لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A business is using the local cable company to provide Internet access. Which of the following types of cabling will the cable company MOST likely use from the demarcation point back to the central office?
A. Multimode
B. Cat 5e
C. RG-6
D. Cat 6
E. 100BASE-T
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site. Which of the following concepts should the company select?
A. Cold site
B. Hot site
C. Warm site
D. Cloud site
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following attacks encrypts user data and requires a proper backup implementation to recover?
A. DDoS
B. Phishing
C. Ransomware
D. MAC spoofing
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket Which of the following types of rules is the administrator implementing?
A. NAT
B. PAT
C. STP
D. SNAT
E. ARP
عرض الإجابة
اجابة صحيحة: C
السؤال #5
After rebooting an AP a user is no longer able to conned to me enterprise LAN A technician plugs a laptop In to the same network jack and receives the IP 169.254 0 200. Which of the following is MOST likely causing the issue?
A. DHCP scope exhaustion
B. Signal attenuation
C. Channel overlap
D. Improper DNS configuration
عرض الإجابة
اجابة صحيحة: AB
السؤال #6
A network administrator is investigating a network event that is causing all communication to stop. The network administrator is unable to use SSH to connect to the switch but is able to gain access using the serial console port. While monitoring port statistics, the administrator sees the following: Which of the following is MOST likely causing the network outage?
A. Duplicate IP address
B. High collisions
C. Asynchronous route
D. Switch loop
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?
A. Insider threat
B. War driving
C. Evil twin
D. Honeypot
عرض الإجابة
اجابة صحيحة: C
السؤال #8
A company joins a bank's financial network and establishes a connection to the clearinghouse servers in the range 192 168.124.0/27. An IT technician then realizes the range exists within the VM pool at the data center. Which of the following is the BEST way for the technician to connect to the bank's servers?
A. NAT
B. PAT
C. CIDR
D. SLAAC
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which of the following must be functioning properly in order for a network administrator to create an accurate timeline during a troubleshooting process?
A. NTP
B. IP helper
C. Syslog
D. MySQL
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of signal overlap from the new network Additionally warehouse employees report difficulty connecting to the wireless network from the other side of the building; however they have no issues when Ihey are near the anten
A. The wireless signal is being refracted by the warehouse's windows
B. The antenna's power level was set too high and is overlapping
C. An omnidirectional antenna was used instead of a unidirectional antenna
D. The wireless access points are using channels from the 5GHz spectrum
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Given the following output: Which of the following attacks is this MOST likely an example of?
A. ARP poisoning
B. VLAN hopping
C. Rogue access point
D. Amplified DoS
عرض الإجابة
اجابة صحيحة: A
السؤال #12
All packets arriving at an interface need to be fully analyzed. Which of me following features should be used to enable monitoring of the packets?
A. LACP
B. Flow control
C. Port mirroring
D. NetFlow exporter
عرض الإجابة
اجابة صحيحة: A
السؤال #13
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution?
A. Out-of-band access
B. Split-tunnel connections
C. Virtual network computing
D. Remote desktop gateways
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?
A. Data link
B. Network
C. Transport
D. Session
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: