640-822 Questions

640-822
Interconnecting Cisco Networking Devices Part 1




Try my questions too. You will get the success.


Question: 1
You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data Link
G. Physical
Answer: A
Explanation:
Layer 7 is the application layer, which is the highest layer in the OSI model. This layer describes the use of end user applications, such as opening movie files (avi, mpeg, etc) used Microsoft Office applications, using WWW browsers, using Telnet, and using FTP.


Question: 2
A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7
Answer: C
Explanation:
IP Addressing and IP routing resides on the OSI Network layer, which is layer 3.


Question: 3
As the Abc network security administrator, you are concerned with the various possible network attacks. Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
A. Trojan Horse
B. Reconnaissance
C. Denial of Service
D. Brute Force
E. Virus
F. None of the above
Answer: C
Explanation:
A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for and targets of a DoS attack may vary, it generally comprises the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Among these are Network connectivity attacks.
These attacks overload the victim with TCP packets so that its TCP/IP stack is not able to handle any further connections, and processing queues are completely full with nonsense malicious packets. As a consequence of this attack, legitimate connections are denied.
One classic example of a network connectivity attack is a SYN Flood


Question: 4
Of the following choices below, only three could be used as WAN encapsulation methods, as opposed to LAN encapsulation. Which three are they? (Choose three)
A. FDDI
B. HDLC
C. Frame Relay
D. PPP
E. Token Ring
F. Ethernet
G. VTP
Answer: B, C, D


Question: 5
Note: Please refer to the Abc Communications scenario.
The Abc 6 PC has sent the ARP request, received an ARP Reply, and sent a packet to the Abc C web server.The Ethernet frame has now been received by Router Abc A and will now be delivered to the local LAN. Consider the addressing of the Ethernet frame that now has been created by Router Abc A. Which two statements apply in this context? Select two.
A. The source address will be the MAC address of PC Abc 6.
B. The source address will be the MAC address of interface S0/0 of router Abc A
C. The source address will be the MAC address of interface S0/0 of router Abc 2.
D. The source address will be the MAC address of interface Fa0/0 of router Abc A
E. The source address will be the MAC address of interface Fa0/0 of router Abc 2.
F. The destination address will be the MAC address of Switch Abc A port attached to the Abc C web server.
G. The destination address will be the IP address of Switch Abc A port attached to the Abc C web server.
H. The destination address will be the MAC address of Switch Abc A port attached to the Abc A Fa0/0 interface..
I. The destination address will be the MAC address of the Abc C web server.
Answer: D, I

Question: 6
A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7
Answer: C
Explanation:
IP Addressing and IP routing resides on the OSI Network layer, which is layer 3.



1 comment:

Robert said...

Hi Sir/Madam
Thanks for share.
Useful for me.
keep it up