لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which management category is not part of FCAPS framework?
A. uthentication
B. onfiguration
C. ecurity
D. erformance
E. ault-managemen
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A customer has a functional requirement that states HR systems within a data center must be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses with all HR systems dedicated to .129 to .254 of the 10.20.20.0/24 prefix. Which segmentation method is optimal for the customer?
A. FVIs
B. PIV
C. NF
D. F
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Data flows can be combined with business process information to help determine needed changes in flow patterns or network As it relates to person-to-person data flows, what are two implications that directly has an impact to the network design?
A. he DR and BDR election occurs regardless of the underlying OSPF network type
B. he DR election is a challenge unless a point-to-point network type is used
C. he spoke routers can belong to different areas regardless of the underlying OSPF network type
D. raffic does not need to traverse the hub to reach the spokes
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Which purpose of a dynamically created tunnel interface on the design of lPv6 multicast services is true?
A. IM-DM
B. IDIR-PIM
C. IM-SM
D. IM-SS
عرض الإجابة
اجابة صحيحة: D
السؤال #5
As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. equirement for data-at-rest encryption for user identification within the VPN termination hardware
B. ategorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs
C. equirement for data-in-motion encryption and 2FA authentication
D. nsuring that authorized users have high-availability system access from defined zones to defined systems or zone
عرض الإجابة
اجابة صحيحة: D
السؤال #6
For a company that offers online billing systems for their customers, which strategy ensures the RPO is kept as low as possible?
A. ub and-spoke connectivity
B. andwidth and appropriate QoS for the traffic
C. synchronous data replication and backup
D. alanced policy and throughput
E. ull-mesh WAN connectivit
عرض الإجابة
اجابة صحيحة: B
السؤال #7
According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?
A. -VTI
B. PTP
C. Psec
D. ET VPN
E. MVP
عرض الإجابة
اجابة صحيحة: A
السؤال #8
How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?
A. ontrol plane policers require that adequate protocols overhead are factored in to allow protocol convergence
B. ontrol plane policers must be processed before a forwarding decision is made
C. ontrol plane policers can cause the network management systems to create false alarms
D. ontrol plane policers are enforced in hardware to protect the software path, but they are hardware platform-dependent in terms of classification ability
E. ontrol plane policers are really needed only on externally facing devices
عرض الإجابة
اجابة صحيحة: C
السؤال #9
What are two primary design constraints when a robust infrastructure solution is created?
A. roject time frame
B. omponent availability
C. taff experience
D. otal cost
E. onitoring capabilitie
عرض الإجابة
اجابة صحيحة: AE
السؤال #10
Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?
A. GRE
B. -VTI
C. ET VPN
D. MVP
عرض الإجابة
اجابة صحيحة: AD
السؤال #11
Two routers R1 and R2 are directly connected through an Ethernet link Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?
A. anban project management
B. EAN project management
C. raditional project management
D. gile project managemen
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives?
A. orkspace
B. orkplace
C. ork domain
D. orkgroup
E. orkloa
عرض الإجابة
اجابة صحيحة: BD
السؤال #13
Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intra service orchestration?
A. hen occasional flaps of long duration occur
B. hen numerous adjacent flaps of very short duration occur
C. hen the switch hardware is faster than the debounce timer down detection
D. hen the router hardware is slower than the carrier delay down detectio
عرض الإجابة
اجابة صحيحة: AD
السؤال #14
An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate this during the migration phase?
A. he design approach should consider simple and centralized management aspect
B. esign automation tools wherever it is appropriate for greater visibility
C. esign in a way that it simplifies and improves ease of deployment
D. esign in a way that expects outages and attacks on the network and its protected resources
عرض الإجابة
اجابة صحيحة: A
السؤال #15
An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh iBGP peering between these routers as touting method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?
A. dentify the scope and business cases for migration
B. ssess infrastructure requirements
C. valuate available in-house resources
D. ssess the cloud brokerage solutions
E. etermine the technology obsolescence
F. etermine the geolocation requirement
G. ssess database security requirements
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?
A. ultipoint route-redistribution with route filtering using ACLs
B. ingle point route-redistribution with route filtering using ACLs
C. ingle point route-redistribution with route filtering using route tags
D. ultipoint route-redistribution with route filtering using route tag
عرض الإجابة
اجابة صحيحة: DE
السؤال #17
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?
A. ocal addresses
B. ink-local addresses
C. nique local addresses
D. rivate addresse
عرض الإجابة
اجابة صحيحة: E
السؤال #18
A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.Project scope and weekly progress should be visualized by the management. Always consider feedback and make changes accordingly during the project. Should consider flexibility to change scope at the point of time.Which project methodology meets the requirements and have the least impact on the outcome?
A. crum
B. EAN
C. ix-Sigma
D. anba
عرض الإجابة
اجابة صحيحة: BD
السؤال #19
An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh iBGP peering between these routers as touting method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?
A. mplement route reflectors on the two core routers
B. ncrease the memory on the distribution routers
C. mplement eBGP between the core and distribution routers
D. ncrease bandwidth between the core routers
E. ncrease the memory on the core routers
عرض الإجابة
اجابة صحيحة: AB
السؤال #20
The Company XYZ network run IPv4 and IPv6 and they want to introduce multicast routing using PIM sparse mode.Which method for specifying the RP can be included in the design to provide flexibility and scalability?
A. mbedded RP
B. SR
C. tatic RP
D. uto-R
عرض الإجابة
اجابة صحيحة: BC
السؤال #21
Which network management framework can be used to develop a network architecture that contains business requirements analysis, gap analysis, and network diagrams as artifacts to be used for design and implementation later?
A. ntegrate endpoint posture
B. inimize operational costs
C. nsure faster obsolescence
D. educe complexity
E. tandardize resilienc
عرض الإجابة
اجابة صحيحة: CE
السؤال #22
Which type of interface are OpenFlow and OpFlex?
A. outhbound interface
B. astbound interface
C. orthbound interface
D. loud-bound interfac
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Which three items do you recommend for control plane hardening of an infrastructure device?
A. NMPv3
B. o enable unused services
C. edundant AAA servers
D. ontrol Plane Policing
E. outing protocol authentication
F. arning banner
عرض الإجابة
اجابة صحيحة: D
السؤال #24
Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Intemnet via multiple high-speed connections. The company is now redesigning their network and must comply with these design requirements:Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.Use the Internet as the underlay for the private WAN. Securely transfer the corporate data over the private WAN.Which two technologies should be incorporated into the desi
A. uild neighbor adjacencies in a squared fashion
B. uild neighbor adjacencies in a triangulated fashion
C. imit the query domain by use of distribute lists
D. imit the query domain by use of default routes
E. imit the query domain by use of summarization
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Company XYZ has a new network based on lPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network Which type of lPv6 addresses can be used for these networks in the IPv6 addressing design?
A. synchronous data replication should be used in this scenario to avoid performance impact in the primary site
B. SANs must be extended from the primary to the secondary site to improve performance and availability
C. arget RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites
D. ynchronous data replication must be used to meet the business requirements
E. SANs must be routed between sites to isolate fault domains and increase overall availability
عرض الإجابة
اجابة صحيحة: C
السؤال #26
An architect receives a business requirement from a CTO that states the RTO for a new system should be 4 hours, and the RPO should be less than 1 hour. Business continuity must also be ensured in the event of a natural disaster. Which replication method and data center technology should be used?
A. inja2
B. ava
C. nsible
D. ontrai
عرض الإجابة
اجابة صحيحة: AB
السؤال #27
Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications The QoS design must live these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?
A. ata governance
B. ecurity
C. loud connectivity
D. dditional latenc
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Which two statements describe the hierarchical LAN design model?
A. olutions allow for variations of commodity and specialized switching hardware
B. olutions include centralized orchestration, control, and zero-touch provisioning
C. ontrol and data forwarding planes are kept separate
D. mproved operational efficiencies result in cost savings
E. D-WAN networks are inherently protected against slow performance
عرض الإجابة
اجابة صحيحة: C
السؤال #29
Company XYZ has multiple production units and marketing departments across the region. The current network is a mixture of point-to-point links and MPLS Layer 3 VPN service from the provider. The Info-Sec team has suggested to isolate production traffic end-to-end with an encryption over the transport network to comply with the HIPAA standard. Which solution must be used in their design if Company XYZ wants a quick roll out?
A. igrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers
B. eploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites
C. eploy controllers, deploy SD-WAN edge routers in the data center, and migrate branch sites
D. igrate branch sites, migrate data center WAN routers, and deploy controllers
عرض الإجابة
اجابة صحيحة: D
السؤال #30
Which optimal use of interface dampening on a fast convergence network design is true?
A. eighted random early detection
B. irst-in first-out
C. ow-latency queuing
D. eighted fair queuin
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: