لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SDN is still maturing Throughout the evolution of SDN which two things will play a key role in enabling a successful deployment and avoiding performance visibility gaps in the infrastructure? (Choose two.)
A. rapid on-demand growth
B. dynamic real-time change
C. falling back to old behaviors
D. peer-to-peer controller infrastructure
E. integration of device context
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)
A. conduct risk analyses
B. install firewalls
C. use antivirus software
D. establish monitoring policies
E. establish risk management policies
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?
A. local addresses
B. private addresses
C. link-local addresses
D. unique local addresses
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops What do you answer?
A. VXLAN offers native loop avoidance mechanism
B. Storm Control should be enabled on all ports
C. VPC+ could prevent L2 loop on access ports
D. BPDU Guard should be enabled on all VTEP access ports
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)
A. cost optimization approach
B. strategic planning approach
C. modular approach
D. tactical planning approach
E. business optimization approach
عرض الإجابة
اجابة صحيحة: A
السؤال #6
The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)
A. Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing
B. It is highly-available by design with no single-point-of-failure risks present
C. Integrating smart NIC capabilities on the local host level is made easier through rest APIs
D. It significantly improves the latency when performing reactive handling of PACKET_IN events
E. It centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?
A. reduction in time to detect and respond to threats
B. integration with an incident response plan
C. adoption and improvement of threat-detection response
D. asset identification and grouping decisions
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two ) The group-pacing timer controls the interval that is used for group and individual LSA refreshment
A. OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size
B. OSPF retransmission-pacing timers allow control of interpacket spaang between consecutive link-state update packets in the OSPF retransmission queue
C. OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue
D. OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue
عرض الإجابة
اجابة صحيحة: A
السؤال #9
You are designing an Out of Band Cisco Network Admission Control. Layer 3 Real-IP Gateway deployment for a customer Which VLAN must be trunked back to the Clean Access Server from the access switch?
A. authentication VLAN
B. user VLAN
C. untrusted VLAN
D. management VLAN
عرض الإجابة
اجابة صحيحة: ACD
السؤال #10
A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions. Project scope and weekly progress should be visualized by the management. Always consider feedback and make changes accordingly during the project. Should consider flexibility to change scope at the point of time. Which project methodology meets the requirements and have the least impact on the outcome?
A. Scrum
B. LEAN
C. Kanban
D. Six-Sigma
عرض الإجابة
اجابة صحيحة: BC
السؤال #11
Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements : Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion. Use the Internet as the underlay for the private WAN. Securely transfer the corporate data over the private WAN. Which two technologies should be Incorporated into the
A. S-VTI
B. IPsec
C. DMVPN
D. GET VPN
E. PPTP
عرض الإجابة
اجابة صحيحة: C
السؤال #12
According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?
A. requirement for data-in-motion encryption and 2FA authentication
B. requirement for data-at-rest encryption foe user identification within the VPN terminationhardware
C. categorization of systems, data, and enterprise BYOD assets that are connected to networkzones based on individual privacy needs
D. ensuring that authorized users have high-availability system access from defined zones todefined systems or zones
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever increasing cybersecurity threats. To achieve this, federated identity services have been deployed in the Company XYZ network to provide single sign-on and Multi- Factor Authentication for the applications and services. Which protocol can be used by Company XYZ to provide authentication and authorization services?
A. OAuth2
B. OpenID Connect
C. OpenID
D. SAML2
عرض الإجابة
اجابة صحيحة: AD
السؤال #14
Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements in the design. Which two technologies are recommended? (Choose two.)
A. Design MLAG/MC-LAG into the network wherever possible
B. Configure DHCP snooping on the switches
C. Use root guard
D. Use BPDU guard
E. Use UniDirectional Link Detection
عرض الإجابة
اجابة صحيحة: AE
السؤال #15
Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two )
A. will only work with single-tier headend architecture
B. hub sites must connect to both DMVPN clouds
C. recommended for high availability
D. spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly
E. requires all sites to have dual Internet connections
عرض الإجابة
اجابة صحيحة: BE
السؤال #16
Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #17
An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate this during the migration phase?
A. Deploy controllers, deploy SD-WAN edge router
B. In the data center, and migrate branch sites
C. Migrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers
D. Migrate branch sites, migrate data center WAN routers, and deploy controllers
E. Deploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites
عرض الإجابة
اجابة صحيحة: A
السؤال #18
SD-WAN can be used to provide secure connectivity to remote offices, branch offices, campus networks, data centers, and the cloud over any type of IP-based underlay transport network. Which two statements describe SD WAN solutions? (Choose two.)
A. SD-WAN networks are inherently protected against slow performance
B. Control and data forwarding planes are kept separate
C. Improved operational efficiencies result In cost savings
D. Solutions include centralized orchestration, control, and zero-touch provisioning
E. Solutions allow for variations of commodity and specialized switching hardware
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which BGP feature provides fast convergence?
A. BGP PIC |
B. BGP-EVPN
C. BGP FlowSpec
D. BGP-LS
عرض الإجابة
اجابة صحيحة: A
السؤال #20
An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services If one ISP suffers loss or latency?
A. Cloud onRamp gateway site
B. Cloud onRamp SWG
C. Cloud onRamp
D. Cloud onRamp SaaS
عرض الإجابة
اجابة صحيحة: B
السؤال #21
The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The mam requirements are ZTP support, end-to-end encryption application awareness and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?
A. SD-branch
B. DMVPN with PfR
C. managed SD-WAN
D. SD-WAN
عرض الإجابة
اجابة صحيحة: C
السؤال #22
How must the queue sizes be designed to ensure that an application functions correctly?
A. Each individual device queuing delay in the chain must be less than or equal to the application required delay
B. The queuing delay on every device in the chain must be exactly the same to the application required delay
C. The default queue sizes are good for any deployment as it compensates the serialization delay
D. The sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay
عرض الإجابة
اجابة صحيحة: BD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: