لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You are configuring Open Shortest Path First (OSPF) protocol for IPv6 on Router5. The router has two interfaces, which have been configured as follows: S0/0 - 192.168.5.1/24 S0/1 - 10.0.0.6/8 You would like OSPF to route for IPv6 only on the S0/0 network. It should not route for IPv6 on the S0/1 network. The process ID you have chosen to use is 25. You do not want to apply an IPv6 address yet. Which of the following command sets would enable OSPF for IPv6 as required?
A. Router5(config)#ipv6 ospf 25Router5(config)# network 192
B. Router5(config)#ipv6 ospf 25Router5(config)#router-id 192
C. Router5(config)#ipv6 unicast-routing Router5(config)#ipv6 router ospf 25 Router5(config-rtr)#router-id 1
D. Router5(config)#ipv6 unicast-routing Router5(config)#ipv6 ospf 25 Router5(config-rtr)#router-id 1
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which two are NOT valid Cisco IOS commands used for Cisco Discovery Protocol (CDP)? (Choose two.)
A. show cdp
B. show cdp entry *
C. show cdp neighbor entries
D. show cdp neighbors detail
E. show cdp devices
عرض الإجابة
اجابة صحيحة: CE
السؤال #3
View the following network diagram: Which switch will become the root bridge?
A. SwitchA
B. SwitchB
C. SwitchC
D. The root bridge cannot be determined from the given information
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which two are the limitations of the service password-encryption command? (Choose two.)
A. It uses the MD5 algorithm for password hashing
B. It uses the Vigenere cipher algorithm
C. An observer cannot read the password when looking at the administrator's screen
D. The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers
عرض الإجابة
اجابة صحيحة: BD
السؤال #5
Examine the network diagram. Which switch port(s) will be in a forwarding state? (Choose two.)
A. SwitchA - Fa0/1 and Fa0/2
B. SwitchA - Fa0/1
C. SwitchA - Fa0/2
D. SwitchB - Fa0/1
E. SwitchB - Fa0/2
عرض الإجابة
اجابة صحيحة: AD
السؤال #6
Examine the following partial output of the show interfaces command. Which of the following statements are true? (Choose all that apply.)
A. the interface is functional
B. the largest frame allowed through this connection is 1500 bytes
C. the interface needs the no shutdown command executed to be functional
D. the largest frame allowed through this connection is 10000 Kbs
عرض الإجابة
اجابة صحيحة: BC
السؤال #7
What command produced the following as a part of its output? 1 14.0.0.2 4 msec 4 msec 4 msec 2 63.0.0.3 20 msec 16 msec 16 msec 3 33.0.0.4 16 msec * 16 msec
A. Ping
B. Traceroute
C. Tracert
D. Extended ping
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which command will display the Virtual LAN (VLAN) frame tagging method for a switch link?
A. show vlan
B. show vlan encapsulation
C. show vtp status
D. show interfaces trunk
عرض الإجابة
اجابة صحيحة: D
السؤال #9
When executed on a HSRP group member named Router 10, what effect does the following command have? Router10(config-if)# standby group 1 track serial0 25
A. It will cause the router to increase its HSRP priority by 25 if the Serial0 interface on the standby router goes down
B. It will cause the router to shut down the Serial0 interface if 25 packets have been dropped
C. It will cause the router to notify Router 25 is serial 0 goes down
D. It will cause the router to decrement its HSRP priority by 25 if Serial 0 goes down
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which command will save a dynamically learned MAC address in the running-configuration of a Cisco switch?
A. switchport port-security mac-address
B. switchport port-security
C. switchport port-security sticky mac-address
D. switchport port-security mac-address sticky
E. switchport mac-address sticky
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which Cisco Internetwork Operating System (IOS) command would be used to set the privileged mode password to "cisco"?
A. router(config)# enable password cisco
B. router# enable secret cisco
C. router(config)# line password cisco
D. router(config-router)# enable password cisco
عرض الإجابة
اجابة صحيحة: A
السؤال #12
When the auth keyword is used in the snmp-server host command, which of the following must be configured with an authentication mechanism?
A. the interface
B. the host
C. the user
D. the group
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which of the following fields are in a Transmission Control Protocol (TCP) header? (Choose three.)
A. Length
B. Sequence Number
C. Data Offset
D. Type-of-Service
E. Window
عرض الإجابة
اجابة صحيحة: BCE
السؤال #14
Which command is used to view the entire routing table?
A. show route-map
B. show ip mroute
C. show ip route
D. show ip protocols
عرض الإجابة
اجابة صحيحة: C
السؤال #15
You run the following command: switch# show ip interface brief What information is displayed?
A. A summary of the IP addresses and subnet mask on the interface
B. A summary of the IP addresses on the interface and the interface's status
C. The IP packet statistics for the interfaces
D. The IP addresses for the interface and the routing protocol advertising the network
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which Cisco Internetwork Operating System (IOS) command would be used to define a static route for network 192.168.11.0 through default gateway 192.168.43.1?
A. router(config)# ip route 192
B. router# ip route 192
C. router(config)# ip classless 192
D. router(config)# ip default gateway 192
E. router# ip default gateway 192
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Enhanced Interior Gateway Routing Protocol (EIGRP) uses which algorithm to select the best path to the destination?
A. Diffusing Update Algorithm (DUAL)
B. Dijkstra algorithm
C. Bellman-Ford algorithm
D. Shortest Path First (SPF) algorithm
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Which of the following characteristics are NOT shared by RIPv1 and RIPv2?
A. They share an administrative distance value
B. They use the same metric
C. They both send the subnet mask in routing updates
D. They have the same maximum hop count
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Multiple routes to a destination already exist from various routing protocols. Which of the following values is used FIRST to select the route that is inserted into the route table?
A. composite metric
B. administrative distance
C. prefix length
D. hop count
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Which statement is TRUE of the CSMA/CD Ethernet media access method?
A. It requires centralized monitoring and control
B. It is ideal for a switched network environment
C. It uses a back-off algorithm to calculate a random time value
D. Each station is allotted a time slot in which they can transmit data
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which technique is used to stop routing loops by preventing route update information from being sent back over the interface on which it arrived?
A. Holddown timer
B. Triggered updates
C. Route poisoning
D. Split horizon
E. Maximum hop count
عرض الإجابة
اجابة صحيحة: D
السؤال #22
Which command would be used to establish static translation between an inside local address 192.168.144.25 and an inside global address 202.56.63.102?
A. router(config)#ip nat inside source static 192
B. router(config)#ip source nat inside static local-ip 192
C. router(config)#ip nat static inside source 192
D. router(config)#ip nat inside static source 192
عرض الإجابة
اجابة صحيحة: A
السؤال #23
The following exhibit displays the MAC address table of a switch in your network, along with the location of each device connected to the switch: Which of the following frames will be flooded to all ports after it is received by the switch?
A. source MAC: 12-34-56-78-9A-BD, destination MAC: 12-34-56-78-9A-BF
B. source MAC: 12-34-56-78-9A-BF, destination MAC: 12-34-56-78-9A-BD
C. source MAC: 12-34-56-78-9A-BF, destination MAC: 12-34-56-78-9A-BC
D. source MAC: 12-34-56-78-9A-BC, destination MAC: 12-34-56-78-9A-BF
عرض الإجابة
اجابة صحيحة: C
السؤال #24
R1 and R2 are connected as shown in the diagram and are configured as shown in output in the partial output of the show run command. The command ping R2 fails when executed from R1. What command(s) would allow R1 to ping R2 by name?
A. R1(config)#int S1 R1(config-if)#no ip address 192
B. R1(config)#no ip host R1 R1(config)# ip host R2 192
C. R1(config)#no hostname R2 R1(config)# hostname R1
D. R2(config)#int S1 R1(config-if)#no ip address 192
عرض الإجابة
اجابة صحيحة: B
السؤال #25
What is the significance of the following BECN packet statistics?
A. The router is experiencing congestion in sending frames
B. The router is experiencing congestion in receiving frames
C. The Frame Relay mapping table is missing an entry
D. The Frame Relay mapping table is corrupt
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which option lists the given applications in the correct sequence of increasing bandwidth consumption?
A. an interactive Telnet session on a server running an SAP application a voice conversation between PC-based VoIP services a voice conversation between two IP phones while accessing an online video site
B. a voice conversation between two IP phones while accessing an online video site an interactive Telnet session on a server running an SAP application a voice conversation between PC-based VoIP services
C. a voice conversation between PC-based VoIP services a voice conversation between two IP phones while accessing an online video site an interactive Telnet session on a server running an SAP application
D. an interactive Telnet session on a server running an SAP application a voice conversation between two IP phones while accessing an online video site a voice conversation between PC-based VoIP services
عرض الإجابة
اجابة صحيحة: A
السؤال #27
From which of the following attacks can Message Authentication Code (MAC) shield your network?
A. DoS
B. DDoS
C. spoofing
D. SYN floods
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Which of the following is NOT a benefit of cloud computing to cloud users?
A. On-demand self-service resources provisioning
B. Centralized appearance of resources
C. Highly available, horizontally scaled applications
D. Cost reduction from standardization and automation
عرض الإجابة
اجابة صحيحة: D
السؤال #29
Which of the following commands will enable a global IPv6 address based on the Modified EUI-64 format interface ID?
A. ipv6 address 5000::2222:1/64
B. ipv6 address autoconfig
C. ipv6 address 2001:db8:2222:7272::72/64 link-local
D. ipv6 enable
عرض الإجابة
اجابة صحيحة: B
السؤال #30
Which device in the given network diagram has as its primary responsibility the regulation of network traffic flow based on different trust levels for different computer networks?
A. the router
B. the switch
C. the hub(s)
D. the firewall
عرض الإجابة
اجابة صحيحة: D
السؤال #31
You have established a console session with R1 and you are attempting to download an IOS image from the TFTP server in the diagram below. However, you are unable to make the connection to 150.140.6.5. What is the problem?
A. The IP address of the management station is incorrect
B. The IP address of the TFTP server is incorrect
C. The interfaces between R1and R2 are not in the same subnet
D. The IP address of Switch B is incorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #32
Which Cisco Internetwork Operating System (IOS) command is used to save the running configuration to non-volatile random access memory (NVRAM)?
A. copy startup-config running-config
B. move startup-config running-config
C. copy running-config startup-config
D. move startup-config running-config
عرض الإجابة
اجابة صحيحة: C
السؤال #33
Which of the following excerpts from the output of the show ip eigrp topology command include EIGRP learned routes or pairs of routes that will be included in the routing table? (For excerpts that include multiple routes, do not include the entry unless BOTH routes will be included in the routing table.)
A. P 172
B. P 172
C. P 172
D. P 172
عرض الإجابة
اجابة صحيحة: C
السؤال #34
Which Cisco IOS command enables a router to copy IOS images to a router?
A. copy tftp flash
B. copy flash tftp
C. copy running-config tftp
D. copy running-config startup-config
E. copy tftp running-config
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: