لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An on-call network technician receives an automated email alert stating that a power supply on a firewall has just powered down. Which of the following protocols would best allow for this level of detailed device monitoring?
A. TFTP
B. TLS
C. SSL
D. SNMP
عرض الإجابة
اجابة صحيحة: C
السؤال #2
During an incident, an analyst sends reports regularly to the investigation and leadership teams. Which of the following best describes how Pll should be safeguarded during an incident?
A. Implement data encryption and store the data so only the company has access
B. Ensure permissions are limited to the investigation team and encrypt the data
C. Implement data encryption and create a standardized procedure for deleting data that is no longer needed
D. Ensure the permissions are open only to the company
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A Wi-Fi network was recently deployed in a new, multilevel budding. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues?
A. Perform a site survey
B. Review the AP placement
C. Monitor channel utilization
D. Test cable attenuation
عرض الإجابة
اجابة صحيحة: D
السؤال #4
When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does this BEST represent?
A. SSO
B. Zero Trust
C. VPN
D. Role-based access control
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Network traffic is being compromised by DNS poisoning every time a company's router is connected to the internet. The network team detects a non-authorized DNS server being assigned to the network clients and remediates the incident by setting a trusted DNS server, but the issue occurs again after internet exposure. Which of the following best practices should be implemented on the router?
A. Change the device's default password
B. Disable router advertisement guard
C. Activate control plane policing
D. Disable unneeded network services
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?
A. VLAN hopping
B. Evil twin
C. DNS poisoning
D. Social engineering
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following situations would require an engineer to configure subinterfaces?
A. In a router-on-a-stick deployment with multiple VLANs
B. In order to enable inter-VLAN routing on a multilayer switch
C. When configuring VLAN trunk links between switches
D. After connecting a router that does not support 802
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which of the following documents is MOST likely to be associated with identifying and documenting critical applications?
A. Software development life-cycle policy
B. User acceptance testing plan
C. Change management policy
D. Business continuity plan
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An ISP is providing Internet to a retail store and has terminated its point of connection using a standard Cat 6 pin-out Which of me following terminations should the technician use when running a cable from the ISP's port lo the front desk?
A. F-type connector
B. TIA/E1A-56S-B
C. LC
D. SC
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which of the following would be used to forward requests and replies between a DHCP server and client?
A. Relay
B. Lease
C. Scope
D. Range
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A PC user who is on a local network reports very slow speeds when accessing files on the network server The user's PC Is connecting, but file downloads are very slow when compared to other users' download speeds The PC's NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A. Releasing and renewing the PC's IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO).
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack
عرض الإجابة
اجابة صحيحة: BE
السؤال #13
A company's publicly accessible servers are connected to a switch between the company's ISP-connected router and the firewall in front of the company network. The firewall is stateful, and the router is running an ACL. Which of the following best describes the area between the router and the firewall?
A. Untrusted zone
B. Screened subnet
C. Trusted zone
D. Private VLAN
عرض الإجابة
اجابة صحيحة: C
السؤال #14
A bank installed a new smart TV to stream online video services, but the smart TV was not able to connect to the branch Wi-Fi. The next day. a technician was able to connect the TV to the Wi-Fi, but a bank laptop lost network access at the same time. Which of the following is the MOST likely cause?
A. DHCP scope exhaustion
B. AP configuration reset
C. Hidden SSID
D. Channel overlap
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations?
A. 2
B. 4
C. 19
D. 100
عرض الإجابة
اجابة صحيحة: C
السؤال #16
While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), although it is connected to a gigabit switch. While reviewing the interface information in the switch CLI, the technician notes the port is operating at IOOFD but Shows many RX and TX errors. The technician moves the computer to another switchport and experiences the same issues. Which of the following is MOST likely the cause of the low data rate and port errors?
A. Bad switch ports
B. Duplex issues
C. Cable length
D. Incorrect pinout
عرض الإجابة
اجابة صحيحة: D
السؤال #17
A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of me connectivity failure?
A. Incorrect VLAN
B. DNS failure
C. DHCP scope exhaustion
D. Incorrect gateway
عرض الإجابة
اجابة صحيحة: AE
السؤال #18
A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not come on. Which of the following should a technician try first to troubleshoot this issue?
A. Reverse the fibers
B. Reterminate the fibers
C. Verify the fiber size
D. Examine the cable runs for visual faults
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which of the following describes when an active exploit is used to gain access to a network?
A. Penetration testing
B. Vulnerability testing
C. Risk assessment
D. Posture assessment
E. Baseline testing
عرض الإجابة
اجابة صحيحة: BC
السؤال #20
A company needs a redundant link to provide a channel to the management network in an incident response scenario. Which of the following remote access methods provides the BEST solution?
A. Out-of-band access
B. Split-tunnel connections
C. Virtual network computing
D. Remote desktop gateways
عرض الإجابة
اجابة صحيحة: A
السؤال #21
A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?
A. Mesh
B. Ad hoc
C. Point-to-point
D. Infrastructure
عرض الإجابة
اجابة صحيحة: B
السؤال #22
A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Select TWO).
A. Data loss prevention policy
B. BYOD policy
C. Acceptable use policy
D. Non-disclosure agreement
E. Disaster recovery plan
F. Physical network diagram
عرض الإجابة
اجابة صحيحة: A
السؤال #23
A wireless technician is working to upgrade the wireless infrastructure for a company. The company currently uses the 802.11g wireless standard on all access points. The company requires backward compatibility and is requesting the least expensive solution. Which of the following should the technician recommend to the company?
A. 802
B. 802
C. 802Hax
D. 802
عرض الإجابة
اجابة صحيحة: B
السؤال #24
Due to space constraints in an IDF, a network administrator can only a do a single switch to accommodate three data networks. The administrator needs a configuration that will allow each device to access its expected network without additional connections. The configuration must also allow each device to access the rest of the network. Which of the following should the administrator do to meet these requirements? (Select TWO).
A. Untag the three VLANs across the uplink
B. Tag an individual VLAN across the uplink
C. Untag an individual VLAN per device port
D. Tag an individual VLAN per device port
E. Tag the three VLANs across the uplink
F. Tag the three VLANs per device port
عرض الإجابة
اجابة صحيحة: B
السؤال #25
A business purchased redundant internet connectivity from two separate ISPs. Which of the following is the business MOST likely implementing?
A. NIC teaming
B. Hot site
C. Multipathing
D. Load balancing
عرض الإجابة
اجابة صحيحة: A
السؤال #26
While troubleshooting a network, a VoIP systems engineer discovers a significant inconsistency in the amount of time required for data to reach its destination and return. Which of the following terms best describes this issue?
A. Bandwidth
B. Latency
C. Jitter
D. Throughput
عرض الإجابة
اجابة صحيحة: C
السؤال #27
The Chief Executive Officer of a company wants to ensure business operations are not disrupted in the event of a disaster. The solution must have fully redundant equipment, real-time synchronization, and zero data loss. Which Of the following should be prepared?
A. Cloud site
B. Warm site
C. Hot site
D. Cold site
عرض الإجابة
اجابة صحيحة: A
السؤال #28
Which of the following is an advantage of using the cloud as a redundant data center?
A. The process of changing cloud providers is easy
B. Better security for company data is provided
C. The initial capital expenses are lower
D. The need for backups is eliminated
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Which of the following is a characteristic of the application layer?
A. It relies upon other layers for packet delivery
B. It checks independently for packet loss
C. It encrypts data in transit
D. It performs address translation
عرض الإجابة
اجابة صحيحة: A
السؤال #30
A PC and a network server have no network connectivity, and a help desk technician is attempting to resolve the issue. The technician plans to run a constant ping command from a Windows workstation while testing various possible reasons for the connectivity issue. Which of the following should the technician use?
A. ping —w
B. ping -i
C. ping —s
D. ping —t
عرض الإجابة
اجابة صحيحة: D
السؤال #31
Which of the following technologies would MOST likely De used to prevent the loss of connection between a virtual server and network storage devices?
A. Multipathing
B. VRRP
C. Port aggregation
D. NIC teaming
عرض الإجابة
اجابة صحيحة: B
السؤال #32
A desktop support department has observed slow wireless speeds for a new line of laptops using the organization's standard image. No other devices have experienced the same issue. Which of the following should the network administrator recommend troubleshooting FIRST to resolve this issue?
A. Increasing wireless signal power
B. Installing a new WAP
C. Changing the protocol associated to the SSID
D. Updating the device wireless drivers
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: