لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An architect designs a multi-controller network architecture with these requirements:* Achieve fast failover to control traffic when controllers fail.* Yield a short distance and high resiliency in the connection between the switches and the controller.* Reduce connectivity loss and enable smart recovery to improve the SDN survivability.* Improve connectivity by adding path diversity and capacity awareness for controllers.Which control plane component of the multi-controller must be built to meet the requir
A. control node reliability
B. control path reliability
C. controller state consistency
D. controller clustering
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Refer to the exhibit. Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10.1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can be used in the routing policy design so that the rest of the network is not affected by the flapping issue?
A. se route dampening on LA router for the 10 1 5 0/24 network so that it does not get propagated when it flaps up and down
B. se route filtering on Chicago router to block the 10
C. se route filtering on LA router to block the 10
D. se route aggregation on LA router to summarize the 10
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A network architect in an enterprise is designing a network policy for certain database applications. The goal of the policy is to allow these applications to access the internet directly, whereas other user and network applications that communicate with systems or users outside their own network must be routed through the data center. The focus is on achieving higher availability and a better user experience for the database applications, but switching between different network paths based on performance c
A. MPLS direct connect
B. Cloud onRamp for SaaS
C. Cloud onRamp for IaaS
D. MPLS L3VPN with QoS
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which two features control multicast traffic in a VLAN environment? (Choose two)
A. IGMP snooping
B. MLD snooping
C. RGMP
D. PIM snooping
E. pruning
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two.)
A. strategic planning approach
B. business optimization approach
C. tactical planning approach
D. modular approach
E. cost optimization approach
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the Layer 2 interconnection?
A. t the core layer, to otter the possibility to isolate STP domains
B. t me aggregation layer because it is the Layer 2 to Layer 3 demarcation point
C. t the access layer because the STP root bridge does not need to align with the HSRP active node
D. t the core layer because all external connections must terminate there for security reasons
عرض الإجابة
اجابة صحيحة: B
السؤال #7
What are two examples of business goals to be considered when a network design is built? (Choose two.)
A. standardize resiliency
B. minimize operational costs
C. integrate endpoint posture
D. ensure faster obsolescence
E. reduce complexity
عرض الإجابة
اجابة صحيحة: BC
السؤال #8
Which optimal use of interface dampening on a fast convergence network design is true?
A. When occasional flaps of long duration occur
B. when numerous adjacent flaps of very short duration occur
C. when the router hardware it slower than the carrier delay down detection
D. when the switch hardware is faster than the debounce timer down detection
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A network architect in an enterprise is designing a network policy for certain database applications. The goal of the policy is to allow these applications to access the internet directly, whereas other user and network applications that communicate with systems or users outside their own network must be routed through the data center. The focus is on achieving higher availability and a better user experience for the database applications, but switching between different network paths based on performance c
A. MPLS L3VPN with QoS
B. Cloud onRamp for laaS
C. Cloud onRamp for SaaS
D. MPLS direct connect
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Company XYZ is designing the network for IPv6 security and they have these design requirements: A switch or router must deny access to traffic from sources with addresses that are correct, but are topologically incorrect Devices must block Neighbor Discovery Protocol resolution for destination addresses that are not found in the binding table. Which two IPv4 security features are recommended for this company? (Choose two)
A. IPv6 DHCP Guard
B. IPv6 Source Guard
C. IPv6 Destination Guard
D. IPv6 Prefix Guard
E. IPv6 RA Guard
عرض الإجابة
اجابة صحيحة: AB
السؤال #11
Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP path MTU discovery be enabled. Which effect will this have on the network?
A. It will create a loop free path
B. It will enhance the performance of TCP-based applications
C. It will improve the convergence time
D. It will increase the convergence time
عرض الإجابة
اجابة صحيحة: B
السؤال #12
An external edge router provides connectivity from a service provider to an enterprise. Which two Internet edge best practices meet compliance regulations? (Choose two.)
A. Send logs to a centralized logging collection server
B. Implement EBGP to advertise all owned IP blocks
C. Enable and use only secure protocols
D. Implement filtering to control traffic that is sourced from the infrastructure IP space
E. Use login banners and interface access lists to restrict administrative access to the system
عرض الإجابة
اجابة صحيحة: CE
السؤال #13
A customer runs OSPF with Area 5 between its aggregation router and an internal router When a network change occurs in the backbone. Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5 You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area How can you accomplish this task*?
A. Increase the bandwidth on the connection between Router A and Router B
B. Implement LSA filtering ontheAB, allowing summary routes and preventing more specific routes into Area 5
C. Create a virtual link to Area 0 from Router B to the ABR
D. Turn on LSA throttling on all devices in Area 5
E. Set Area 5 to stubby at the ABR anyway
عرض الإجابة
اجابة صحيحة: DE
السؤال #14
Refer to the exhibit. Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?
A. address family translation
B. host-to-host tunneling
C. dual stack
D. 6rd tunneling
عرض الإجابة
اجابة صحيحة: C
السؤال #15
What are two descriptions of network optimization? (Choose two.)
A. identify network requirements
B. network redesign
C. proactive network management
D. network health maintenance
E. maintain high availability
عرض الإجابة
اجابة صحيحة: DE
السؤال #16
What is the most important operational driver in building a resilient and secure modular network design?
A. Dependencies on hardware or software that is difficult to scale
B. Minimize app downtime
C. Reduce the frequency of failures requiring human intervention
D. Increase time spent on developing new features
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Refer to the exhibit. After a network audit a network engineer must optimize the current network convergence time The proposed solution must consider link layer and control plane failures. Which solution meets the requirements?
A. onfigure debounce timers
B. ncrease fast hello timers
C. mplement BFD
D. nable LSP fast flood
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Company XYZ is migrating their existing network to IPv6 and they must plan for Layer 2 and Layer 3 devices. Some of the access layer switches do not support IPv6, however, core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used in the design?
A. The access layer switches must support IGMP snooping at a minimum
B. The access layer switches must support DHCPv6
C. Upgrade the nonsupporting switches
D. Layer 2 switches will not affect the implementation of IPv6
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which parameter is the most important factor to consider when deciding service placement in a cloud solution?
A. data replication cost
B. application structure
C. security framework Implementation time
D. data confidentiality rules
عرض الإجابة
اجابة صحيحة: A
السؤال #20
A network attacker exploits application flaws to compromise critical systems in the organization with these objectives: Obtain sensitive data and export the data out of the network Compromise developer and administrator credentials to potentially gain accessWhat is the next step after application discovery is completed in Zero Trust networking?
A. Enforce policies and microsegmentation
B. Establish visibility and behavior modeling
C. Ensure trustworthiness of systems
D. Assess real-time security health
عرض الإجابة
اجابة صحيحة: B
السؤال #21
Which tool automates network implementation activities and shortens the implementation lifecycle?
A. Python
B. Conclusion
C. Java
D. LISP
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Which issue poses a challenge for security architects who want end-to-end visibility of their networks?
A. oo many overlapping controls
B. oo many disparate solutions and technology silos
C. n overabundance of manual processes
D. network security skills shortage
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: