لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following would most likely affect design considerations when building out an IDF?
A. The source panel amperage
B. The fire suppression system
C. The humidity levels
D. The cable transmission speeds
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A VOIP phone is plugged in to a port but cannot receive calls. Which Of the following needs to be done on the port to address the issue?
A. Trunk all VLANs on the port
B. Configure the native VLAN
C. Tag the traffic to voice VLAN
D. Disable VLANs
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A user calls the IT department to report being unable to log in after locking the computer The user resets the password, but later in the day the user is again unable to log in after locking the computer Which of the following attacks against the user IS MOST likely taking place?
A. Brute-force
B. On-path
C. Deauthentication
D. Phishing
عرض الإجابة
اجابة صحيحة: B
السؤال #4
In which of the following components do routing protocols belong in a software-defined network?
A. Infrastructure layer
B. Control layer
C. Application layer
D. Management plane
عرض الإجابة
اجابة صحيحة: D
السؤال #5
During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue?
A. Traps
B. MIB
C. OID
D. Baselines
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which of the following is the best action to take before sending a network router to be recycled as electronic waste?
A. Turn on port security
B. Shred the switch hard drive
C. Back up and erase the configuration
D. Remove the company asset ID tag
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following DNS records maps an alias to a true name?
A. AAAA
B. NS
C. TXT
D. CNAME
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which of the following redundant devices creates broadcast storms when connected together on a high-availability network?
A. Switches
B. Routers
C. Access points
D. Servers
عرض الإجابة
اجابة صحيحة: A
السؤال #9
A user in a branch office reports that access to all files has been lost after receiving a new PC. All other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router, but the machine cannot ping the router. Which of the following is MOST likely the cause of the incident?
A. Incorrect subnet mask
B. Incorrect DNS server
C. Incorrect IP class
D. Incorrect TCP port
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A user calls the help desk to report being unable to reach a file server. The technician logs in to the user's computer and verifies that pings fall to respond back when trying to reach the file server. Which of the following would BEST help the technician verify whether the file server is reachable?
A. netstat
B. ipconfig
C. nslookup
D. traceroute
عرض الإجابة
اجابة صحيحة: D
السؤال #11
A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements?
A. FTP
B. TFTP
C. SMTP
D. SFTP
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A network technician is investigating a trouble ticket for a user who does not have network connectivity. All patch cables between the wall jacks and computers in the building were upgraded over the weekend from Cat 5 to Cat 6. The newly installed cable is crimped with a TIA/EIA 568A on one end and a TIA/EIA 568B on the other end. Which of the following should the technician do to MOST likely fix the issue?
A. Ensure the switchport has PoE enabled
B. Crimp the cable as a straight-through cable
C. Ensure the switchport has STP enabled
D. Crimp the cable as a rollover cable
عرض الإجابة
اجابة صحيحة: B
السؤال #13
A customer connects a firewall to an ISP router that translates traffic destined for the internet. The customer can connect to the internet but not to the remote site. Which of the following will verify the status of NAT?
A. tcpdump
B. nmap
C. ipconfig
D. tracert
عرض الإجابة
اجابة صحيحة: C
السؤال #14
A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?
A. Ethernet cable type
B. Voltage
C. Transceiver compatibility
D. DHCP addressing
عرض الإجابة
اجابة صحيحة: D
السؤال #15
A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?
A. 80
B. 80
C. 80
D. 80
عرض الإجابة
اجابة صحيحة: C
السؤال #16
A technician is trying to install a VolP phone, but the phone is not turning on. The technician checks the cable gong from the phone to the switch, and the cable is good. Which of the following actions IS needed for this phone to work?
A. Add a POE injector
B. Enable MDIX
C. Use a crossover cable
D. Reconfigure the port
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Which of the following focuses on application delivery?
A. DaaS
B. laaS
C. SaaS
D. PaaS
عرض الإجابة
اجابة صحيحة: D
السؤال #18
A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?
A. Warnings
B. Notifications
C. Alert
D. Errors
عرض الإجابة
اجابة صحيحة: B
السؤال #19
Which of the following is required for hosts to receive DHCP addresses from a server that is located on a different subnet?
A. DHCP scope
B. DHCP snooping
C. DHCP reservations
D. DHCP relay
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Which of the following devices Is used to configure and centrally manage access points Installed at different locations?
A. Wireless controller
B. Load balancer
C. Proxy server
D. VPN concentrator
عرض الإجابة
اجابة صحيحة: CD
السؤال #21
An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
A. Implementing enterprise authentication
B. Requiring the use of PSKs
C. Configuring a captive portal for users
D. Enforcing wired equivalent protection
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
A. Secure web access to internal corporate resources
B. Upgrade security via the use of an NFV technology
C. Connect two data centers across the internet
D. Increase VPN availability by using a SDWAN technology
عرض الإجابة
اجابة صحيحة: A
السؤال #23
A network administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?
A. A physical interface used for trunking logical ports
B. A physical interface used for management access
C. A logical interface used for the routing of VLANs
D. A logical interface used when the number of physical ports is insufficient
عرض الإجابة
اجابة صحيحة: C
السؤال #24
A customer needs six usable IP addresses. Which of the following best meets this requirement?
A. 255
B. 255
C. 255
D. 255
عرض الإجابة
اجابة صحيحة: C
السؤال #25
A company is moving to a new building designed with a guest waiting area that has existing network ports. Which of the following practices would BEST secure the network?
A. Ensure all guests sign an NDA
B. Disable unneeded switchports in the area
C. Lower the radio strength to reduce Wi-Fi coverage in the waiting area
D. Enable MAC filtering to block unknown hardware addresses
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: