لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?
A. Warnings
B. Notifications
C. Alert
D. Errors
عرض الإجابة
اجابة صحيحة: C
السؤال #2
All packets arriving at an interface need to be fully analyzed. Which of me following features should be used to enable monitoring of the packets?
A. LACP
B. Flow control
C. Port mirroring
D. NetFlow exporter
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A customer wants to segregate the traffic between guests on a hypervisor. Which of the following does a technician need to configure to meet the requirement?
A. Virtual switches
B. OSPF routing
C. Load balancers
D. NIC teaming
E. Fibre Channel
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?
A. Vulnerability assessment
B. Factory reset
C. Firmware update
D. Screened subnet
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which of the following devices Is used to configure and centrally manage access points Installed at different locations?
A. Wireless controller
B. Load balancer
C. Proxy server
D. VPN concentrator
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A network administrator decided to use SLAAC in an extensive IPv6 deployment to alleviate IP address management. The devices were properly connected into the LAN but autoconfiguration of the IP address did not occur as expected. Which of the following should the network administrator verify?
A. The network gateway is configured to send router advertisements
B. A DHCP server is present on the same broadcast domain as the clients
C. The devices support dual stack on the network layer
D. The local gateway supports anycast routing
عرض الإجابة
اجابة صحيحة: B
السؤال #7
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution?
A. Out-of-band access
B. Split-tunnel connections
C. Virtual network computing
D. Remote desktop gateways
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A systems administrator wants to use the least amount of equipment to segment two departments that nave cables terminating in the same room. Which of the following would allow this to occur?
A. A load balancer
B. A proxy server
C. A Layer 3 switch
D. A hub
E. A Layer 7 firewall
F. The RSSI was not strong enough on the link
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A network administrator is setting up several loT devices on a new VLAN and wants to accomplish the following * 1. Reduce manual configuration on each system * 2. Assign a specific IP address to each system * 3. Allow devices to move to different switchports on the same VLAN Which of the following should the network administrator do to accomplish these requirements?
A. Set up a reservation for each device
B. Configure a static IP on each device
C. Implement private VLANs for each device
D. Use DHCP exclusions to address each device
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which of the following protocols is widely used in large-scale enterprise networks to support complex networks with multiple routers and balance traffic load on multiple links?
A. OSPF
B. RIPv2
C. QoS
D. STP
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which of the following is an example of on-demand scalable hardware that is typically housed in the vendor's data center?
A. DaaS
B. IaaS
C. PaaS
D. SaaS
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which of the following OSI model layers is where conversations between applications are established, coordinated, and terminated?
A. Session
B. Physical
C. Presentation
D. Data link
عرض الإجابة
اجابة صحيحة: B
السؤال #13
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
A. Network access control
B. Least privilege
C. Multifactor authentication
D. Separation of duties
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: