لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which CRUD operation corresponds to the HTTP GET method?
A. reate
B. pdate
C. elete
D. ea
عرض الإجابة
اجابة صحيحة: D
السؤال #2
What is a feature of WPA?
A. mall Wi-Fi application
B. reshared key
C. KIP/IMC encryption
D. 02
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which two protocols are supported on service-port interfaces?
A. CP
B. ADIUS
C. SH
D. ACACS+
E. elne
عرض الإجابة
اجابة صحيحة: CE
السؤال #4
What is the role of disaggregation in controller-based networking?
A. t divides the control-plane and data-plane functions
B. t enables a network topology to quickly adjust from a ring network to a star network
C. t streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions
D. t summarizes the routes between the core and distribution layers of the network topology
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?
A. anagement interface
B. irtual interface
C. ervice port
D. onsole por
عرض الإجابة
اجابة صحيحة: A
السؤال #6
What is the purpose of using First Hop Redundancy Protocol on a specific subnet?
A. orwards multicast hello messages between routers
B. ilters traffic based on destination IP addressing
C. nsures a loop-free physical topology
D. ends the default route to the hosts on a networ
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What is the benefit of using private IPv4 addressing?
A. o be routable over an external network
B. o provide reliable connectivity between like devices
C. o shield internal network devices from external access
D. o enable secure connectivity over the Interne
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What are two differences between optical-fiber cabling and copper cabling?
A. he data can pass through the cladding
B. BNC connector is used for fiber connections
C. iber connects to physical interfaces using RJ-45 connections
D. ight is transmitted through the core of the fiber
E. he glass core component is encased in a cladding
عرض الإجابة
اجابة صحيحة: DE
السؤال #9
Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?
A. ole-based access control
B. iometrics
C. ultifactor authentication
D. hysical access contro
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management?
A. ustomized versions for small, medium, and large enterprises
B. dapters that support all families of Cisco IOS software
C. EST APIS that allow for external applications to interact natively with Cisco DNA Center
D. odular design that is upgradable as needed
E. DKs that support interaction with third-party network equipmen
عرض الإجابة
اجابة صحيحة: CE
السؤال #11
Which statement compares traditional networks and controller-based networks?
A. nly traditional networks natively support centralized management
B. nly traditional networks offer a centralized control plane
C. raditional and controller-based networks abstract policies from device configurations
D. nly controller-based networks decouple the control plane and the data plan
عرض الإجابة
اجابة صحيحة: D
السؤال #12
When OSPF learns multiple paths to a network, how does it select a route?
A. t multiplies the active K values by 256 to calculate the route with the lowest metric
B. t divides a reference bandwidth of 100 Mbps by the actual bandwidth of the exiting interface to calculate the route with the lowest cost
C. t counts the number of hops between the source router and the destination to determine the route with the lowest metric
D. or each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which two conditions must be met before SSH operates normally on a Cisco IOS switch?
A. P routing must be enabled on the switch
B. elnet must be disabled on the switch
C. console password must be configured on the switch
D. he switch must be running a k9 (crypto) IOS image
E. he ip domain-name command must be configured on the switch
عرض الإجابة
اجابة صحيحة: DE
السؤال #14
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
A. ctive
B. esirable
C. n
D. ut
عرض الإجابة
اجابة صحيحة: C
السؤال #15
What is the primary effect of the spanning-tree portfast command?
A. t minimizes spanning-tree convergence time
B. t enables BPDU messages
C. t immediately enables the port in the listening state
D. t immediately puts the port into the forwarding state when the switch is reloaded
عرض الإجابة
اجابة صحيحة: A
السؤال #16
R1 has learned route 192.168.12.0/24 via IS-IS, OSPF, RIP, and Internal EIGRP. Under normal operating conditions, which routing protocol is installed in therouting table?
A. SPF
B. S-IS
C. IP
D. nternal EIGR
عرض الإجابة
اجابة صحيحة: D
السؤال #17
What makes Cisco DNA Center different from traditional network management applications and their management of networks?
A. ts modular design allows someone to implement different versions to meet the specific needs of an organization
B. t does not support high availability of management functions when operating in cluster mode
C. t abstracts policy from the actual device configuration
D. t only supports auto-discovery of network elements in a greenfield deployment
عرض الإجابة
اجابة صحيحة: C
السؤال #18
What are two benefits of network automation?
A. educed hardware footprint
B. educed operational costs
C. ewer network failures
D. ncreased network security
E. aster changes with more reliable result
عرض الإجابة
اجابة صحيحة: BE
السؤال #19
Which set of actions satisfy the requirement for multifactor authentication?
A. he user enters a user name and password, and then re-enters the credentials on a second screen
B. he user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen
C. he user swipes a key fob, then clicks through an email link
D. he user enters a user name and password, and then clicks a notification an authentication app on a mobile device
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Which two outcomes are predictable behaviors for HSRP?
A. he two routers synchronize configurations to provide consistent packet forwarding
B. he two routers negotiate one router as the active router and the other as the standby router
C. he two routers share a virtual IP address that is used as the default gateway for devices on the LAN
D. he two routers share the same interface IP address, and default gateway traffic is load-balanced between them
E. ach router has a different IP address, both routers act as the default gateway on the LAN, and traffic is load-balanced between them
عرض الإجابة
اجابة صحيحة: BC
السؤال #21
Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management?
A. ustomized versions for small, medium, and large enterprises
B. dapters that support all families of Cisco IOS software
C. EST APIS that allow for external applications to interact natively with Cisco DNA Center
D. odular design that is upgradable as needed
E. DKs that support interaction with third-party network equipmen
عرض الإجابة
اجابة صحيحة: CE
السؤال #22
An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface?
A. pv6 address 2001:db8::700:3:400F:572B
B. pv6 address 2001:db8:0::700:3:4F:572B
C. pv6 address 2001:0db8::7:3:4F:572B
D. pv6 address 2001::db8:0000::700:3:400F:572
عرض الإجابة
اجابة صحيحة: A
السؤال #23
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet?
A. onfigure static ARP entries
B. nable the PortFast feature on ports
C. mplement port-based authentication
D. onfigure ports to a fixed speed
E. hut down unused port
عرض الإجابة
اجابة صحيحة: CE
السؤال #24
What is the role of the root port in a switched network?
A. t replaces the designated port when the designated port fails
B. t replaces the designated port when the root port fails
C. t is administratively disabled until a failover occurs
D. t is the best path to the root from a nonroot switch
عرض الإجابة
اجابة صحيحة: D
السؤال #25
When the active router in an HSRP group fails, what router assumes the role and forwards packets?
A. ackup
B. tandby
C. istening
D. orwardin
عرض الإجابة
اجابة صحيحة: B
السؤال #26
What are two advantages of implementing a controller-based architecture instead of a traditional network architecture?
A. t enables configuration task automation
B. t increases security against denial-of-service attacks
C. t provides increased scalability and management options
D. t supports complex and high-scale IP addressing schemes
E. t allows for seamless connectivity to virtual machines
عرض الإجابة
اجابة صحيحة: AC
السؤال #27
Which CRUD operation corresponds to the HTTP GET method?
A. reate
B. pdate
C. elete
D. ea
عرض الإجابة
اجابة صحيحة: D
السؤال #28
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUl, which two formats are available to select?
A. exadecimal
B. ecimal
C. ase64
D. SCII
E. inar
عرض الإجابة
اجابة صحيحة: AD
السؤال #29
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
A. he router ID 0
B. o router ID is set, and the OSPF protocol does not run
C. he lowest IP address is incremented by 1 and selected as the router ID
D. he highest up/up physical interface IP address is selected as the router ID
عرض الإجابة
اجابة صحيحة: D
السؤال #30
When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format?
A.
B.
C. 2
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #31
Which field within the access-request packet is encrypted by RADIUS?
A. assword
B. uthorized services
C. uthenticator
D. sernam
عرض الإجابة
اجابة صحيحة: A
السؤال #32
Which WLC management connection type is vulnerable to man-in-the-middle attacks?
A. elnet
B. TTPS
C. SH
D. onsol
عرض الإجابة
اجابة صحيحة: A
السؤال #33
What is the definition of backdoor malware?
A. alicious code that infects a user machine and then uses that machine to send spam
B. alicious program that is used to launch other malicious programs
C. alicious code with the main purpose of downloading other malicious code
D. alicious code that is installed onto a computer to allow access by an unauthorized use
عرض الإجابة
اجابة صحيحة: D
السؤال #34
When a switch receives a frame for an unknown destination MAC address, how is the frame handled?
A. looded to all ports except the origination port
B. roadcast to all ports on the switch
C. orwarded to the first available port
D. nspected and dropped by the switc
عرض الإجابة
اجابة صحيحة: A
السؤال #35
Which HTTP status code is returned after a successful REST API request?
A. 00
B. 01
C. 04
D. 0
عرض الإجابة
اجابة صحيحة: A
السؤال #36
What is the same for both copper and fiber interfaces when using SFP modules?
A. hey support an inline optical attenuator to enhance signal strength
B. hey provide minimal interruption to services by being hot-swappable
C. hey offer reliable bandwidth up to 100 Mbps in half duplex mode
D. hey accommodate single-mode and multi-mode in a single modul
عرض الإجابة
اجابة صحيحة: B
السؤال #37
Which WPA mode uses PSK authentication?
A. ersonal
B. lient
C. nterprise
D. oca
عرض الإجابة
اجابة صحيحة: A
السؤال #38
What describes a northbound REST API for SDN?
A. etwork-element-facing interface for the control and data planes
B. pplication-facing interface for GET, POST, PUT, and DELETE methods
C. etwork-element-facing interface for GET, POST, PUT, and DELETE methods
D. pplication-facing interface for SNMP GET request
عرض الإجابة
اجابة صحيحة: B
السؤال #39
Why is UDP more suitable than TCP for applications that require low latency, such as VoIP?
A. DP reliably guarantees delivery of all packets, and TCP drops packets under heavy load
B. CP uses congestion control for efficient packet delivery, and UDP uses flow control mechanisms for the delivery of packets
C. DP uses sequencing data for packets to arrive in order, and TCP offers the capability to receive packets in random order
D. CP sends an acknowledgment for every packet that is received, and UDP operates without acknowledgments
عرض الإجابة
اجابة صحيحة: D
السؤال #40
What occurs when overlapping Wi-Fi channels are implemented?
A. he wireless network becomes vulnerable to unauthorized access
B. ireless devices are unable to distinguish between different SSIDs
C. etwork communications are open to eavesdropping
D. sers experience poor wireless network performance
عرض الإجابة
اجابة صحيحة: D
السؤال #41
How do TCP and UDP fit into a query-response model?
A. CP uses error detection for packets, and UDP uses error recovery
B. CP encourages out-of-order packet delivery, and UDP prevents re-ordering
C. CP avoids using sequencing, and UDP avoids using acknowledgments
D. CP establishes a connection prior to sending data, and UDP sends immediately
عرض الإجابة
اجابة صحيحة: D
السؤال #42
What is a difference between local AP mode and FlexConnect AP mode?
A. ocal AP mode causes the AP to behave as if it were an autonomous AP
B. lexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured
C. ocal AP mode creates two CAPWAP tunnels per AP to the WLC
D. lexConnect AP mode fails to function if the AP loses connectivity with the WLC
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: