لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?
A. Last cleared
B. Number of packets output
C. CRCs
D. Giants
E. Multicasts
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Within the realm of network security, Zero Trust:
A. prevents attackers from moving laterally through a system
B. allows a server to communicate with outside networks without a firewall
C. block malicious software that is too new to be found in virus definitions
D. stops infected files from being downloaded via websites
عرض الإجابة
اجابة صحيحة: C
السؤال #4
A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not. Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?
A. MAC table
B. Neighbor Discovery Protocol
C. ARP table
D. IPConfig
E. ACL table
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO).
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server
C. Install a network access control agent on the server
D. Deploy a new server to host the application
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A technician needs to configure a routing protocol for an internet-facing edge router. Which of the following routing protocols will the technician MOST likely use?
A. BGP
B. RIPv2
C. OSPF
D. EIGRP
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A network technician is performing tests on a potentially faulty network card that is installed in a server. Which of the following addresses will MOST likely be used during traffic diagnostic tests?
A. 10
B. 127
C. 192
D. 255
عرض الإجابة
اجابة صحيحة: BF
السؤال #9
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 pm. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?
A. Changing the VLAN of the web server
B. Changing the server's IP address
C. Implementing an ACL
D. Instating a rule on the firewall connected to the web server
عرض الإجابة
اجابة صحيحة: CE
السؤال #10
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?
A. 255
B. 255
C. 255
D. 255
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?
A. Virtual network computing
B. Secure Socket Shell
C. In-band connection
D. Site-to-site VPN
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
A. Replication traffic between an on-premises server and a remote backup facility
B. Traffic between VMs running on different hosts
C. Concurrent connections generated by Internet DDoS attacks
D. VPN traffic from remote offices to the datacenter’s VMs
عرض الإجابة
اجابة صحيحة: C
السؤال #13
The following configuration is applied to a DHCP server connected to a VPN concentrator: There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?
A. Decrease the lease duration
B. Reboot the DHCP server
C. Install a new VPN concentrator
D. Configure a new router
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following DNS records works as an alias to another record?
A. AAAA
B. CNAME
C. MX
D. SOA
عرض الإجابة
اجابة صحيحة: B
السؤال #15
A technician is monitoring a network interface and notices the device is dropping packets. The cable and interfaces, however, are in working order. Which of the following is MOST likely the cause?
A. OID duplication
B. MIB mismatch
C. CPU usage
D. Encapsulation errors
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: