 802.1d spanning tree
C. It has a higher MAC address than the elected root bridge
D. It has a higher bridge ID than the elected root bridge

Correct Answer: D QUESTION 4
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch. What must be done to ensure that this new switch becomes the root bridge on the network?
A. Lower the bridge priority number
B. Change the MAC address of the switch
C. Increase the VTP revision number for the domain
D. Lower the root path cost on the switch ports
E. Assign the switch an IP address with the lowest value

Correct Answer: A
Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard? (Choose two.)
A. alternate
B. backup
C. designated
D. disabled
E. root

Correct Answer: CE
Which two of these statements regarding RSTP are correct? (Choose two.)
A. RSTP cannot operate with PVST +
B. RSTP defines new port roles
C. RSTP defines no new port states
D. RSTP is a proprietary implementation of IEEE 802.1D STP
E. RSTP is compatible with the original IEEE 802.1D STP

Correct Answer: BE
What are three advantages of VLANs? (Choose three.)
A. VLANs establish broadcast domains in switched networks
B. VLANs utilize packet filtering to enhance network security
C. VLANs provide a method of conserving IP addresses in large networks
D. VLANs provide a low-latency internetworking alternative to routed networks
E. VLANs allow access to network services based on department, not physical location
F. VLANs can greatly simplify adding, moving, or changing hosts on the network
Correct Answer: AEF

What are two benefits of using VTP in a switching environment? (Choose two.)
A. It allows switches to read frame tags
B. It allows ports to be assigned to VLANs automatically
C. It maintains VLAN consistency across a switched network
D. It allows frames from multiple VLANs to use a single interface
E. It allows VLAN information to be automatically propagated throughout the switching environment
Correct Answer: CE
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
A. A new switch has no VLANs configured
B. Connectivity between VLANs requires a Layer 3 device
C. VLANs typically decrease the number of collision domains
D. Each VLAN uses a separate address space
E. A switch maintains a separate bridging table for each VLAN
F. VLANs cannot span multiple switches

Correct Answer: BDE
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport port-security mac-address command
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport port-security mac-address command
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security
Correct Answer: C