لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following protocols should be used when Layer 3 availability is of the highest concern?
A. LACP
B. LDAP
C. FHRP
D. DHCP
عرض الإجابة
اجابة صحيحة: C
السؤال #2
An infrastructure company is implementing a cabling solution to connect sites on multiple continents. Which of the following cable types should the company use for this project?
A. Cat 7
B. Single-mode
C. Multimode
D. Cat 6
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server
C. Install a network access control agent on the server
D. Deploy a new server to host the application
عرض الإجابة
اجابة صحيحة: A
السؤال #4
An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the following is the NEXT best solution to provide services without adding external infrastructure?
A. Fiber
B. Leased line
C. Satellite
D. Metro optical
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which of the following can be used to identify users after an action has occurred?
A. Access control vestibule
B. Cameras
C. Asset tag
D. Motion detectors
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A divide-and-conquer approach is a troubleshooting method that involves breaking a complex problem into smaller and more manageable parts, and then testing each part to isolate the cause of the problem. In this scenario, the technician is using a divide-and- conquer approach by pinging the default gateway and DNS server of the workstation, which are two possible sources of connectivity issues. By pinging these devices, the technician can determine if the problem is related to the local network or the extern
A. A router with only one available LAN port
B. A firewall performing deep packet inspection
C. A hub utilizing jumbo frames
D. A switch using Spanning Tree Protocol
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A network technician 13 troubleshooting a network issue for employees who have reported Issues with speed when accessing a server in another subnet. The server is in another building that is 410ft (125m) away from the employees' building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?
A. The connection type is not rated for that distance
B. A broadcast storm is occurring on the subnet
C. The cable run has interference on it
D. The connection should be made using a Cat 6 cable
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?
A. Security Service Edge
B. Data center interconnect
C. Infrastructure as code
D. Zero trust architecture
عرض الإجابة
اجابة صحيحة: A
السؤال #9
A non-employee was able to enter a server room. Which of the following could have prevented this from happening?
A. A security camera
B. A biometric reader
C. OTP key fob
D. Employee training
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A network technician is configuring a wireless network that consists of multiple APS for better coverage and allows roaming between the APS. Which of the following types of SSIDs should the technician configure?
A. Basic Service Set
B. Independent Basic Service Set
C. Extended Service Set
D. Distribution System Service
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A technician reviews a network performance report and finds a high level of collisions happening on the network. At which of the following layers of the OSI model would these collisions be found?
A. Layer 1
B. Layer 3
C. Layer 4
D. Layer 7
عرض الإجابة
اجابة صحيحة: C
السؤال #12
While using a secure conference call connection over a corporate VPN, a user moves from a cellular connection to a hotel wireless network. Although the wireless connection and the VPN show a connected status, no network connectivity is present. Which of the following is the most likely cause of this issue?
A. MAC filtering is configured on the wireless connection
B. The VPN and the WLAN connection have an encryption protocol mismatch
C. The WLAN is using a captive portal that requires further authentication
D. Wireless client isolation is enforced on the WLAN settings
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?
A. Data link
B. Network
C. Transport
D. Session
عرض الإجابة
اجابة صحيحة: AB
السؤال #14
A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting process, the administrator performs a traceout from the client to the server, and also from the server to the client. While comparing the outputs, the administrator notes they show different hops between the hosts. Which of the following BEST explains these findings?
A. Asymmetric routing
B. A routing loop
C. A switch loop
D. An incorrect gateway
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which of the following is a requirement when certifying a network cabling as Cat 7?
A. Ensure the patch panel is certified for the same category
B. Limit 10Gb transmissions to 180ft (55m)
C. Use F-type connectors on the network terminations
D. Ensure the termination standard is TIA/EIA-568-A
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?
A. An increase in network security using encryption and packet encapsulation
B. A network expansion caused by an increase in the number of branch locations to the headquarters
C. A mandatory requirement to increase the deployment of an SDWAN network
D. An improvement in network efficiency by increasing the useful packet payload
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Which of the following is a valid alternative to maintain a deployed proxy technology while saving physical space in the data center by moving the network service to the virtualization infrastructure?
A. NFV
B. SDWAN
C. Networking as code
D. VIP
عرض الإجابة
اجابة صحيحة: B
السؤال #18
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?
A. MTTR
B. MOU
C. NDA
D. SLA
عرض الإجابة
اجابة صحيحة: B
السؤال #19
Which of the following would be BEST suited for a long cable run with a 40Gbps bandwidth?
A. Cat 5e
B. Cat 6a
C. Cat 7
D. Cat 8
عرض الإجابة
اجابة صحيحة: D
السؤال #20
A network engineer is troubleshooting application connectivity issues between a server and a client. The network engineer needs to view the certificate exchange between the two hosts. Which of the following tools should the network engineer use?
A. dig
B. tcpdump
C. nmap
D. traceroute
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which of the following ports should a network administrator enable for encrypted log-in to a network switch?
A. 22
B. 23
C. 80
D. 123
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Following the implementation of a BYOO policy. some users in a high-density environment report slowness over the wireless connection. Some wireless controller reports indicate high latency and airtime contention. Which of the following is the most probable root cause?
A. The AP is configured with 2
B. The AP is configured with 2
C. The AP is configured with 5Ghz frequency with band-steering capabi?ties
D. The AP is configured with 5Ghz frequenc
E. which the new personal devices do not support
عرض الإجابة
اجابة صحيحة: D
السؤال #23
A technician uses a badge to enter a security checkpoint on a corporate campus. An unknown individual quickly walks in behind the technician without speaking. Which of the following types of attacks did the technician experience?
A. Tailgating
B. Evil twin
C. On-path
D. Piggybacking
عرض الإجابة
اجابة صحيحة: A
السؤال #24
After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?
A. Check to see if the end connections were wrapped in copper tape before terminating
B. Use passthrough modular crimping plugs instead of traditional crimping plugs
C. Connect the RX/TX wires to different pins
D. Run a speed test on a device that can only achieve 100Mbps speeds
عرض الإجابة
اجابة صحيحة: A
السؤال #25
A network administrator walks into a data center and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
A. Evil twin
B. Tailgating
C. Piggybacking
D. Shoulder surfing
عرض الإجابة
اجابة صحيحة: C
السؤال #26
A customer has an attached USB printer that needs to be shared with other users. The desktop team set up printer sharing. Now, the network technician needs to obtain the necessary information about the PC and share it with other users so they can connect to the printer. Which of the following commands should the technician use to get the required information? (Select TWO).
A. arp
B. route
C. netstat
D. tcpdump
E. hostname
F. ipconfig
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?
A. Establish a theory
B. Implement the solution
C. Create a plan of action
D. Verify functionality
عرض الإجابة
اجابة صحيحة: B
السؤال #28
The lack of a formal process to grant network permissions to different profiles of employees and contractors is leading to an increasing number of security incidents Non-uniform and overly permissive network accesses are being granted. Which of the following would be the MOST appropriate method to improve the security of the environment?
A. Change the default permissions to implicit deny
B. Configure uniform ACLs to employees and NAC for contractors
C. Deploy an RDP server to centralize the access to the network
D. Implement role-based access control
عرض الإجابة
اجابة صحيحة: B
السؤال #29
An employee working in a warehouse facility is experiencing interruptions in mobile applications while walking around the facility. According to a recent site survey, the WLAN comprises autonomous APs that are directly connected to the internet, providing adequate signal coverage. Which of the following is the BEST solution to improve network stability?
A. Implement client roaming using an extended service deployment employing a wireless controller
B. Remove omnidirectional antennas and adopt a directional bridge
C. Ensure all APs of the warehouse support MIMO and Wi-Fi 4
D. Verify that the level of EIRP power settings is set to the maximum permitted by regulations
عرض الإجابة
اجابة صحيحة: C
السؤال #30
A technician is consolidating a topology with multiple SSlDs into one unique SSiD deployment. Which of the following features will be possible after this new configuration?
A. Seamless roaming
B. Basic service set
C. WPA
D. MU-MIMO
عرض الإجابة
اجابة صحيحة: A
السؤال #31
A technician is deploying a new SSID for an industrial control system. The control devices require the network to use encryption that employs TKIP and a symmetrical password to connect. Which of the following should the technician configure to ensure compatibility with the control devices?
A. WPA2-Enterprise
B. WPA-Enterprise
C. WPA-PSK
D. WPA2-PSK
عرض الإجابة
اجابة صحيحة: D
السؤال #32
A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?
A. Port mirroring
B. Flow data
C. Syslog entries
D. SNMP traps
عرض الإجابة
اجابة صحيحة: D
السؤال #33
An attacker sends more connection requests than a server can handle, causing the server to crash- Which of the following types of attacks is this an example of?
A. ARP poisoning
B. Denial-of-service
C. MAC flooding
D. On-path
عرض الإجابة
اجابة صحيحة: BC
السؤال #34
Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?
A. Client-to-site VPN
B. Clientless VPN
C. RDP
D. Site-to-site VPN
E. SSH
عرض الإجابة
اجابة صحيحة: A
السؤال #35
A company has wireless APS that were deployed with 802.11g. A network engineer has noticed more frequent reports of wireless performance issues during the lunch hour in comparison to the rest of the day. The engineer thinks bandwidth consumption will increase while users are on their breaks, but network utilization logs do not show increased bandwidth numbers. Which Of the following would MOST likely resolve this issue?
A. Adding more wireless APS
B. Increasing power settings to expand coverage
C. Configuring the APS to be compatible with 802
D. Changing the wireless channel used
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: