لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?
A. Enforce risk-based and adaptive access policies
B. Assess real-time security health of devices
C. Apply a context-based network access control policy for users
D. Ensure trustworthiness of devices
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which relationship between IBGP and the underlying physical topology is true?
A. iBGP full mesh requirement does not dictate any specific network topology
B. iBGP can worn only on a ring network topology with a link-state protocol like OSPF or IS-IS
C. iBGP full mesh requires an underlying fully meshed network topology
D. iBGP does not work on a ring network topology even with an underlying IGP
عرض الإجابة
اجابة صحيحة: BD
السؤال #3
You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature Which four routing protocols can you use to facilitate this? (Choose four.)
A. IS-IS
B. static
C. RIP
D. EIGRP
E. BGP
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?
A. Transport Mode in IPsec Phase I
B. Transport Mode in IPsec Phase II
C. Tunnel Mode in IPsec Phase II
D. Tunnel Mode in IPsec Phase I
عرض الإجابة
اجابة صحيحة: DE
السؤال #5
A business wants to refresh its legacy Frame Relay WAN. It currently has product specialists in each of its 200 branches but plans to reduce and consolidate resources. The goal is to have product specialists available via video link when customers visit the nationwide branch offices. Which technology should be used to meet this objective?
A. DMVPN phase 1 network over the Internet
B. Layer 3 MPLS VPN hub and spoke
C. Layer2VPLS
D. Layer 3 MPLS VPN full mesh
عرض الإجابة
اجابة صحيحة: A
السؤال #6
As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Sen/ice (DaaS), by hosting the backend system in their on- premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. tail drop
B. traffic shaping
C. WRED
D. traffic policing
عرض الإجابة
اجابة صحيحة: B
السؤال #7
You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)
A. EIGRP
B. RPVST+
C. MST
D. L2MP
عرض الإجابة
اجابة صحيحة: BD
السؤال #8
Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?
A. PIM-DM
B. PIM-SM
C. PIM-SSM
D. BIDIR-PIM
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?
A. SaaS
B. PaaS
C. laaS
D. hybrid cloud
عرض الإجابة
اجابة صحيحة: C
السؤال #10
What are two design constraints in a standard spine and leaf architecture? (Choose two.)
A. Spine switches can connect to each other
B. Each spine switch must connect to every leaf switch
C. Leaf switches must connect to each other
D. Endpoints connect only to the spine switches
E. Each leaf switch must connect to every spine switch
عرض الإجابة
اجابة صحيحة: BE
السؤال #11
A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed Which two of these actions would reduce that delay? (Choose two.)
A. Increase network stability
B. Reduce the time for the network to reconverge
C. Increase the notification of interface flaps
D. Enable lower data link layer recovery systems to have an opportunity to restore the interface
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving The network engineers are re- evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?
A. Assigning unique Route Distinguishers
B. Assigning unique Route Target ID'S
C. Assigning unique IP address space for the Enterprise NAT/Firewalls
D. Assigning unique VRF ID's to each L3VPN
عرض الإجابة
اجابة صحيحة: D
السؤال #13
An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?
A. posture assessment with remediation VLAN
B. quarantine SGTs
C. dACLs with SGTs
D. quarantine VLAN
عرض الإجابة
اجابة صحيحة: A
السؤال #14
What best describes the difference between Automation and Orchestration?
A. Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions
B. Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that require the network administrator to coordinate
C. Automation refers to an automatic process for completing multiple tasks with conditions and Orchestration refers to executing tasks in parallel
D. Automation refers to scripting languages (Pytho
E. Ansible etc
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Which impact of using three or more ABRs between the backbone area and area 1 is true?
A. In a large-scale network LSA replication by all ABRs can cause serious scalability issues
B. Multiple ABRs reduce the CPU processing on each A6R due to splitting prefix advertisement
C. In a large-scale network multiple ABRs can create microloops
D. Prefixes from the non-backbone area are advertised by one ABR to the backbone
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which technology supports antispoofing and does not have any impact on encryption performance regardless of packet size?
A. MACsec
B. IP source guard
C. DHCP snooping with DAI
D. IPsec
عرض الإجابة
اجابة صحيحة: AF
السؤال #17
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?
A. MPP
B. CPPr
C. CoPP
D. DPP
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: