لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What differentiates device management enabled by Cisco DNA Center from traditional campus device management?
A. er-device
B. entralized
C. LI-oriented device
D. evice-by-device hands-o
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?
A. TP
B. FTP
C. MTP
D. T
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received. Which interface counter increments?
A. ollision
B. RC
C. unt
D. ate collisio
عرض الإجابة
اجابة صحيحة: D
السؤال #4
R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?
A. oute with the shortest prefix length
B. oute with the lowest administrative distance
C. oute with the next hop that has the highest IP
D. oute with the lowest cos
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which IPsec transport mode encrypts the IP header and the payload?
A. ransport
B. ontrol
C. ipe
D. unne
عرض الإجابة
اجابة صحيحة: D
السؤال #6
To improve corporate security, an organization is planning to implement badge authentication to limit access to the data center. Which element of a security program is being deployed?
A. ser awareness
B. ser training
C. ulnerability verification
D. hysical access contro
عرض الإجابة
اجابة صحيحة: D
السؤال #7
How does HSRP provide first hop redundancy?
A. t forwards multiple packets to the same destination over different routed links in the data path
B. t load-balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table
C. t uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN
D. t load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What is the maximum bandwidth of a T1 point-to-point connection?
A.
B.
C. 4
D. 3
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which network plane is centralized and manages routing decisions?
A. anagement plane
B. ata plane
C. ontrol plane
D. olicy plan
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller?
A. elnet
B. SH
C. TTP
D. TTPS
E. FT
عرض الإجابة
اجابة صحيحة: AC
السؤال #11
Why is a first-hop redundancy protocol implemented?
A. o provide load-sharing for a multilink segment
B. o prevent loops in a network
C. o enable multiple switches to operate as a single unit
D. o protect against default gateway failure
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which syslog severity level is considered the most severe and results in the system being considered unusable?
A. mergency
B. ritical
C. lert
D. rro
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Why choose Cisco DNA Center for automated lifecycle management?
A. o provide software redundancy in the network
B. o perform upgrades without service interruption
C. o provide fast and accurate deployment of patches and updates
D. o allow SSH access to all nodes in the networ
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which mechanism allows WPA3 to provide a higher degree of security than its predecessors?
A. utomatic device pairing
B. pecial-character support in preshared keys
C. AE password-based key exchange
D. ertificate-based authenticatio
عرض الإجابة
اجابة صحيحة: C
السؤال #15
An engineer must configure R1 for a new user account. The account must meet these requirements:It must be configured in the local database.The username is engineer2.It must use the strongest password configurable.Which command must the engineer configure on the router?
A. 1(config)# username engineer2 secret 4 XXXXXXXXXX
B. 1(config)# username engineer2 algorithm-type scrypt secret test2021
C. 1(config)# username engineer2 privilege 1 password 7 test2021
D. 1(config)# username engineer2 secret 5 password XXXXXXXXX
عرض الإجابة
اجابة صحيحة: B
السؤال #16
What is a benefit for external users who consume public cloud resources?
A. ccessed over the Internet
B. mplemented over a dedicated WAN
C. ocated in the same data center as the users
D. ll hosted on physical server
عرض الإجابة
اجابة صحيحة: A
السؤال #17
What is the primary purpose of private address space?
A. imit the number of nodes reachable via the Internet
B. implify the addressing in the network
C. onserve globally unique address space
D. educe network complexit
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which action must be taken when password protection is implemented?
A. se less than eight characters in length when passwords are complex
B. hare passwords with senior IT management to ensure proper oversight
C. tore passwords as contacts on a mobile device with single-factor authentication
D. nclude special characters and make passwords as long as allowed
عرض الإجابة
اجابة صحيحة: D
السؤال #19
An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?
A. ull
B. xchange
C. -way
D. ni
عرض الإجابة
اجابة صحيحة: A
السؤال #20
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user's smartphone being lost or stolen?
A. he application verifies that the user is in a specific location before it provides the second factor
B. he application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted
C. he application requires the user to enter a PIN before it provides the second factor
D. he application requires an administrator password to reactivate after a configured interval
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A packet from a company's branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes 172.31.0.0/16,172.31.0.0/24, and 172.31.0.0/25. How does the router handle the packet?
A. t sends the traffic via prefix 172
B. t sends the traffic via prefix 172
C. t sends the traffic via the default gateway 0
D. t sends the traffic via prefix 172
عرض الإجابة
اجابة صحيحة: A
السؤال #22
What configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?
A. nsible
B. ython
C. hef
D. uppe
عرض الإجابة
اجابة صحيحة: A
السؤال #23
How do servers connect to the network in a virtual environment?
A. ireless to an access point that is physically connected to the network
B. virtual switch that links to an access point that is physically connected to the network
C. software switch on a hypervisor that is physically connected to the network
D. cable connected to a physical switch on the networ
عرض الإجابة
اجابة صحيحة: C
السؤال #24
What configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?
A. nsible
B. ython
C. hef
D. uppe
عرض الإجابة
اجابة صحيحة: A
السؤال #25
How do servers connect to the network in a virtual environment?
A. ireless to an access point that is physically connected to the network
B. virtual switch that links to an access point that is physically connected to the network
C. software switch on a hypervisor that is physically connected to the network
D. cable connected to a physical switch on the networ
عرض الإجابة
اجابة صحيحة: C
السؤال #26
A DHCP pool has been created with the name CONTROL. The pool uses the next to last usable IP address as the default gateway for the DHCP clients. The server is located at 172.16.32.15. What is the next step in the process for clients on the 192.168.52.0/24 subnet to reach the DHCP server?
A. p default-gateway 192
B. p helper-address 172
C. p forward-protocol udp 137
D. p default-network 192
عرض الإجابة
اجابة صحيحة: B
السؤال #27
An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?
A. 55255
B. 55
C. 55
D. 55
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Which technology allows for multiple operating systems to be run on a single host computer?
A. irtual routing and forwarding
B. irtual device contexts
C. erver virtualization
D. etwork port ID virtualizatio
عرض الإجابة
اجابة صحيحة: C
السؤال #29
How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?
A. raditional campus device management schemes can typically deploy patches and updates quicker than Cisco DNA Center device management
B. isco DNA Center device management can be implemented at a lower cost than most traditional campus device management options
C. raditional campus device management allows a network to scale quicker than with Cisco DNA Center device management
D. isco DNA Center device management can deploy a network faster than traditional campus device management
عرض الإجابة
اجابة صحيحة: D
السؤال #30
Which type of address is shared by routers in a HSRP implementation and used by hosts on the subnet as their default gateway address?
A. roadcast address
B. irtual IP address
C. oopback IP address
D. ulticast addres
عرض الإجابة
اجابة صحيحة: B
السؤال #31
What event has occurred if a router sends a notice level message to a syslog server?
A. TCP connection has been torn down
B. certificate has expired
C. n ICMP connection has been built
D. n interface line has changed status
عرض الإجابة
اجابة صحيحة: D
السؤال #32
What is an expected outcome when network management automation is deployed?
A. oftware upgrades are performed from a central controller
B. distributed management plane must be used
C. ustom applications are needed to configure network devices
D. omplexity increases when new device configurations are added
عرض الإجابة
اجابة صحيحة: A
السؤال #33
Which selections must be used on the WLC when implementing a RADIUS server for wireless authentication?
A. etwork Access Control State and SSH
B. AA Override and the IP address of the server
C. lient Exclusion and SSH
D. 02
عرض الإجابة
اجابة صحيحة: B
السؤال #34
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GHz access points?
A. EAP Split Tunnel
B. e-Anchor Roamed Clients
C. lient Band Select
D. 1ac MU-MIM
عرض الإجابة
اجابة صحيحة: C
السؤال #35
What is the function of a controller in controller-based networking?
A. t is a pair of core routers that maintain all routing decisions for a campus
B. t centralizes the data plane for the network
C. t is the card on a core router that maintains all routing decisions for a campus
D. t serves as the centralized management point of an SDN architecture
عرض الإجابة
اجابة صحيحة: D
السؤال #36
Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management?
A. ustomized versions for small, medium, and large enterprises
B. dapters that support all families of Cisco IOS software
C. EST APIS that allow for external applications to interact natively with Cisco DNA Center
D. odular design that is upgradable as needed
E. DKs that support interaction with third-party network equipmen
عرض الإجابة
اجابة صحيحة: CE
السؤال #37
What are two benefits of network automation?
A. educed hardware footprint
B. educed operational costs
C. ewer network failures
D. ncreased network security
E. aster changes with more reliable result
عرض الإجابة
اجابة صحيحة: BE
السؤال #38
An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface?
A. pv6 address 2001:db8::700:3:400F:572B
B. pv6 address 2001:db8:0::700:3:4F:572B
C. pv6 address 2001:0db8::7:3:4F:572B
D. pv6 address 2001::db8:0000::700:3:400F:572
عرض الإجابة
اجابة صحيحة: A
السؤال #39
What is a capability of FTP in network management operations?
A. ncrypts data before sending between data resources
B. evices are directly connected and use UDP to pass file information
C. ses separate control and data connections to move files between server and client
D. ffers proprietary support at the session layer when transferring dat
عرض الإجابة
اجابة صحيحة: C
السؤال #40
What is a characteristic of cloud-based network topology?
A. nsite network services are provided with physical Layer 2 and Layer 3 components
B. hysical workstations are configured to share resources
C. ireless connections provide the sole access method to services
D. ervices are provided by a public, private, or hybrid deploymen
عرض الإجابة
اجابة صحيحة: D
السؤال #41
In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?
A. hen the addresses on the subnet must be equivalent to private IPv4 addresses
B. hen the subnet does not need to be routable
C. hen the subnet must be routable over the internet
D. hen the subnet must be available only within an organizatio
عرض الإجابة
اجابة صحيحة: C
السؤال #42
A wireless access point is needed and must meet these requirements."zero-touch" deployed and managed by a WLCprocess only real-time MAC functionalityused in a split-MAC architecture Which access point type must be used?
A. ightweight
B. loud-based
C. esh
D. utonomou
عرض الإجابة
اجابة صحيحة: A
السؤال #43
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet?
A. onfigure static ARP entries
B. nable the PortFast feature on ports
C. mplement port-based authentication
D. onfigure ports to a fixed speed
E. hut down unused port
عرض الإجابة
اجابة صحيحة: CE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: