لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?
A. DNS poisoning
B. On-path
C. IP spoofing
D. Rogue DHCP
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A technician is tasked with setting up a mail server and a DNS server. The mail port should be secured and have the ability to transfer large files. Which of the following ports should be opened? (Select TWO).
A. 22
B. 53
C. 110
D. 389
E. 995
F. 3389
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering
عرض الإجابة
اجابة صحيحة: C
السؤال #4
A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not. Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?
A. MAC table
B. Neighbor Discovery Protocol
C. ARP table
D. IPConfig
E. ACL table
عرض الإجابة
اجابة صحيحة: C
السؤال #5
A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue?
A. Standard operating procedures
B. Configuration baseline documents
C. Work instructions
D. Change management documentation
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A PC user who is on a local network reports very slow speeds when accessing files on the network server The user's PC Is connecting, but file downloads are very slow when compared to other users' download speeds The PC's NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A. Releasing and renewing the PC's IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache
عرض الإجابة
اجابة صحيحة: B
السؤال #7
A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue?
A. Enable IGMP snooping on the switches
B. Implement another DHCP server
C. Reconfigure port tagging for the video traffic
D. Change the SSID of the APs
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number?
A. EIGRP
B. BGP
C. IPv6
D. MPLS
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which of the following DHCP settings would be used to ensure a device gets the same IP address each time it is connected to the network?
A. Scope options
B. Reservation
C. Exclusion
D. Relay
E. Pool
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A security engineer is installing a new IOS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do?
A. Install a network tap for the IDS
B. Configure ACLs to route traffic to the IDS
C. Install an additional NIC into the IDS
D. Install a loopback adapter for the IDS
E. Add an additional route on the router for the IDS
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?
A. 80
B. 80
C. 80
D. 80
عرض الإجابة
اجابة صحيحة: A
السؤال #12
An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report. The tool was configured to scan using the following information: Network address: 172.28.16.0 CIDR: /22 The engineer collected the following information from the client workstation: IP address: 172.28.17.206 Subnet mask: 255.255.252.0 Which of the following MOST likely
A. The scanned network range is incorrect
B. The subnet mask on the client is misconfigured
C. The workstation has a firewall enabled
D. The tool is unable to scan remote networks
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which of the following protocols uses Dijkstra’s algorithm to calculate the LOWEST cost between routers?
A. RIP
B. OSPF
C. BGP
D. EIGRP
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A network administrator responds to a support ticket that was submitted by a customer who is having issues connecting to a website inside of the company network The administrator verities that the customer could not connect to a website using a URL Which of the following troubleshooting steps would be BEST for the administrator to take?
A. Check for certificate issues
B. Contact the ISP
C. Attempt to connect to the site via IP address
D. Check the NTP configuration
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which of the following is conducted frequently to maintain an updated list of a system's weaknesses?
A. Penetration test
B. Posture assessment
C. Risk assessment
D. Vulnerability scan
عرض الإجابة
اجابة صحيحة: B
السؤال #16
A network engineer is designing a wireless network that has the following requirements: ? Network speed must be higher than 100Mbps ? Must use the 2.4GHz and 5GHz bands Which of the following 802.11 standards should the engineer select?
A. 802
B. 802
C. 802
D. 802
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Which of the following records can be used to track the number of changes on a DNS zone?
A. SOA
B. SRV
C. PTR
D. NS
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
A. Secure web access to internal corporate resources
B. Upgrade security via the use of an NFV technology
C. Connect two data centers across the internet
D. Increase VPN availability by using a SDWAN technology
عرض الإجابة
اجابة صحيحة: C
السؤال #19
A network technician is installing new software on a Windows-based server in a different geographical location. Which of the following would be BEST for the technician to use to perform this task?
A. RDP
B. SSH
C. FTP
D. DNS
عرض الإجابة
اجابة صحيحة: A
السؤال #20
A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server
C. Install a network access control agent on the server
D. Deploy a new server to host the application
عرض الإجابة
اجابة صحيحة: A
السؤال #21
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?
A. Spanning Tree Protocol
B. Neighbor Discovery Protocol
C. Link Aggregation Control Protocol
D. Address Resolution Protocol
عرض الإجابة
اجابة صحيحة: B
السؤال #22
A medical building offers patients Wi-Fi in the waiting room. Which of the following security features would be the BEST solution to provide secure connections and keep the medical data protected?
A. Isolating the guest network
B. Securing SNMP
C. MAC filtering
D. Disabling unneeded switchports
عرض الإجابة
اجابة صحيحة: B
السؤال #23
A security engineer is trying to determine whether an internal server was accessed by hosts on the internet. The internal server was shut down during the investigation Which of the following will the engineer review to determine whether the internal server had an unauthorized access attempt?
A. The server's syslog
B. The NetFlow statistics
C. The firewall logs
D. The audit logs on the core switch
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic classification
عرض الإجابة
اجابة صحيحة: D
السؤال #25
A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Changing the default passwords
D. Configuring an access control list
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Select TWO).
A. SNMPv3
B. SSh
C. Telnet
D. IPSec
E. ESP
F. Syslog
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Which of the following physical security methods Is the MOST effective to prevent tailgating?
A. Biometrics in an access control vestibule
B. IP cameras with motion detection
C. Smart lockers with tamper protection
D. Badge readers plus a PIN pad
عرض الإجابة
اجابة صحيحة: B
السؤال #28
An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organization's requirements?
A. Cloud site
B. Cold site
C. Warm site
D. Hot site
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: