لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?
A. ifconfig ecth0 promisc
B. ifconfig eth1 up
C. ifconfig eth0 10
D. ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall Which of the following would be the MOST appropriate way to enable secure remote printing?
A. SSH
B. VPN
C. Telnet
D. SSL
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A network technician receives a report from the server team that a server's network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data; Which of the following should the network technician perform to correct the issue?
A. Replace the Cat 5 patch cable with a Cat 6 cable
B. Install a crossover cable between the server and the switch
C. Reset the switchport configuration
D. Use NetFlow data from the switch to isolate the issue
E. Disable MDIX on the switchport and reboot the server
عرض الإجابة
اجابة صحيحة: B
السؤال #4
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements?
A. Load balancing
B. Geofencing
C. Public cloud
D. Content delivery network
E. Infrastructure as a service
عرض الإجابة
اجابة صحيحة: B
السؤال #5
A technician is troubleshooting a connectivity issue with an end user. The end user can access local network shares and intranet pages but is unable to access the internet or remote resources. Which of the following needs to be reconfigured?
A. The IP address
B. The subnet mask
C. The gateway address
D. The DNS servers
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket Which of the following types of rules is the administrator implementing?
A. NAT
B. PAT
C. STP
D. SNAT
E. ARP
عرض الإجابة
اجابة صحيحة: E
السؤال #7
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?
A. Network address translation
B. Default gateway
C. Loopback
D. Routing protocol
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?
A. IP scanner
B. Terminal emulator
C. NetFlow analyzer
D. Port scanner
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which of the following connector types would have the MOST flexibility?
A. SFP
B. BNC
C. LC
D. RJ45
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which of the following routing protocols is used to exchange route information between public autonomous systems?
A. OSPF
B. BGP
C. EGRIP
D. RIP
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A. OTDR
B. Tone generator
C. Fusion splicer
D. Cable tester
E. PoE injector
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the technician found the DNS server address was incorrect Which of the following describes the issue?
A. Rogue DHCP server
B. Misconfigured HSRP
C. DNS poisoning
D. Exhausted IP scope
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
A. Fault tolerance
B. Quality of service
C. Load balancing
D. Port aggregation
عرض الإجابة
اجابة صحيحة: C
السؤال #15
An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology Which of the following is the number of additional network connections needed?
A. 5
B. 7
C. 10
D. 15
عرض الإجابة
اجابة صحيحة: C
السؤال #16
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?
A. Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?
A. Extended service set
B. Basic service set
C. Unified service set
D. Independent basic service set
عرض الإجابة
اجابة صحيحة: A
السؤال #18
A network administrator wants to improve the security of the management console on the company's switches and ensure configuration changes made can be correlated to the administrator who conformed them Which of the following should the network administrator implement?
A. Port security
B. Local authentication
C. TACACS+
D. Access control list
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
A. Verify the session time-out configuration on the captive portal settings
B. Check for encryption protocol mismatch on the client’s wireless settings
C. Confirm that a valid passphrase is being used during the web authentication
D. Investigate for a client’s disassociation caused by an evil twin AP
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Which of the following ports is commonly used by VoIP phones?
A. 20
B. 143
C. 445
D. 5060
عرض الإجابة
اجابة صحيحة: B
السؤال #21
A company's primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration?
A. Diverse paths
B. Load balancing
C. Multipathing
D. Virtual Router Redundancy Protocol
عرض الإجابة
اجابة صحيحة: A
السؤال #22
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?
A. IP route table
B. VLAN tag
C. MAC table
D. QoS tag
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Which of the following uses the destination IP address to forward packets?
A. A bridge
B. A Layer 2 switch
C. A router
D. A repeater
عرض الإجابة
اجابة صحيحة: B
السؤال #24
After HVAC failures caused network outages, the support team decides to monitor the temperatures of all the devices. The network administrator cannot find a command that will display this information. Which of the following will retrieve the necessary information?
A. SNMP OID values
B. NetFlow data export
C. Network baseline configurations
D. Security information and event management
عرض الإجابة
اجابة صحيحة: C
السؤال #25
A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber?
A. 10GBaseT
B. 1000BaseT
C. 1000BaseSX
D. 1000BaseLX
عرض الإجابة
اجابة صحيحة: A
السؤال #26
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?
A. Physical diagram
B. Heat map
C. Asset list
D. Device map
عرض الإجابة
اجابة صحيحة: C
السؤال #27
Which of the following would be increased by adding encryption to data communication across the network?
A. Availability
B. Integrity
C. Accountability
D. Confidentiality
عرض الإجابة
اجابة صحيحة: A
السؤال #28
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
A. A backup of a large video presentation to cloud storage for archival purposes
B. A duplication of a hosted virtual server to another physical server for redundancy
C. A download of navigation data to a portable device for offline access
D. A query from an IoT device to a cloud-hosted server for a firmware update
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS)
عرض الإجابة
اجابة صحيحة: D
السؤال #30
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
A. 802
B. 802
C. 802
D. 802
عرض الإجابة
اجابة صحيحة: B
السؤال #31
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
A. Motion detection
B. Access control vestibules
C. Smart lockers
D. Cameras
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: