لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting?
A. Detection
B. Recovery
C. Identification
D. Prevention
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A network security engineer locates an unapproved wireless bridge connected to the corporate LAN that is broadcasting a hidden SSID, providing unauthenticated access to internal resources. Which of the following types of attacks BEST describes this finding?
A. Rogue access point Most Voted
B. Evil twin
C. ARP spoofing
D. VLAN hopping
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified m the SLA. Which of the following would BEST help measure the throughput?
A. iPerf
B. Ping
C. NetFlow
D. Netstat
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Changing the default passwords
D. Configuring an access control list
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?
A. Add another AP
B. Disable the 2
C. Enable channel bonding
D. Upgrade to WiFi 5
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue?
A. Flow control
B. Jumbo frames
C. Duplex
D. Port mirroring
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A client utilizes mobile tablets to view high-resolution images and videos via Wi-Fi within a corporate office building. The previous administrator installed multiple high-density APs with Wi-Fi 5, providing maximum coverage, but the measured performance is still below expected levels. Which of the following would provide the BEST solution?
A. Channel bonding
B. EiRP power settings
C. Antenna polarization
D. A directional antenna
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A network engineer developed a plan of action to resolve an ongoing issue. Which of the following steps should the engineer take NEXT?
A. Verify full system functionality and implement preventative measures
B. Implement the solution to resolve the problem
C. Document findings, actions, outcomes, and lessons learned
D. Establish a theory of probable cause
عرض الإجابة
اجابة صحيحة: BF
السؤال #9
A company's web server is hosted at a local ISP. This is an example of:
A. allocation
B. an on-premises data center
C. a branch office
D. a cloud provider
عرض الإجابة
اجابة صحيحة: D
السؤال #10
An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics In the switch's CLI, the administrator discovers the uplink Is at 100% utilization However, the administrator is unsure how to Identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?
A. SNMP
B. Traps
C. Syslog
D. NetFlow
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A network team is getting reports that air conditioning is out in an IDF. The team would like to determine whether additional network issues are occurring. Which of the following should the network team do?
A. Confirm that memory usage on the network devices in the IDF is normal
B. Access network baseline data for references to an air conditioning issue
C. Verify severity levels on the corporate syslog server
D. Check for SNMP traps from a network device in the IDF
E. Review interface statistics looking for cyclic redundancy errors
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A network administrator is designing a wireless network. The administrator must ensure a rented office space has a sufficient signal. Reducing exposure to the wireless network is important, but it is secondary to the primary objective. Which of the following would MOST likely facilitate the correct accessibility to the Wi-Fi network?
A. Polarization
B. Channel utilization
C. Channel bonding
D. Antenna type
E. MU-MIMO
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?
A. Elastic computing
B. Scalable networking
C. Hybrid deployment
D. Multitenant hosting
عرض الإجابة
اجابة صحيحة: A
السؤال #14
An employee working in a warehouse facility is experiencing interruptions in mobile applications while walking around the facility. According to a recent site survey, the WLAN comprises autonomous APs that are directly connected to the internet, providing adequate signal coverage. Which of the following is the BEST solution to improve network stability?
A. Implement client roaming using an extended service deployment employing a wireless controller
B. Remove omnidirectional antennas and adopt a directional bridge
C. Ensure all APs of the warehouse support MIMO and Wi-Fi 4
D. Verify that the level of EIRP power settings is set to the maximum permitted by regulations
عرض الإجابة
اجابة صحيحة: B
السؤال #15
At which of the following OSI model layers does an IMAP client run?
A. Layer 2
B. Layer 4
C. Layer 6
D. Layer 7
عرض الإجابة
اجابة صحيحة: AC
السؤال #16
A network administrator is trying to identify a device that is having issues connecting to a switchport. Which of the following would BEST help identify the issue?
A. A syslog server
B. Change management records
C. A rack diagram
D. The security log
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond?
A. Virus
B. Botnet
C. ARP spooling
D. DOoS
عرض الإجابة
اجابة صحيحة: D
السؤال #18
A network engineer needs to create a subnet that has the capacity for five VLANs. with the following number of clients lo be allowed on each: Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?
A. 10
B. 10
C. 10
D. 10
عرض الإجابة
اجابة صحيحة: A
السؤال #19
A customer wants to log in t o a vendor's server using a web browser on a laptop. Which of the following would require the LEAST configuration to allow encrypted access to the server?
A. Secure Sockets Layer
B. Site-to-site VPN
C. Remote desktop gateway
D. Client-to-site VPN
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Which of the following would be the MOST likely attack used to bypass an access control vestibule?
A. Tailgating
B. Phishing
C. Evil twin
D. Brute-force
عرض الإجابة
اجابة صحيحة: A
السؤال #21
A PC user who is on a local network reports very slow speeds when accessing files on the network server The user's PC Is connecting, but file downloads are very slow when compared to other users' download speeds The PC's NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A. Releasing and renewing the PC's IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache
عرض الإجابة
اجابة صحيحة: D
السؤال #22
A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing?
A. Disabling unneeded switchports
B. Changing the default VLAN
C. Configuring DHCP snooping
D. Writing ACLs to prevent access to the switch
عرض الإجابة
اجابة صحيحة: C
السؤال #23
An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?
A. Private VLANs
B. Access control lists
C. Firewalls
D. Control plane policing
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which of the following DHCP settings would be used to ensure a device gets the same IP address each time it is connected to the network?
A. Scope options
B. Reservation
C. Exclusion
D. Relay
E. Pool
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: