لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
A. disabling TPC so that access points can negotiate signal levels with their attached wireless devices
B. setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
C. allocating nonoverlapping channels to access points that are in close physical proximity to one another
D. configuring access points to provide clients with a maximum of 5 Mbps
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which option about JSON is true?
A. uses predefined tags or angle brackets () to delimit markup text
B. used to describe structured data that includes arrays
C. used for storing information
D. similar to HTML, it is more verbose than XML
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Refer to Exhibit. Which action do the switches take on the trunk link?
A. The trunk does not form and the ports go into an err-disabled status
B. The trunk forms but the mismatched native VLANs are merged into a single broadcast domain
C. The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link
D. The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?
A. CDP
B. SNMP
C. SMTP
D. ARP
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which command enables a router to become a DHCP client?
A. ip address dhcp
B. ip helper-address
C. ip dhcp pool
D. ip dhcp client
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
A. global unicast
B. unique local
C. link-local
D. multicast
عرض الإجابة
اجابة صحيحة: B
السؤال #7
What are two benefits of network automation? (Choose two)
A. reduced operational costs
B. reduced hardware footprint
C. faster changes with more reliable results
D. fewer network failures
E. increased network security
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
Based on the LACP neighbor status, in which mode is the SW1 port channel configured?
A. passive
B. mode on
C. auto
D. active
عرض الإجابة
اجابة صحيحة: C
السؤال #9
R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?
A. IS-IS
B. RIP
C. Internal EIGRP
D. OSPF
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
A. enable secret
B. service password-encryption
C. username Cisco password encrypt
D. enable password
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which two encoding methods are supported by REST APIs? (Choose two)
A. YAML
B. JSON
C. EBCDIC
D. SGML
E. XML
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which configuration is needed to generate an RSA key for SSH on a router?
A. Configure the version of SSH
B. Configure VTY access
C. Create a user with a password
D. Assign a DNS domain name
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which API is used in controller-based architectures to interact with edge devices?
A. overlay
B. northbound
C. underlay
D. southbound
عرض الإجابة
اجابة صحيحة: B
السؤال #14
A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other computers must be able to access the web server Which configuration when applied to switch A accomplishes this task?
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: C
السؤال #15
An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
A. Physical access control
B. Social engineering attack
C. brute force attack
D. user awareness
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: C
السؤال #17
What is the effect of this configuration?
A. The switch port interface trust state becomes untrusted
B. The switch port remains administratively down until the interface is connected to another switch
C. Dynamic ARP inspection is disabled because the ARP ACL is missing
D. The switch port remains down until it is configured to trust or untrust incoming packets
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: