لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A. Ensure an implicit permit rule is enabled
B. Configure the log settings on the firewalls to the central syslog server C
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Given the following information: Which of the following command-line tools would generate this output?
A. netstat B
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A systems administrator is running a VoIP network and is experiencing jitter and high latency. Which of the following would BEST help the administrator determine the cause of these issues?
A. Enabling RADIUS on the network
B. Configuring SNMP traps on the network C
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A network technician was hired to harden the security of a network. The technician is required to enable encryption and create a password for AP security through the web browser. Which of the following would BEST support these requirements? A.ESP B.WPA2 C.IPSec D.ACL
A network technician was hired to harden the security of a network. The technician is required to enable encryption and create a password for AP security through the web browser
عرض الإجابة
اجابة صحيحة: B
السؤال #5
A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU? A.CRC errors B.Giants C.Runts D.Flooding
A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU? A
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which of the following would be BEST to use to detect a MAC spoofing attack?
A. Internet Control Message Protocol
B. Reverse Address Resolution Protocol C
عرض الإجابة
اجابة صحيحة: B
السؤال #7
A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?
A. DHCP snooping
B. Geofencing C
عرض الإجابة
اجابة صحيحة: C
السؤال #8
A company with multiple routers would like to implement an HA network gateway with the least amount of downtime possible. This solution should not require changes on the gateway setting of the network clients. Which of the following should a technician configure?
A. Automate a continuous backup and restore process of the system's state of the active gateway
B. Use a static assignment of the gateway IP address on the network clients
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A network administrator discovers that users in an adjacent building are connecting to the company's guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?
A. Reduce the wireless power levels
B. Adjust the wireless channels C
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall? A.Secure SNMP B.Port security C.Implicit deny D.DHCP snooping
A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall? A
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A network administrator decided to use SLAAC in an extensive IPv6 deployment to alleviate IP address management. The devices were properly connected into the LAN but autoconfiguration of the IP address did not occur as expected. Which of the following should the network administrator verify?
A. The network gateway is configured to send router advertisements
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all users have lost Internet connectivity. Which of the following describes the issue?
A. The incorrect subnet mask was configured
B. The incorrect gateway was configured C
عرض الإجابة
اجابة صحيحة: A
السؤال #13
A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?
A. Load balancing
B. Multipathing C
عرض الإجابة
اجابة صحيحة: C
السؤال #14
A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the phone system. Which of the following tasks need to be completed to allow the phone to operate correctly?
A. Assign the phone's switchport to the correct VLAN
B. Statistically assign the phone's gateway address C
عرض الإجابة
اجابة صحيحة: A
السؤال #15
The following configuration is applied to a DHCP server connected to a VPN concentrator: There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?
A. Decrease the lease duration
B. Reboot the DHCP server C
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot? A.Layer 1 B.Layer 2 C.Layer 3 D.Layer 4 E.Layer 5
F. Layer 6 G
عرض الإجابة
اجابة صحيحة: B
السؤال #17
A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A. 10
B. 10
E. 10
عرض الإجابة
اجابة صحيحة: E
السؤال #18
Users attending security training at work are advised not to use single words as passwords for corporate applications. Which of the following does this BEST protect against?
A. An on-path attack B
E. Denial of service
عرض الإجابة
اجابة صحيحة: C
السؤال #19
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?
A. Increased CRC errors
B. Increased giants and runts C
عرض الإجابة
اجابة صحيحة: A
السؤال #20
A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?
A. Add another AP
B. Disable the 2
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A network administrator is implementing OSPF on all of a company's network devices. Which of the following will MOST likely replace all the company's hubs? A.A Layer 3 switch B.A proxy server C.A NGFW D.A WLAN controller
A network administrator is implementing OSPF on all of a company's network devices. Which of the following will MOST likely replace all the company's hubs? A
عرض الإجابة
اجابة صحيحة: A
السؤال #22
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
A. 802
B. 802
عرض الإجابة
اجابة صحيحة: B
السؤال #23
A network technician reviews an entry on the syslog server and discovers the following message from a switch: SPANNING-TREE Port 1/1 BLOCKED Which of the following describes the issue?
A. A loop was discovered, and the impact was mitigated
B. An incorrectly pinned cable was disconnected
عرض الإجابة
اجابة صحيحة: A
السؤال #24
A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site. Which of the following concepts should the company select? A.Cold site B.Hot site C.Warm site D.Cloud site
A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site
عرض الإجابة
اجابة صحيحة: C
السؤال #25
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A. OTDR
B. Tone generator C
E. PoE injector
عرض الإجابة
اجابة صحيحة: A
السؤال #26
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?
A. A VoIP sales call with a customer
B. An in-office video call with a coworker C
عرض الإجابة
اجابة صحيحة: A
السؤال #27
Which of the following connector types would have the MOST flexibility? A.SFP B.BNC C.LC D.RJ45
Which of the following connector types would have the MOST flexibility? A. FP B
عرض الإجابة
اجابة صحيحة: A
السؤال #28
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?
A. Install load balancers
B. Install more switches C
عرض الإجابة
اجابة صحيحة: D
السؤال #29
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?
A. IP scanner
B. Terminal emulator C
عرض الإجابة
اجابة صحيحة: A
السؤال #30
A network administrator would like to enable NetFlow on a Layer 3 switch but is concerned about how the feature may impact the switch. Which of the following metrics should the administrator graph using SNMP to BEST measure the feature's impact?
A. CPU usage
B. Temperature C
عرض الإجابة
اجابة صحيحة: A
السؤال #31
Which of the following technologies provides a failover mechanism for the default gateway?
A. FHRP B
عرض الإجابة
اجابة صحيحة: A
السؤال #32
SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: The SSIDs need to be configured as CorpNet with a key of S3cr3t! The wireless signals should not interfere with each other The subnet the Access Points and switch are on should only support 30 devices maximum The Access Points should be configured to only support TKIP clients at a maximum speed INSTRUCTONS Click on t
A. See explanation below
عرض الإجابة
اجابة صحيحة: A
السؤال #33
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices? A.SSO B.TACACS+ C.Zero Trust D.Separation of duties
E. Multifactor authentication
عرض الإجابة
اجابة صحيحة: B
السؤال #34
Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings? A.UTP
B. Coaxial C
E. Twinaxial
عرض الإجابة
اجابة صحيحة: C
السؤال #35
Which of the following is the LARGEST MTU for a standard Ethernet frame?
A. 1452
B. 1492 C
عرض الإجابة
اجابة صحيحة: C
السؤال #36
A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?
A. Audit logs B
عرض الإجابة
اجابة صحيحة: B
السؤال #37
A technician is setting up a new router, configuring ports, and allowing access to the Internet. However, none of the users connected to this new router are able to connect to the Internet. Which of the following does the technician need to configure?
A. Tunneling
B. Multicast routing C
عرض الإجابة
اجابة صحيحة: C
السؤال #38
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch? A.NIC teaming
B. Load balancer C
عرض الإجابة
اجابة صحيحة: A
السؤال #39
Which of the following transceiver types can support up to 40Gbps? A.SFP+ B.QSFP+ C.QSFP D.SFP
Which of the following transceiver types can support up to 40Gbps? A. FP+ B
عرض الإجابة
اجابة صحيحة: B
السؤال #40
Which of the following protocols will a security appliance that is correlating network events from multiple devices MOST likely rely on to receive event messages? A.Syslog
B. Session Initiation Protocol C
عرض الإجابة
اجابة صحيحة: A
السؤال #41
Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS B
عرض الإجابة
اجابة صحيحة: B
السؤال #42
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details: Switch mirror port details: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer? A.ifconfig ecth0 promisc
B. ifconfig eth1 up C
عرض الإجابة
اجابة صحيحة: A
السؤال #43
Which of the following TCP ports is used by the Windows OS for file sharing?
A. 53
B. 389 C
عرض الإجابة
اجابة صحيحة: C
السؤال #44
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
A. Motion detection
B. Access control vestibules C
عرض الإجابة
اجابة صحيحة: B
السؤال #45
A user is having difficulty with video conferencing and is looking for assistance. Which of the following would BEST improve performance?
A. Packet shaping B
عرض الإجابة
اجابة صحيحة: B
السؤال #46
A technician is implementing a new wireless network to serve guests at a local office. The network needs to provide Internet access but disallow associated stations from communicating with each other. Which of the following would BEST accomplish this requirement?
A. Wireless client isolation B
عرض الإجابة
اجابة صحيحة: A
السؤال #47
Which of the following is used to prioritize Internet usage per application and per user on the network?
A. Bandwidth management
B. Load balance routing C
عرض الإجابة
اجابة صحيحة: A
السؤال #48
A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: Device LC/LC patch cable Patch panel Cross-connect fiber cable Patch panel LC/LC patch cable Switch The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Wh
A. TX/RX is reversed
B. An incorrect cable was used C
عرض الإجابة
اجابة صحيحة: A
السؤال #49
A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?
A. Password complexity B
عرض الإجابة
اجابة صحيحة: B
السؤال #50
An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications. In the event of an outage, the company can immediately switch from one datacenter to another. Which of the following does this BEST describe? A.A warm site
B. Data mirroring C
عرض الإجابة
اجابة صحيحة: E
السؤال #51
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
A. 802
عرض الإجابة
اجابة صحيحة: B
السؤال #52
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue? A.TTL B.MX C.TXT D.SOA
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue? A
عرض الإجابة
اجابة صحيحة: A
السؤال #53
Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs to access network shares at the other site. Which of the following will BEST provide this functionality? A.Client-to-site VPN B.Third-party VPN service C.Site-to-site VPN D.Split-tunnel VPN
Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs to access network shares at the other site
عرض الإجابة
اجابة صحيحة: C
السؤال #54
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
A. A backup of a large video presentation to cloud storage for archival purposes
B. A duplication of a hosted virtual server to another physical server for redundancy C
عرض الإجابة
اجابة صحيحة: B
السؤال #55
A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?
A. nslookup B
عرض الإجابة
اجابة صحيحة: B
السؤال #56
A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?
A. A honeypot
B. Network segmentation C
عرض الإجابة
اجابة صحيحة: A
السؤال #57
A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the following BEST represents this value?
A. Zero Trust
B. Planned obsolescence C
عرض الإجابة
اجابة صحيحة: C
السؤال #58
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment? A.MIMO B.TKIP C.LTE D.SSID
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment? A
عرض الإجابة
اجابة صحيحة: D
السؤال #59
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header? A.Network
B. Data link C
عرض الإجابة
اجابة صحيحة: C
السؤال #60
Which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure?
A. Business continuity plan
B. Onboarding and offboarding policies C
E. Change management
عرض الإجابة
اجابة صحيحة: E

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: