لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Refer to the exhibit. This output is included at the end of an output that was provided by a device using NETCONF. What does the code show?
A. It shows that the full configuration is being modeled by YANG
B. It shows NETCONF uses remote procedure calls
C. It shows the hostname of the device as rpc-reply
D. It shows that the running configuration is blank
عرض الإجابة
اجابة صحيحة: C
السؤال #2
You are configuring MPLS traffic-engineering tunnels in the core. Which two ways exist for the tunnel path across the core? (Choose two.)
A. The dynamic path option is supported only with IS-IS
B. Tunnels can be configured with dynamic path or explicitly defined path
C. A zero bandwidth tunnel is not a valid option
D. The bandwidth statement creates a “hard” reservation on the link
E. Tunnel links inherit IGP metrics by default unless overridden
عرض الإجابة
اجابة صحيحة: BE
السؤال #3
Why do Cisco MPLS TE tunnels require a link-state routing protocol?
A. The link-state database provides segmentation by area, which improves the path-selection process
B. The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID
C. Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel
D. The tunnel endpoints use the link-state database to evaluate the entire topology and determine the best path
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Which two uses of the YANG data modeling language are true? (Choose two.)
A. It can be used to model the configuration used by NETCONF operations
B. It can be used to access a device by HTTP
C. It can be used to replace the OSI model for troubleshooting
D. It can be used to shape state data of network elements
E. It can be used to replace RESTCONF as a mechanism to install and manipulate configuration
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which service is a VNF role?
A. Network
B. Firewall
C. Storage
D. Compute
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Refer to the exhibit. R1 is connected to two service providers and is under a DDoS attack. Which statement about this design is true if URPF in strict mode is configured on both interfaces?
A. R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface
B. R1 drops destination addresses that are routed to a null interface on the router
C. R1 permits asymmetric routing as long as the AS-PATH attribute entry matches the connected AS
D. R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which two IS-IS parameters must match before two Level 2 peers can form an adjacency? (Choose two.)
A. hello timer setting
B. authentication settings
C. area ID
D. system ID
E. MTU
عرض الإجابة
اجابة صحيحة: BE
السؤال #8
You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tailend router?
A. path
B. tear
C. error
D. reservation
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Refer to the exhibit. What does the REST API command do?
A. It removes the information identified by Descriptions
B. It executes the information specified in Descriptions
C. It retrieves the information requested by Descriptions
D. It displays the information identified by Descriptions
عرض الإجابة
اجابة صحيحة: C
السؤال #10
An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?
A.
B.
C. D
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Refer to the exhibit. You are configuring an administrative domain in the given multi-vendor environment with PIM-SM. Which feature can you implement so that devices can dynamically learn the RP?
A. BSR
B. BIDIP-PIM
C. Auto-RP
D. SSM
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Refer to the exhibits. Which information is provided for traceback analysis when this configuration is applied?
A. source interface
B. packet size distribution
C. IP sub flow cache
D. BGP version
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: