لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?
A. Changing the default password
B. Blocking inbound SSH connections
C. Removing the gateway from the network configuration
D. Restricting physical access to the switch
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A network administrator is trying to create a subnet, which is the most efficient size possible, for 31 laptops. Which of the following network subnets would be best in this situation?
A. 10
B. 10
C. 10
D. 10
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A junior network engineer is trying to change the native network ID to a non-default value that can then be applied consistently throughout the network environment. Which of the following issues is the engineer attempting to prevent?
A. DDoS
B. ARP spoofing
C. VLAN hopping
D. Rogue DHCP
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A large metropolitan city is looking to standardize the ability tor police department laptops to connect to the city government's VPN The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers Latency and overall bandwidth needs are not high priorities. Which of the following would BEST meet the city's needs?
A. 5G
B. LTE
C. Wi-Fi 4
D. Wi-Fi 5
E. Wi-Fi 6
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which of the following protocols can be routed?
A. FCoE
B. Fibre Channel
C. iSCSl
D. NetBEUI
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Select TWO).
A. SNMPv3
B. SSh
C. Telnet
D. IPSec
E. ESP
F. Syslog
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A network technician is troubleshooting a port channel issue. When logging in to one of the switches, the technician sees the following information displayed: Native VLAN mismatch detected on interface g0/1 Which of the following layers of the OSI model is most likely to be where the issue resides?
A. Layer 2
B. Layer 3
C. Layer 5
D. Layer 6
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A network consultant is installing a new wireless network with the following specifications: 5GHz 1,300Mbps 20/40/80MHz Which of the following standards should the network consultant use?
A. 802
B. 802
C. 802
D. 802
عرض الإجابة
اجابة صحيحة: A
السؤال #9
A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?
A. dig
B. nmap
C. tracert
D. nslookup
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?
A. MAC security
B. Content filtering
C. Screened subnet
D. Perimeter network
عرض الإجابة
اجابة صحيحة: D
السؤال #11
A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?
A. ipconfig
B. netstat
C. tracert
D. ping
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which of the following fiber connector types is the most likely to be used on a network interface card?
A. LC
B. SC
C. ST
D. MPO
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which of the following combinations of single cables and transceivers will allow a server to have 40GB of network throughput? (Select two).
A. SFP+
B. SFP
C. QSFP+
D. Multimode
E. Cat 6a
F. Cat5e
عرض الإجابة
اجابة صحيحة: C
السؤال #14
A network technician wants to find the shortest path from one node to every other node in the network. Which of the following algorithms will provide the FASTEST convergence time?
A. A static algorithm
B. A link-state algorithm
C. A distance-vector algorithm
D. A path-vector algorithm
عرض الإجابة
اجابة صحيحة: BD
السؤال #15
Which of the following is the most accurate NTP time source that is capable of being accessed across a network connection?
A. Stratum 0 device
B. Stratum 1 device
C. Stratum 7 device
D. Stratum 16 device
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A technician is expanding a wireless network and adding new access points. The company requires that each access point broadcast the same SSID. Which of the following should the technician implement for this requirement?
A. MIMO
B. Roaming
C. Channel bonding
D. Extended service set
عرض الإجابة
اجابة صحيحة: A
السؤال #17
A customer reports there is no access to resources following the replacement of switches. A technician goes to the site to examine the configuration and discovers redundant links between two switches. Which of the following is the reason the network is not functional?
A. The ARP cache has become corrupt
B. CSMA/CD protocols have failed
C. STP is not configured
D. The switches are incompatible models
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which of the following most likely occurs when an attacker is between the target and a legitimate server?
A. IP spoofing
B. VLAN hopping
C. Rogue DHCP
D. On-path attack
عرض الإجابة
اجابة صحيحة: B
السؤال #19
A user cannot connect to the network, although others in the office are unaffected. The network technician sees that the link lights on the NIC are not on. The technician needs to check which switchport the user is connected to, but the cabling is not labeled. Which of the following is the best way for the technician to find where the computer is connected?
A. Look up the computer's IP address in the switch ARP table
B. Use a cable tester to trace the cable
C. Look up the computer's MAC address in the switch CAM table
D. Use a tone generator to trace the cable
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: