لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?
A. CLs on data center switches
B. ata center perimeter firewalling
C. ACLs on data center switches
D. outed firewall
عرض الإجابة
اجابة صحيحة: ADE
السؤال #2
Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue?
A. TP
B. TP
C. icro loops
D. E
عرض الإجابة
اجابة صحيحة: A
السؤال #3
What are two common approaches to analyzing and designing networks?
A. igh-low security approach
B. op-down approach
C. hree-tier approach
D. ottom-up approach
E. eft-right approac
عرض الإجابة
اجابة صحيحة: BE
السؤال #4
Which statement about OSPF hub-and-spoke topology is true?
A. synchronous replication over dual data centers via DWDM
B. ynchronous replication over dual data centers via Metro Ethemet
C. synchronous replication over geographically dispersed dual data centers via CWDM
D. ynchronous replication over geographically dispersed dual data centers via MPL
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A thorough examination of the current network infrastructure has revealed that several devices have an unusual high CPU load. A traffic analysis indicates that control plane protocols and management traffic are affected as the devices are busy processing inbound traffic. The networking team is working on updating their design for the entire network to handle situations like this. Which feature or technology can be added to help mitigate the problem?
A. hysical hardware deployment
B. arrier lead times
C. ogical topology deployment
D. cquisition of automation tools
E. etwork configuration desig
عرض الإجابة
اجابة صحيحة: A
السؤال #6
What are two examples of business goals to be considered when a network design is built?
A. bility to expand bandwidth over existing optical infrastructure
B. nherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol
C. nherent topology flexibility with intelligent chromatic dispersion
D. nherent topology flexibility with built-in service protection
E. nherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservatio
عرض الإجابة
اجابة صحيحة: AD
السؤال #7
Which two advantages of using DWDM over traditional optical networks are true?
A. raffic shaping
B. raffic policing
C. RED
D. ail dro
عرض الإجابة
اجابة صحيحة: BDF
السؤال #8
How must the queue sizes be designed to ensure that an application functions correctly?
A. he sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay
B. he queuing delay on every device in the chain must be exactly the same to the application required delay
C. he default queue sizes are good for any deployment as it compensates the serialization delay
D. ach individual device queuing delay in the chain must be less than or equal to the application required delay
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Before migrating anything to the cloud, what are three cloud readiness assessment steps that are required to perform?
A. CAM carving
B. odular QoS
C. eep interface buffers
D. ontrol plane policin
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF. However, they also want to prevent excess flooding of LSAs if there is a constantly flapping link on the network. Which timers can help prevent excess flooding of LSAs for OSPF?
A. SPF flooding timers
B. SPF propagation timers
C. SPF delay timers
D. SPF throttling timer
عرض الإجابة
اجابة صحيحة: BD
السؤال #11
Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:Securely transfer the corporate data over the private WANUse a centralized configuration model.Minimize overhead on the tunneled traffic.Which technology can be used in the new design to meet the company's requirements?
A. NMPv3
B. o enable unused services
C. edundant AAA servers
D. ontrol Plane Policing
E. outing protocol authentication
F. arning banner
عرض الإجابة
اجابة صحيحة: A
السؤال #12
What is the most important operational driver in building a resilient and secure modular network design?
A. irst-hop router registration to the RP
B. ulticast client registration to the RP
C. ulticast source registration to the RP
D. ransport of all IPv6 multicast traffi
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbor relationships to be minimized on each network segment and want to optimize the size of the IS-IS LSDB on each router. Which design can be used to meet these requirements?
A. esign all routers as Level 2 routers
B. esign the network so that the routers connecting to other areas are Level 1/Level2 routers and internal routers are Level 1
C. esign the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1
D. esign the network so that all routers are Level 1 router
عرض الإجابة
اجابة صحيحة: D
السؤال #14
The Agile release train workflow focuses on tasks which can be accomplished reliably and efficiently. Scrum and Kanban are two of the most popular Agile frameworks, but both have a specific use case based on the implementation requirements. In which two situations are Kanban the ideal framework to use?
A. eriodic snapshot of data
B. ackup on external storage
C. pare onsite disks
D. loud backup to mirror dat
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication. and data) from unauthorized access, modification, inspection, or destruction?
A. erviceability
B. onfidentiality
C. calability
D. ntegrity
E. eliability
F. vailabilit
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3hrs and 24hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario?
A. trategic planning approach
B. usiness optimization approach
C. odular approach
D. actical planning approach
E. ost optimization approac
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which project management methodology is characterized by a having a low client involvement?
A. nsure that strong cryptography is applied for users who have administrative access through networks
B. pply strong cryptography and security protocols to safeguard sensitive cardholder data
C. pply strong encryption for transmission of cardholder data across public networks
D. rotect all user systems against malware and frequently update antivirus software
E. aintain a policy that addresses information security for employees and third parties
عرض الإجابة
اجابة صحيحة: D
السؤال #18
In search of a system capable of hosting, monitoring, compiling, and testing code in an automated way, what can be recommended to the organization?
A. enkins
B. erl
C. hef
D. nsibl
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions?
A. obit
B. OGAF
C. TIL
D. CAP
عرض الإجابة
اجابة صحيحة: ADE
السؤال #20
Company XYZ network runs lPv4 and lPv6 and they want to introduce a multidomain, multicast-based network. The new design should use favor of PIM that forwards traffic using SPT. Which technology meets this requirement?
A. ecurity management
B. erformance management
C. ault management
D. ccounting managemen
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?
A. ynchronous replication over dual data centers via Metro Ethernet
B. synchronous replication over dual data centers via DWDM
C. synchronous replication over geographically dispersed dual data centers via CWDM
D. ynchronous replication over geographically dispersed dual data centers via MPL
عرض الإجابة
اجابة صحيحة: ABC
السؤال #22
An engineer must design a network for a company that uses OSPF LFA to reduce loops. Which type of lop would be reduced by using this design?
A. aking administrative actions
B. hanging the configuration of specific fields
C. ollecting the status of specific fields
D. istinguishing between configuration data and operational dat
عرض الإجابة
اجابة صحيحة: D
السؤال #23
A European national bank considers migrating its on-premises systems to a private cloud offering in a non- European location to significantly reduce IT costs. What is a primary factor prior to migration?
A. ncrease time spent on developing new features
B. ependencies on hardware or software that is difficult to scale
C. inimize app downtime
D. educe the frequency of failures requiring human interventio
عرض الإجابة
اجابة صحيحة: BE
السؤال #24
SD-WAN can be used to provide secure connectivity to remote offices, branch offices, campus networks, data centers, and the cloud over any type of IP-based underlay transport network. Which two statements describe SD-WAN solutions?
A. olerance to packet loss
B. CP-based application
C. mall transactions (HTTP-like behavior)
D. RED drop treatment
E. ntolerance to jitte
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Which feature is supported by NETCONF but is not supported by SNMP?
A. fter the initial timer exchange, R1 sets its transmission rate to the R2 Required Min RX interval
B. fter the initial timer exchange, R2 sets its transmission rate to the R1 Desired Min TX interval
C. 2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set
D. imers renegotiate indefinitely, so the timer exchange phase never converges
عرض الإجابة
اجابة صحيحة: BE
السؤال #26
Which two control plane policer designs must be considered to achieve high availability?
A. t is a well-understood architecture that provides scalability
B. hanges, upgrades, and new services can be introduced in a controlled and staged manner
C. t provides a simplified design
D. t is the best design for modern data centers
E. t is the most optimal design but is highly complex
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Company XYZ wants to prevent switch loops caused by unidirectional point-point-link condition on Rapid PVST+ and MST. Which technology can be used in the design to meet this requirement?
A. RILL
B. TP bridge assurance
C. TP BPDU guard
D. ST
عرض الإجابة
اجابة صحيحة: D
السؤال #28
Which three items do you recommend for control plane hardening of an infrastructure device?
A. mplement route reflectors on the two core routers
B. ncrease the memory on the distribution routers
C. mplement eBGP between the core and distribution routers
D. ncrease bandwidth between the core routers
E. ncrease the memory on the core routers
عرض الإجابة
اجابة صحيحة: C
السؤال #29
A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSs requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration?
A. RF-Lite can be implemented toward the downstream network and VRF-based tunnels combined with IPsec can be implemented over the service provider
B. ETVPN can be implemented over the MPLS provider, which provides a payload encryption without the overhead of the tunnelling
C. firewall can be placed centrally to filter out the traffic based on required ports
D. Psec point-to-point tunnels over the MPLS and point-to-point links provide an isolated and encrypted packet end-to-end
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: