لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?
A. The link is improperly terminated
B. One of the devices is misconfigured
C. The cable length is excessive
D. One of the devices has a hardware issue
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following is the physical topology for an Ethernet LAN?
A. Bus
B. Ring
C. Mesh
D. Star
عرض الإجابة
اجابة صحيحة: A
السؤال #3
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?
A. TTL
B. MX
C. TXT
D. SOA
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following devices would be used to manage a corporate WLAN?
A. A wireless NAS
B. A wireless bridge
C. A wireless router
D. A wireless controller
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Anetwork administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover?
A. VIP
B. NAT
C. APIPA
D. IPv6 tunneling
E. Broadcast IP
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?
A. A smart card
B. A key fob
C. An employee badge
D. A door lock
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which of the following would be BEST to use to detect a MAC spoofing attack?
A. Internet Control MessageProtocol
B. Reverse Address Resolution Protocol
C. Dynamic Host Configuration Protocol
D. Internet Message Access Protocol
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A network technician is reviewing an upcoming project's requirements to implement laaS. Which of the following should the technician consider?
A. Software installation processes
B. Type of database to be installed
C. Operating system maintenance
D. Server hardware requirements
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are not being received?
A. The network device is not configured to log that level to the syslog server
B. The network device was down and could not send the event
C. The syslog server is not compatible with the network device
D. The syslog server did not have the correct MIB loaded to receive the message
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue?
A. Standard operating procedures
B. Configuration baseline documents
C. Work instructions
D. Change management documentation
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which of the following service models would MOST likely be used toreplace on-premises servers with a cloud solution?
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS)
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?
A. Confirm the patch's MD5 hash prior to the upgrade
B. Schedule the switches to reboot after an appropriate amount of time
C. Download each switch's current configuration before the upgrade
D. Utilize FTP rather than TFTP to upload the patch
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
A. Fault tolerance
B. Quality of service
C. Load balancing
D. Port aggregation
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which of the following protocol types describes secure communication on port 443?
A. ICMP
B. UDP
C. TCP
D. IP
عرض الإجابة
اجابة صحيحة: D
السؤال #15
An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?
A. A network tap
B. A proxy server
C. A UTM appliance
D. A content filter
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?
A. Virtual network computing
B. Secure Socket Shell
C. In-band connection
D. Site-to-site VPN
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
A. Firewall
B. AP
C. Proxyserver
D. IDS
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which of the following transceiver types can support up to 40Gbps?
A. SFP+
B. QSFP+
C. QSFP
D. SFP
عرض الإجابة
اجابة صحيحة: B
السؤال #19
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?
A. Enable a management access list
B. Disable access to unnecessary services
C. Configure a stronger password for access
D. Disable access to remote management
E. Use an out-of-band access method
عرض الإجابة
اجابة صحيحة: B
السؤال #20
An engineer is configuring redundant network links between switches. Which of thefollowing should the engineer enable to prevent network stability issues?
A. 802
B. STP
C. Flow control
D. CSMA/CD
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?
A. A Layer 3 switch
B. A proxy server
C. A NGFW
D. A WLAN controller
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
A. A backup of a large video presentation to cloud storage for archival purposes
B. A duplication of a hosted virtual server to another physical server for redundancy
C. A download of navigation data to a portable device for offline access
D. A query from an IoT device to a cloud-hosted server for a firmware update
عرض الإجابة
اجابة صحيحة: AB
السؤال #23
An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology Which of the following is the number of additional network connections needed?
A. 5
B. 7
C. 10
D. 15
عرض الإجابة
اجابة صحيحة: E
السؤال #24
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?
A. Install load balancers
B. Install more switches
C. Decrease the number of VLANs
D. Reduce the lease time
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allowsthe enforcement of this policy?
A. Motion detection
B. Access control vestibules
C. Smart lockers
D. Cameras
عرض الإجابة
اجابة صحيحة: C
السؤال #26
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: