لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
ARP spoofing would normally be a part of:
A. an on-path attack
B. DNS poisoning
C. a DoS attack
D. a rogue access point
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which of the following BEST describes a spirt-tunnel client-to-server VPN connection?
A. The client sends an network traffic down the VPN tunnel
B. The client has two different IP addresses that can be connected to a remote site from two different ISPs to ensure availability
C. The client sends some network traffic down the VPN tunnel and other traffic to the local gateway
D. The client connects to multiple remote sites at the same time
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?
A. NFV
B. SDWAN
C. VIP
D. MPLS
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following is used to provide disaster recovery capabilities to spin up an critical devices using internet resources?
A. Cloud site
B. Hot site
C. Cold site
D. Warm site
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Select TWO).
A. Data loss prevention policy
B. BYOD policy
C. Acceptable use policy
D. Non-disclosure agreement
E. Disaster recovery plan
F. Physical network diagram
عرض الإجابة
اجابة صحيحة: A
السؤال #6
An IT administrator received an assignment with the following objectives ? Conduct a total scan within the company's network tor all connected hosts ? Detect all the types of operating systems running on all devices ? Discover all services offered by hosts on the network ? Find open ports and detect security risks. Which of the following command-line tools can be used to achieve these objectives?
A. nmap
B. arp
C. netatat
D. tcpdump
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following would be increased by adding encryption to data communication across the network?
A. Availability
B. Integrity
C. Accountability
D. Confidentiality
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which of the following bandwidth management techniques uses buffers al the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic prioritization
عرض الإجابة
اجابة صحيحة: B
السؤال #9
A network administrator is testing performance improvements by configuring channel bonding on an 802.Hac AP. Although a site survey detected the majority of the 5GHz frequency spectrum was idle, being used only by the company's WLAN and a nearby government radio system, the AP is not allowing the administrator to manually configure a large portion of the 5GHz frequency range. Which of the following would be BEST to configure for the WLAN being tested?
A. Upgrade the equipment to an AP that supports manual configuration of the ElRP power settings
B. Switch to 802
C. disable channel auto-selection, and enforce channel bonding on the configuration
D. Set up the AP to perform a dynamic selection of the frequency according to regulatory requirements
E. Deactivate the band 5GHz to avoid Interference with the government radio
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks. Which of the following would be BEST for the administrator to purchase?
A. An IPS
B. A Layer 3 switch
C. A router
D. A wireless LAN controller
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A malicious user is using special software 10 perform an on-path attack. Which of the following best practices should be configured to mitigate this threat?
A. Dynamic ARP inspection
B. Role-based access
C. Control plane policing
D. MAC filtering
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A network technician is attempting to increase throughput by configuring link port aggregation between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following is the BEST choice concerning speed and duplex for all interfaces that are participating in the link aggregation?
A. Half duplex and 1GB speed
B. Full duplex and 1GB speed
C. Half duplex and 10OMB speed
D. Full duplex and 100MB speed
عرض الإجابة
اجابة صحيحة: B
السؤال #13
A new student is given credentials to log on to the campus Wi-Fi. The student stores the password in a laptop and is able to connect; however, the student is not able to connect with a phone when only a short distance from the laptop. Given the following information: Which of the following is MOST likely causing this connection failure?
A. Transmission speed
B. Incorrect passphrase
C. Channel overlap
D. Antenna cable attenuation/signal loss
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A technician is consolidating a topology with multiple SSlDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?
A. Seamless roaming
B. Basic service set
C. WPA
D. MU-MIMO
عرض الإجابة
اجابة صحيحة: D
السؤال #15
A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise Each team member has been assigned an area to trouble shoot. Which of the following approaches is being used?
A. Divide-and-conquer
B. Top-to-bottom
C. Bottom-to-top
D. Determine if anything changed
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: