لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries? (Choose two.)
A. AD manipulation
B. matching OSPF external routes
C. route tagging
D. route tagging
E. route filtering
F. matching EIGRP process ID
عرض الإجابة
اجابة صحيحة: DE
السؤال #2
You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?
A. Local to global NAT translation is done after routing
B. Global to local NAT translation is done before routing
C. Local to global NAT translation is done before policy-based routing
D. Global to local NAT translation is done after policy-based routing
عرض الإجابة
اجابة صحيحة: BE
السؤال #3
Which management category is not part of FCAPS framework?
A. Configuration
B. Security
C. Performance
D. Authentication
E. Fault-management
عرض الإجابة
اجابة صحيحة: D
السؤال #4
An existing wireless network was designed to support data traffic only. You must now install context Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)
A. Add access points along the perimeter of the coverage area
B. Increase the access point density to create an average inter-access point distance of less than 40feet or 12
C. Use directional antennas to provide more cell overlapping
D. Install additional access points in monitor mode where the co-channel interference wouldotherwise be affected
E. Fine tune the radio configuration of the access point to have a higher average transmission powerto achieve better coverage
عرض الإجابة
اجابة صحيحة: B
السؤال #5
ACME Mining has four data centers in Santiago. Cape Town. Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN They want to deploy a new mission-critical application with these requirements: cluster heartbeat 2 Mb/s continuous (250 KB/s) cluster heartbeat one-way maximum latency 100 ms These are the current ping tests results between the four data centers: Which hosting data center pair can host the new application?
A. Mumbai and Beijing
B. Santiago and Cape Town
C. Santiago and Mumbai
D. Cape Town and Mumbai
E. Cape Town and Beijing
F. Santiago and Beijing
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Company XYZ plans to run OSPF on a DMVPN network. They want to use spoke-to-spoke tunnels in the design What is a drawback or concern in this type of design?
A. Additional host routes will be inserted into the routing tables
B. Manual configuration of the spokes with the appropriate priority will be needed
C. There will be split-horizon issue at the hub
D. Manual configuration of the spoke IP address on the hub will be needed
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which two characteristics are associated with 802 1s? (Choose two)
A. 802
B. 802
C. 802
D. CPU and memory requirements are the highest of all spanning-tree STP implementations
E. 802
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI data. Which type of security safeguard should be implemented to resolve this issue?
A. technical and physical access control
B. administrative security management processes
C. physical device and media control
D. technical integrity and transmission security
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?
A. Source Guard and Prefix Guard
B. Router Advertisement Guard
C. Prefix Guard
D. Secure Neighbor Discovery
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which two benefits can software-defined networks provide to businesses? (Choose two.)
A. provides additional redundancy
B. reduction of OpEx/CapEx
C. reduced latency
D. decentralized management
E. enables innovation
F. meets high traffic demands
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location The networks are joined to enable host migration at Layer 2 What is the final migration step after hosts have physically migrated to have traffic flowing through the new network without changing any host configuration?
A. Shut down legacy Layer 3 SVI
B. clear ARP caches on all hosts being migrated and then configure the legacy VRRP address onto new VXLAN core switches
C. Increase VRRP priorities on new infrastructure over legacy VRRP values, then shut down legacy SVIs
D. Shut down legacy infrastructure to allow VXLAN gateways to become active
E. Shut down legacy Layer 3 SVIs and activate new preconfigured Layer 3 SVIs on VXLAN
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: AE
السؤال #13
In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?
A. Jenkins
B. Ansible
C. Perl
D. Chef
عرض الإجابة
اجابة صحيحة: AD
السؤال #14
A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?
A. EIGRP
B. IS-IS
C. OSPF
D. BGP
عرض الإجابة
اجابة صحيحة: AD
السؤال #15
VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to ensure successful deployment of VPLS?
A. Flooding is necessary to propagate MAC address reachability information
B. PE scalability
C. The underlying transport mechanism
D. VLAN scalability
عرض الإجابة
اجابة صحيحة: A
السؤال #16
When consumers that leverage laaS reach 100% resource capacity, what can be used to redirect the overflow of traffic to the public cloud so there is no disruption to service?
A. cloud policing
B. cloud spill
C. cloud bursting
D. cloud shaping
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Which two points must network designers consider when designing a new network design or when evaluating an existing network design to help them understand the high-level design direction with regards to the security aspects? (Choose two)
A. Consider Business objectives and goals
B. Consider organization’s security policy standards
C. Consider for only multi-site networks
D. Consider for only new network technologies and components
عرض الإجابة
اجابة صحيحة: B
السؤال #18
An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke 'J
A. Configure all the sites as network type broadcast
B. The network type on all sites should be point-to-multipoint
C. The network type should be point-to-multipoint for the hub and point-to-point for the spokes
D. The hub should be set as the DR by specifying the priority to 255
E. The hub should be the DR by changing the priority of the spokes to 0
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements: ? Securely transfer the corporate data over the private WAN ? Use a centralized configuration model. ? Minimize overhead on the tunneled traffic. Which technology can be used in the new design to meet the company's requirements?
A. S-VTI
B. DMVPN
C. MGRE
D. GET VPN
عرض الإجابة
اجابة صحيحة: BEF
السؤال #20
What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?
A. PaaS
B. SaaS
C. laaS
D. WaaS
عرض الإجابة
اجابة صحيحة: AC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: