لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Select TWO).
A. 22
B. 23
C. 69
D. 443
E. 587
F. 8080
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform?
A. Validate the findings in a top-to-bottom approach
B. Duplicate the issue, if possible
C. Establish a plan of action to resolve the issue
D. Document the findings and actions
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure?
A. Business continuity plan
B. Onboarding and offboarding policies
C. Acceptable use policy
D. System life cycle
E. Change management
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which of the following should be used to manage outside cables that need to be routed to various multimode uplinks?
A. Fiber distribution panel
B. 110 punchdown block
C. PDU
D. TIA/EIA-568A patch bay
E. Cat 6 patch panel
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install?
A. 110
B. 66
C. Bix
D. Krone
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Users within a corporate network need to connect to the Internet, but corporate network policy does not allow direct connections. Which of the following is MOST likely to be used?
A. Proxy server
B. VPN client
C. Bridge
D. VLAN
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A firewall administrator observes log entries of traffic being allowed to a web server on port 80 and port 443. The policy for this server is to only allow traffic on port 443. The firewall administrator needs to investigate how this change occurred to prevent a reoccurrence. Which of the following should the firewall administrator do next?
A. Consult the firewall audit logs
B. Change the policy to allow port 80
C. Remove the server object from the firewall policy
D. Check the network baseline
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A security engineer is trying to determine whether an internal server was accessed by hosts on the internet. The internal server was shut down during the investigation Which of the following will the engineer review to determine whether the internal server had an unauthorized access attempt?
A. The server's syslog
B. The NetFlow statistics
C. The firewall logs
D. The audit logs on the core switch
عرض الإجابة
اجابة صحيحة: C
السؤال #9
A technician is investigating why a PC cannot reach a file server with the IP address 192.168.8.129. Given the following TCP/IP network configuration: Which of the following configurations on the PC is incorrect?
A. Subnet mask
B. IPv4 address
C. Default gateway
D. IPv6 address
عرض الإجابة
اجابة صحيحة: C
السؤال #10
A company has a geographically remote office. In order to connect to the internet, the company has decided to use a satellite WAN link. Which of the following is the GREATEST concern for this type of connection?
A. Duplex
B. Collisions
C. Jitter
D. Encapsulation
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A technician received a report that some users in a large, 30-floor building are having intermittent connectivity issues. Users on each floor have stable connectivity, but do not have connectivity to other floors. Which of the following devices is MOST likely causing the issue?
A. User devices
B. Edge devices
C. Access switch
D. Core switch
عرض الإجابة
اجابة صحيحة: B
السؤال #12
A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing?
A. Multifactor authentication
B. Single sign-on
C. RADIUS
D. VPN
عرض الإجابة
اجابة صحيحة: C
السؤال #13
A Chief Executive Officer and a network administrator came to an agreement With a vendor to purchase new equipment for the data center A document was drafted so all parties would be Informed about the scope of the project before It started. Which of the following terms BEST describes the document used?
A. Contract
B. Project charter
C. Memorandum of understanding
D. Non-disclosure agreement
عرض الإجابة
اجابة صحيحة: E
السؤال #14
A network administrator needs to monitor traffic on a specific port on a switch. Which of the following should the administrator configure to accomplish the task?
A. Port security
B. Port tagging
C. Port mirroring
D. Media access control
عرض الإجابة
اجابة صحيحة: D
السؤال #15
A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified m the SLA. Which of the following would BEST help measure the throughput?
A. iPerf
B. Ping
C. NetFlow
D. Netstat
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A user stores large graphic files. The lime required to transfer the files to the server is excessive due to network congestion. The user's budget does not allow for the current switches to be replaced. Which of the following can be used to provide FASTER transfer times?
A. Half duplex
B. Jumbo frames
C. LACP
D. 802
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which of the following network cables involves bouncing light off of protective cladding?
A. Twinaxial
B. Coaxial
C. Single-mode
D. Multimode
عرض الإجابة
اجابة صحيحة: B
السؤال #18
A network administrator is installing a new server in the data center. The administrator is concerned the amount of traffic generated will exceed 1GB. and higher- throughput NiCs are not available for installation. Which of the following is the BEST solution for this issue?
A. Install an additional NIC and configure LACP
B. Remove some of the applications from the server
C. Configure the NIC to use fun duplex
D. Configure port mirroring to send traffic to another server
E. Install a SSD to decrease data processing time
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which of the following is a benefit of the spine-and-leaf network topology?
A. Increased network security
B. Stable network latency
C. Simplified network management
D. Eliminated need for inter-VLAN routing
عرض الإجابة
اجابة صحيحة: C
السؤال #20
A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue?
A. Flow control
B. Jumbo frames
C. Duplex
D. Port mirroring
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which of the following allows for an devices within a network to share a highly reliable time source?
A. NTP
B. SNMP
C. SIP
D. DNS
عرض الإجابة
اجابة صحيحة: D
السؤال #22
A network technician is attempting to increase throughput by configuring link port aggregation between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following is the BEST choice concerning speed and duplex for all interfaces that are participating in the link aggregation?
A. Half duplex and 1GB speed
B. Full duplex and 1GB speed
C. Half duplex and 10OMB speed
D. Full duplex and 100MB speed
عرض الإجابة
اجابة صحيحة: AC
السؤال #23
To access production applications and data, developers must first connect remotely to a different server From there, the developers are able to access production data Which of the following does this BEST represent?
A. A management plane
B. A proxy server
C. An out-of-band management device
D. A site-to-site VPN
E. A jump box
عرض الإجابة
اجابة صحيحة: C
السؤال #24
A security team would like to use a system in an isolated network to record the actions of potential attackers. Which of the following solutions is the security team implementing?
A. Perimeter network
B. Honeypot
C. Zero trust infrastructure
D. Network segmentation
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Which of the following can be used to aggregate logs from different devices and would make analysis less difficult?
A. Syslog
B. SIEM
C. Event logs
D. NetFlow
عرض الإجابة
اجابة صحيحة: B
السؤال #26
Which of the following should a network administrator configure when adding OT devices to an organization's architecture?
A. Honeynet
B. Data-at-rest encryption
C. Time-based authentication
D. Network segmentation
عرض الإجابة
اجابة صحيحة: C
السؤال #27
A company wants to invest in new hardware for the core network infrastructure. The management team requires that the infrastructure be capable of being repaired in less than 60 minutes if any major part fails. Which of the following metrics is MOST likely associated with this requirement?
A. RPO
B. MTTR
C. FHRP
D. MTBF
عرض الإجابة
اجابة صحيحة: D
السؤال #28
A network team is getting reports that air conditioning is out in an IDF. The team would like to determine whether additional network issues are occurring. Which of the following should the network team do?
A. Confirm that memory usage on the network devices in the IDF is normal
B. Access network baseline data for references to an air conditioning issue
C. Verify severity levels on the corporate syslog server
D. Check for SNMP traps from a network device in the IDF
E. Review interface statistics looking for cyclic redundancy errors
عرض الإجابة
اجابة صحيحة: A
السؤال #29
A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?
A. RST
B. FIN
C. ICMP Time Exceeded
D. Redirect
عرض الإجابة
اجابة صحيحة: A
السؤال #30
A technician completed troubleshooting and was able to fix an issue. Which of the following is the BEST method the technician can use to pass along the exact steps other technicians should follow in case the issue arises again?
A. Use change management to build a database
B. Send an email stating that the issue is resolved
C. Document the lessons learned
D. Close the ticket and inform the users
عرض الإجابة
اجابة صحيحة: D
السؤال #31
An IT intern moved the location of a WAP from one conference room to another. The WAP was unable to boot following the move. Which of the following should be used to fix the issue?
A. Antenna
B. WLAN controller
C. Media converter
D. PoE injector
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: