لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A user calls the help desk to report being unable to reach a file server. The technician logs in to the user's computer and verifies that pings fall to respond back when trying to reach the file server. Which of the following would BEST help the technician verify whether the file server is reachable?
A. netstat
B. ipconfig
C. nslookup
D. traceroute
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which of the following protocols is widely used in large-scale enterprise networks to support complex networks with multiple routers and balance traffic load on multiple links?
A. OSPF
B. RIPv2
C. QoS
D. STP
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following topologies requires me MOST connections when designing a network?
A. Mesh
B. Star
C. Bus
D. Ring
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which of the following is most likely to have the HIGHEST latency while being the most accessible?
A. Satellite
B. DSL
C. Cable
D. 4G
عرض الإجابة
اجابة صحيحة: B
السؤال #5
A network administrator installed a new data and VoIP network. Users are now experiencing poor call quality when making calls. Which of the following should the administrator do to increase VoIP performance?
A. Configure a voice VLAN
B. Configure LACP on all VoIP phones
C. Configure PoE on the network
D. Configure jumbo frames on the network
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?
A. VLAN hopping
B. Evil twin
C. DNS poisoning
D. Social engineering
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?
A. Active-active
B. Warm
C. Cold
D. Cloud
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A Network engineer is investigating issues on a Layer 2 Switch. The department typically snares a Switchport during meetings for presentations, but atter the first user Shares, no Other users can connect. Which Of the following is MOST likely related to this issue?
A. Spanning Tree Protocol is enabled on the switch
B. VLAN trunking is enabled on the switch
C. Port security is configured on the switch
D. Dynamic ARP inspection is configured on the switch
عرض الإجابة
اجابة صحيحة: B
السؤال #9
A network administrator is creating a subnet for a remote office that has 53 network devices. An additional requirement is to use the most efficient subnet. Which of the following CIDR notations indicates the appropriate number of IP addresses with the LEAST amount of unused addresses? (Choose Correct option and give explanation directly from CompTIA Network+ Study guide or documents)
A. /24
B. /26
C. /28
D. /32
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A network technician receives a support ticket about an employee who has misplaced a company-owned cell phone that contains private company information. Which of the following actions should the network technician take to prevent data loss?
A. Disable the user account
B. Lock the phone
C. Turn off the service
D. Execute remote wipe
عرض الإجابة
اجابة صحيحة: B
السؤال #11
An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the Mowing sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF?
A. Temperature
B. Humidity
C. Smoke
D. Electrical
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal?
A. Link aggregation
B. Jumbo frames
C. Port security
D. Flow control
E. Lower FTP port
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following topologies requites the MOST connections when designing a network?
A. Mesh
B. Star
C. Bus
D. Ring
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following devices would be used to extend the range of a wireless network?
A. A repeater
B. A media converter
C. A router
D. A switch
عرض الإجابة
اجابة صحيحة: B
السؤال #15
During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue?
A. Traps
B. MIB
C. OID
D. Baselines
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which of the following is a security flaw in an application or network?
A. A threat
B. A vulnerability
C. An exploit
D. A risk
عرض الإجابة
اجابة صحيحة: B
السؤال #17
A technician discovered that some information on the local database server was changed during a tile transfer to a remote server. Which of the following should concern the technician the MOST?
A. Confidentiality
B. Integrity
C. DDoS
D. On-path attack
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation coordination, and termination of the call?
A. Session
B. Physical
C. Transport
D. Data link
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: