لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which metric does the Open Shortest Path First (OSPF) routing protocol use for optimal path calculation?
A. MTU
B. Cost
C. Delay
D. Hop count
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following is NOT true of APIC-EM?
A. It supports greenfield but not brownfield deployments
B. It provides a single point for network automation
C. It saves time and cost
D. It is open and programmable
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which is the valid IP address range that can be assigned to hosts on the subnet that includes the address 172.16.4.6/23?
A. 172
B. 172
C. 172
D. 172
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which Cisco IOS command will display the following partial output?
A. show ip
B. show ip route
C. show ip route summary
D. show route summary
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Your company's network must make the most efficient use of the IP address space. In the following diagram, the circles define separate network segments. The requirements of each network segment are given in the diagram. (Click the Exhibit(s) button.) Users complain of connectivity issues. You need to discover the problems with the network configuration. What are the three problems with the network diagram? (Choose three.)
A. The 172
B. The 172
C. The 172
D. The 172
E. Interface fa0/2 has an IP address that belongs to the 172
F. Interface fa0/4 has an IP address that belongs to the 172
G. Interface fa0/3 has an IP address outside the 172
عرض الإجابة
اجابة صحيحة: AFG
السؤال #6
Which service is denoted by TCP/UDP port number 53?
A. Domain Name Service (DNS)
B. File Transfer Protocol (FTP)
C. Telnet
D. HTTP
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What command disables 802.1x authentication on a port and permits traffic without authentication?
A. dot1x port-control disable
B. dot1x port-control force-unauthorized
C. dot1x port-control auto
D. dot1x port-control force-authorized
عرض الإجابة
اجابة صحيحة: D
السؤال #8
What switch security configuration requires AAA to be configured on the switch?
A. VACL
B. 802
C. Private VLAN
D. port security
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Given the following output, which statements can be determined to be true? (Choose three.) RouterA2# show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 192.168.23.2 1 FULL/BDR 00:00:29 10.24.4.2 FastEthernet1/0 192.168.45.2 2 FULL/BDR 00:00:24 10.1.0.5 FastEthernet0/0 192.168.85.1 1 FULL/- 00:00:33 10.6.4.10 Serial0/1 192.168.90.3 1 FULL/DR 00:00:32 10.5.5.2 FastEthernet0/1 192.168.67.3 1 FULL/DR 00:00:20 10.4.9.20 FastEthernet0/2 192.168.90.1 1 FULL/BDR 00:00:23 10.5.5.4 FastEthernet0
A. This router is the DR for subnet 10
B. The DR for the network connected to Fa0/0 has an interface priority greater than 2
C. The DR for the network connected to Fa0/1 has a router ID of 10
D. The DR for the serial subnet is 192
E. This router is neither the DR nor the BDR for the Fa0/1 subnet
F. RouterA2 is connected to more than one multi-access network
عرض الإجابة
اجابة صحيحة: BEF
السؤال #10
Which Cisco Internetwork Operating System (IOS) command is used to encrypt passwords on Cisco routers?
A. password secure
B. service encryption-password
C. service password-encryption
D. enable password
عرض الإجابة
اجابة صحيحة: C
السؤال #11
As part of a new initiative to tighten the security of your Cisco devices, you have configured the firewall to restrict access to the devices from the outside. What would be other recommended ways of protecting the integrity of the device configuration files on the devices while ensuring your continued ability to manage the devices remotely? (Choose all that apply.)
A. encrypt the configuration files
B. use SSH to connect to the devices for management
C. prevent the loss of administrator passwords by disabling their encryption
D. disable the VTY ports on the devices
E. use an encrypted password for VTY access
عرض الإجابة
اجابة صحيحة: BE
السؤال #12
Host A is configured for DHCP, but it is not receiving an IP address when it powers up. What is the most likely cause? (Click the Exhibit(s) button to view the network diagram.)
A. The DHCP server is on the wrong subnet
B. Routers do not forward broadcast traffic
C. The DHCP server is misconfigured
D. Port security is enabled on the switch
عرض الإجابة
اجابة صحيحة: B
السؤال #13
What will be the effect of executing the following command on port F0/1? switch(config-if)# switchport port-security mac-address 00C0.35F0.8301
A. The command statically defines the MAC address of 00c0
B. The command expressly prohibits the MAC address of 00c0
C. The command configures an inbound access control list on port F0/1 limiting traffic to the IP address of the host
D. The command encrypts all traffic on the port from the MAC address of 00c0
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following cables would be used to connect a router to a switch?
A. v
B. crossover
C. rollover
D. straight-through
عرض الإجابة
اجابة صحيحة: D
السؤال #15
You are configuring a Cisco router. Which command would you use to convey a message regarding the remote access security policy of your organization to a user logging into the router?
A. hostname
B. banner motd
C. description
D. boot system
E. terminal monitor
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which of the following technologies should be used to prevent a switching loop if a switch is connected to a port configured for PortFast?
A. RSTP
B. BPDU Guard
C. Root Guard
D. PVST
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which of the following are Wide Area Network (WAN) protocols? (Choose three.)
A. PPP
B. AAA
C. WEP
D. STP
E. HDLC
F. Frame Relay
عرض الإجابة
اجابة صحيحة: AEF
السؤال #18
Examine the partial output of the show ip interface command below. What is the subnet broadcast address of the LAN connected to the router from which the command was executed?
A. 192
B. 192
C. 1
D. 1
عرض الإجابة
اجابة صحيحة: A
السؤال #19
You are implementing IP SLA and would like to use it to measure hop-by-hop response time between a Cisco router and any IP device on the network. Which of the following IP SLA operations would you use for this?
A. ICMP path echo operation
B. Internet Control Message Protocol Echo Operation
C. UDP Jitter Operation for VoIP
D. UDP Jitter Operation
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Which of the following are classless routing protocols? (Choose four.)
A. Open Shortest Path First (OSPF)
B. Enhanced Interior Gateway Routing Protocol (EIGRP)
C. Interior Gateway Routing Protocol (IGRP)
D. Routing Information Protocol version 1 (RIPv1)
E. Border Gateway Protocol (BGP)
F. Routing Information Protocol version 2 (RIPv2)
عرض الإجابة
اجابة صحيحة: ABEF
السؤال #21
You have been asked to examine the following output to identify any security problems with the router. Its configuration is shown: What problems exist? (Choose all that apply.)
A. unencrypted privileged mode password
B. inappropriate wording in the banner message
C. weak password on the VTY line
D. Telnet users will not be prompted for a password
عرض الإجابة
اجابة صحيحة: BD
السؤال #22
Which Cisco command will display the version and configuration data for Secure Shell (SSH)?
A. show ssh
B. show ip ssh
C. debug ssh
D. debug ip ssh
عرض الإجابة
اجابة صحيحة: B
السؤال #23
You are configuring a serial link between a Cisco router and a router produced by another vendor. What would be the advantages of using Point to Point Protocol (PPP) over High Level Data Link Control (HDLC) in this scenario?
A. HDLC has a proprietary "type" field that may be incompatible with equipment from other vendors
B. HDLC is not available on non-Cisco routers
C. PPP is faster
D. PPP performs error checking
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which two features do Cisco routers offer to mitigate distributed denial-of-service (DDoS) attacks? (Choose two.)
A. Anti-DDoS guard
B. Scatter tracing
C. Access control lists (ACLs)
D. Flow control
E. Rate limiting
عرض الإجابة
اجابة صحيحة: CE
السؤال #25
Which command is used on a Catalyst 2950 series switch to enable basic port security on the interface?
A. set port-security
B. switchport port-security
C. set port-security enable
D. switchport port-security enable
عرض الإجابة
اجابة صحيحة: B
السؤال #26
You have implemented the following IP SLA configuration, as shown in the following partial output of the show run command: ip sla 1 dns cow.cisco.com name-server 10.52.128.30 ip sla schedule 1 start-time now Which of the following statements is true of this configuration?
A. It will find the response time to resolve the DNS name cow
B. It will find the response time to connect to the DNS server at 10
C. It will start in one minute
D. It will gather data from one minute
عرض الإجابة
اجابة صحيحة: A
السؤال #27
Which statement is supported by the following output? router# show ip protocols Routing Protocol is "eigrp 3" Sending updates every 90 seconds, next due in 24 seconds <> EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 3 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 172.160.72.0 192.168.14.0 <>
A. EIGRP supports load-balancing over three equal-cost paths
B. EIGRP supports load-balancing over three unequal-cost paths
C. EIGRP supports load-balancing over four equal-cost paths
D. EIGRP supports load-balancing over four unequal-cost paths
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Which Cisco Internetwork Operating System (IOS) command can be used to configure the location of the configuration file?
A. boot buffersize
B. configure
C. boot config
D. service config
عرض الإجابة
اجابة صحيحة: C
السؤال #29
You are the network administrator for your company. You want to use both IPv6 and IPv4 applications in the network. You also want to ensure that routers can route both IPv6 and IPv4 packets. Which deployment model should be implemented to accomplish the task?
A. IPv6 over IPv4 tunnels
B. IPv6 over dedicated Wide Area Network (WAN) links
C. Dual-Stack Backbones
D. Protocol translation
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Which type of Dynamic Host Configuration Protocol (DHCP) transmission is used by a host to forward a DHCPDISCOVER packet to locate a DHCP server on the network?
A. unicast
B. broadcast
C. multicast
D. anycast
عرض الإجابة
اجابة صحيحة: B
السؤال #31
Which type of switching process requires a switch to wait for the entire frame to be received before forwarding it to a destination port?
A. store and forward
B. cut-through
C. fragment free
D. frame-forward
عرض الإجابة
اجابة صحيحة: A
السؤال #32
Which of the following are NOT valid IPv6 addresses? (Choose all that apply.)
A. 225
B. ::FFFF:10
C. ::
D. 2001:0:42:3:ff::1
E. fe80:2030:31:24
F. 2001:42:4:0:0:1:34:0
G. 2003:dead:bef:4dad:ab33:46:abab:62
عرض الإجابة
اجابة صحيحة: AE
السؤال #33
Router 5 has four interfaces. The networks hosted on each interface are as follows: Fa0/1 192.168.5.4/29 Fa0/2 192.168.6.0/24 Fa0/3 192.168.7.0/24 S0/0 172.16.5.0/24 You execute the following commands on the router: Router5(config)# router bgp 20 Router5(config-router)# network 192.168.5.0 Router5(config-router)# network 192.168.6.0 Router5(config-router)# network 192.168.7.0 Router5(config-router)# network 172.16.5.0 Router5(config-router)# neighbor 172.16.5.2 remote-as 50 Router5(config-router)# aggregate
A. 192
B. 172
C. 192
D. 192
E. none of these will be present
F. only network addresses beginning with 192 will be present
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #34
Refer to the following configuration on a Cisco router to allow Telnet access to remote users: Router(config)#line vty 0 2 Router(config-line)#login Router(config-line)#password guest How many users can Telnet into this router at the same time?
A. 0
B. 1
C. 2
D. 3
E. 5
عرض الإجابة
اجابة صحيحة: D
السؤال #35
Which commands would be used to enable Enhanced Interior Gateway Routing Protocol (EIGRP) on a router, and configure the IP addresses 10.2.2.2 and 192.168.1.1 as a part of complete EIGRP configuration? (Choose three.)
A. router eigrp 10
B. router eigrp
C. network 10
D. network 10
E. network 192
F. network 192
عرض الإجابة
اجابة صحيحة: ADE
السؤال #36
Your assistant has been assigned the task of configuring one end of a WAN link between two offices. The link is a serial connection and the router on the other end is a non-Cisco router. The router in the other office has an IP address of 192.168.8.6/24. The connection will not come up, so you ask your assistant to show you the commands he configured on the Cisco router. The commands he executed are shown below. Ciscorouter(config)# interface serial0/0 Ciscorouter(config-if)# ip address 192.168.8.5 255.255.
A. Ciscorouter(config-if)# no ip address 192
B. Ciscorouter(config-if)# encapsulation ppp
C. Ciscorouter(config-if)# encapsulation ansi
D. Ciscorouter(config-if)# authentication chap
عرض الإجابة
اجابة صحيحة: B
السؤال #37
Which Internet Control Message Protocol (ICMP) message is sent by a host in the network to test connectivity with another host?
A. ICMP redirect message
B. ICMP echo-request message
C. ICMP time-exceeded message
D. ICMP destination-unreachable message
عرض الإجابة
اجابة صحيحة: B
السؤال #38
You have implemented SNMP v3 in your network. After making the configuration changes, you find that technicians in the TECHS group cannot access the MIB. You execute the show run command and receive the following output that relates to SNMP: What is preventing the TECHS group from viewing the MIB?
A. The presence of the keyword priv in the command creating the RESTRICTED group
B. A mismatch between the authentication mechanism and the encryption type in the command creating the TECHS user
C. The absence of an access list defining the stations that can used by the TECHS group
D. The presence of the keyword auth in the command creating the TECHS user
عرض الإجابة
اجابة صحيحة: C
السؤال #39
You are working with an Internet Service Provider (ISP) as network manager. A corporate client approaches you to lease a public IP subnet that can accommodate 250 users. You have assigned him the 192.25.27.0 subnet. What subnet mask should be assigned to this IP address so that it can accommodate the number of users required by the corporate client?
A. 255
B. 255
C. 255
D. 255
عرض الإجابة
اجابة صحيحة: A
السؤال #40
Which of the following are characteristics of Enhanced Interior Gateway Routing Protocol (EIGRP)? (Choose all that apply.)
A. Requires a hierarchical physical topology
B. Does not require a hierarchical physical topology
C. Uses Diffusing Update Algorithm (DUAL) to provide loop prevention
D. Uses Bellman-Ford algorithm to provide loop prevention
E. Supports Message-Digest Algorithm 5 (MD5) authentication
F. Does not support Message-Digest Algorithm 5 (MD5) authentication
G. Can differentiate between internal and external routes
H. Uses a 32-bit metric
عرض الإجابة
اجابة صحيحة: BCEG

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: