لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two.)
A. enable the PortFast feature on ports
B. configure static ARP entries C
E. shut down unused ports
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which CRUD operation modifies an existing table or view?
A. read
B. update C
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following is the JSON encoding of a dictionary or hash? A.{"key": "value"} B.["key", "value"] C.{"key", "value"} D.("key": "value")
Which of the following is the JSON encoding of a dictionary or hash? A. "key": "value"} B
عرض الإجابة
اجابة صحيحة: A
السؤال #4
An engineer requires a switch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?
A. switchport mode trunk
B. switchport mode dynamic desirable C
عرض الإجابة
اجابة صحيحة: IT
السؤال #5
What are two functions of a Layer 2 switch? (Choose two.)
A. acts as a central point for association and authentication servers
B. selects the best route between networks on a WAN C
E. makes forwarding decisions based on the MAC address of a packet
عرض الإجابة
اجابة صحيحة: IT
السؤال #6
What are two fundamentals of virtualization? (Choose two.)
A. It allows logical network devices to move traffic between virtual machines and the rest of the physical network
B. It allows multiple operating systems and applications to run independently on one physical server
E. The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic
عرض الإجابة
اجابة صحيحة: AE
السؤال #7
Where does the configuration reside when a helper address is configured lo support DHCP?
A. on the router closest to the server
B. on the router closest to the client C
عرض الإجابة
اجابة صحيحة: D
السؤال #8
An engineer must configure interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken?
A. configure DSCP
B. configure IEEE 802
عرض الإجابة
اجابة صحيحة: IT
السؤال #9
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend? A.infrastructure-as-a-service B.platform-as-a-service C.business process as service to support different types of service D.software-as-a-service
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend? A
عرض الإجابة
اجابة صحيحة: S
السؤال #10
Which two encoding methods are supported by REST APIs? (Choose two.) A.SGML B.YAML C.XML D.JSON E.EBCDIC
Which two encoding methods are supported by REST APIs? (Choose two. A
عرض الإجابة
اجابة صحيحة: DE
السؤال #11
What software-defined architecture plane assists network devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information?
A. management plane
B. control plane C
عرض الإجابة
اجابة صحيحة: B
السؤال #12
After the election process, what is the root bridge in the HQ LAN? Switch 1: 0C:E0:38:81:32:58 Switch 2: 0C:0E:15:22:1A:61 Switch 3: 0C:0E:15:1D:3C:9A Switch 4: 0C:E0:19:A1:4D:16 A.Switch 1 B.Switch 2 C.Switch 3 D.Switch 4
After the election process, what is the root bridge in the HQ LAN? Switch 1: 0C:E0:38:81:32:58 Switch 2: 0C:0E:15:22:1A:61 Switch 3: 0C:0E:15:1D:3C:9A Switch 4: 0C:E0:19:A1:4D:16 A. witch 1 B
عرض الإجابة
اجابة صحيحة: S
السؤال #13
Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?
A. RADIUS B
عرض الإجابة
اجابة صحيحة: S
السؤال #14
What is the purpose of traffic shaping?
A. to be a marking mechanism that identifies different flows
B. to provide fair queuing for buffered flows C
عرض الإجابة
اجابة صحيحة: C
السؤال #15
In software defined architectures, which plane is distributed and responsible for traffic forwarding?
A. management plane
B. policy plane C
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which option best describes an API?
A. a contract that describes how various components communicate and exchange data with each other
B. an architectural style (versus a protocol) for designing applications C
عرض الإجابة
اجابة صحيحة: D
السؤال #17
A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?
A. switchport port-security violation access
B. switchport port-security violation protect C
عرض الإجابة
اجابة صحيحة: D
السؤال #18
What are two benefits of controller-based networking compared to traditional networking? (Choose two.)
A. controller-based increases network bandwidth usage, while traditional lightens the load on the network
B. controller-based reduces network configuration complexity, while traditional increases the potential for errors C
E. controller-based inflates software costs, while traditional decreases individual licensing costs
عرض الإجابة
اجابة صحيحة: A
السؤال #19
In QoS, which prioritization method is appropriate for interactive voice and video?
A. traffic policing
B. round-robin scheduling C
عرض الإجابة
اجابة صحيحة: C
السؤال #20
What is an advantage of Cisco DNA Center versus traditional campus device management?
A. It is designed primarily to provide network assurance
B. It supports numerous extensibility options, including cross-domain adapters and third-party SDKs
عرض الإجابة
اجابة صحيحة: A
السؤال #21
How does the dynamically-learned MAC address feature function?
A. The CAM table is empty until ingress traffic arrives at each port
B. Switches dynamically learn MAC addresses of each connecting CAM table
عرض الإجابة
اجابة صحيحة: IT
السؤال #22
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
A. different nonoverlapping channels
B. one overlapping channel C
عرض الإجابة
اجابة صحيحة: S
السؤال #23
What facilitates a Telnet connection between devices by entering the device name? A.SNMP
B. DNS lookup C
عرض الإجابة
اجابة صحيحة: AC
السؤال #24
When PC1 sends a packet to PC2, the packet has which source and destination IP address when it arrives at interface Gi0/0 on router R2?
A. source 192
B. source 192
عرض الإجابة
اجابة صحيحة: S
السؤال #25
Refer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two.)
A. All of the routers need to be configured for backbone Area 1
B. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3
E. EIGRP is also configured on these routers with a lower administrative distance
F. R1 and R3 are configured in different areas
عرض الإجابة
اجابة صحيحة: S
السؤال #26
What is a function of TFTP in network operations?
A. transfers IOS images from a server to a router for firmware upgrades
B. transfers a backup configuration file from a server to a switch using a username and password C
عرض الإجابة
اجابة صحيحة: AE
السؤال #27
An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or desirable mode. What action should be taken?
A. configure switchport nonegotiate
B. configure switchport mode dynamic desirable C
عرض الإجابة
اجابة صحيحة: IT
السؤال #28
What are two characteristics of a controller-based network? (Choose two.) A.It uses Telnet to report system issues.
B. The administrator can make configuration updates from the CLI
E. It moves the control plane to a central point
عرض الإجابة
اجابة صحيحة: D
السؤال #29
What is a function of a remote access VPN?
A. establishes a secure tunnel between two branch sites
B. uses cryptographic tunneling to protect the privacy of data for multiple users simultaneously C
عرض الإجابة
اجابة صحيحة: A
السؤال #30
A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?
A. access-list 2699 permit udp 10
B. no access-list 2699 deny tcp any 10
عرض الإجابة
اجابة صحيحة: CE
السؤال #31
What benefit does controller-based networking provide versus traditional networking?
A. allows configuration and monitoring of the network from one centralized point
B. provides an added layer of security to protect from DDoS attacks C
عرض الإجابة
اجابة صحيحة: B
السؤال #32
What are two functions of a server on a network? (Choose two.)
A. handles requests from multiple workstations at the same time
B. achieves redundancy by exclusively using virtual server clustering C
E. runs applications that send and retrieve data for workstations that make requests
عرض الإجابة
اجابة صحيحة: IT
السؤال #33
Which state does the switch port move to when PortFast is enabled?
A. blocking
B. listening C
عرض الإجابة
اجابة صحيحة: S
السؤال #34
What is the function of a server?
A. It transmits packets between hosts in the same broadcast domain
B. It provides shared applications to end users
عرض الإجابة
اجابة صحيحة: CD
السؤال #35
What are two benefits of network automation? (Choose two.)
A. reduced hardware footprint
B. reduced operational costs C
E. increased network security
عرض الإجابة
اجابة صحيحة: B
السؤال #36
How does Cisco DNA Center gather data from the network?
A. Devices use the call-home protocol to periodically send data to the controller
B. Devices establish an IPsec tunnel to exchange data with the controller C
عرض الإجابة
اجابة صحيحة: C
السؤال #37
What is the primary function of a Layer 3 device?
A. to transmit wireless traffic between hosts
B. to analyze traffic and drop unauthorized traffic from the Internet C
عرض الإجابة
اجابة صحيحة: IT
السؤال #38
What is a DHCP client?
A. a workstation that requests a domain name associated with its IP address
B. a host that is configured to request an IP address automatically C
عرض الإجابة
اجابة صحيحة: A
السؤال #39
What role does a hypervisor provide for each virtual machine in server virtualization? A.infrastructure-as-a-service B.Software-as-a-service C.control and distribution of physical resources D.services as a hardware controller
What role does a hypervisor provide for each virtual machine in server virtualization? A. nfrastructure-as-a-service B
عرض الإجابة
اجابة صحيحة: BC
السؤال #40
Which type of API allows SDN controllers to dynamically make changes to the network?
A. northbound API B
عرض الإجابة
اجابة صحيحة: B
السؤال #41
Which statement correctly compares traditional networks and controller-based networks?
A. Only controller-based networks decouple the control plane and the data plane
B. Traditional and controller-based networks abstract policies from device configurations
عرض الإجابة
اجابة صحيحة: AC
السؤال #42
Which two functions are performed by the core layer in a three-tier architecture? (Choose two.)
A. Provide uninterrupted forwarding service
B. Inspect packets for malicious activity C
E. Police traffic that is sent to the edge of the network
عرض الإجابة
اجابة صحيحة: S
السؤال #43
Which command configures a floating static route to provide a backup to the primary link?
A. ip route 209
B. ip route 209
عرض الإجابة
اجابة صحيحة: S
السؤال #44
An engineer configured the New York router with static routes that point to the Atlanta and Washington sites. Which command must be configured on the Atlanta and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?
A. ipv6 route::/0 Serial 0/0/0
B. ipv6 route::/0 Serial 0/0/1 C
عرض الإجابة
اجابة صحيحة: S
السؤال #45
Which option about JSON is true
A. uses predefined tags or angle brackets () to delimit markup text
B. used to describe structured data that includes arrays C
عرض الإجابة
اجابة صحيحة: AB
السؤال #46
Which function is performed by the collapsed core layer in a two-tier architecture?
A. enforcing routing policies
B. marking interesting traffic for data policies C
عرض الإجابة
اجابة صحيحة: IT
السؤال #47
Which two capabilities of Cisco DNA Center make it more extensible? (Choose two.)
A. REST APIs that allow for external applications to interact natively with Cisco DNA Center
B. adapters that support all families of Cisco IOS software C
E. customized versions for small, medium, and large enterprises
عرض الإجابة
اجابة صحيحة: D
السؤال #48
Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state? A.BPDUfilter B.PortFast C.Backbonefast D.BPDUguard
Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state? A. PDUfilter B
عرض الإجابة
اجابة صحيحة: IT
السؤال #49
What is a practice that protects a network from VLAN hopping attacks?
A. Enable dynamic ARP inspection
B. Configure an ACL to prevent traffic from changing VLANs C
عرض الإجابة
اجابة صحيحة: B
السؤال #50
When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200? A.spanning-tree vlan 200 priority 614440 B.spanning-tree vlan 200 priority 0 C.spanning-tree vlan 200 root primary D.spanning-tree vlan 200 priority 38813258
When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200? A. panning-tree vlan 200 priority 614440 B
عرض الإجابة
اجابة صحيحة: IT

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: