لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the followingshould the systems administrator select to meet this requirement?
A. 802
B. 802
C. 802
D. 802
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A workstation is configured with the following network details: Software on the workstation needs to send a query tothe local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A. 10
B. 10
C. 10
D. 10
E. 10
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which of the following protocols will a security appliance that is correlating network events from multiple devices MOST likely rely on to receive event messages?
A. Syslog
B. Session Initiation Protocol
C. Secure File Transfer Protocol
D. Server Message Block
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following connector types would have the MOST flexibility?
A. SFP
B. BNC
C. LC
D. RJ45
عرض الإجابة
اجابة صحيحة: A
السؤال #5
An ISP is providing Internet to a retail store and has terminated its point of connection using a standard Cat 6 pin-out Which of me following terminations should the technician use when running a cable from the ISP's port lo the front desk?
A. F-type connector
B. TIA/E1A-56S-B
C. LC
D. SC
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which of the following TCP ports is used by the Windows OS for file sharing?
A. 53
B. 389
C. 445
D. 1433
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies would BEST describe this setup?
A. Bus
B. Spine-and-leaf
C. Hub-and-spoke
D. Mesh
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A network technician is reviewing an upcoming project's requirements to implement laaS. Which of the following should the technician consider?
A. Software installation processes
B. Type of database to be installed
C. Operating system maintenance
D. Server hardware requirements
عرض الإجابة
اجابة صحيحة: C
السؤال #9
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?
A. Correct the DNS server entries in the DHCP scope
B. Correct the external firewall gateway address
C. Correct the NTP server settings on the clients
D. Correct a TFTP Issue on the company’s server
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?
A. ifconfig ecth0 promisc
B. ifconfig eth1 up
C. ifconfig eth0 10
D. ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6 G
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which of the following policies is MOST commonly used for guest captive portals?
A. AUP
B. DLP
C. BYOD
D. NDA
عرض الإجابة
اجابة صحيحة: C
السؤال #13
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?
A. Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack
عرض الإجابة
اجابة صحيحة: A
السؤال #14
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. Captive portal
B. Two-factor authentication
C. Complex passwords
D. Geofencing
E. Role-based access
F. Explicit deny
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: