لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 pm. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?
A. Changing the VLAN of the web server
B. Changing the server's IP address
C. Implementing an ACL
D. Instating a rule on the firewall connected to the web server
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?
A. VLAN mismatch
B. Transceiver mismatch
C. Latency
D. DHCP exhaustion
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Within the realm of network security, Zero Trust:
A. prevents attackers from moving laterally through a system
B. allows a server to communicate with outside networks without a firewall
C. block malicious software that is too new to be found in virus definitions
D. stops infected files from being downloaded via websites
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: Which of the following should a wireless technician do NEXT to troubleshoot this issue?
A. Reconfigure the channels to reduce overlap
B. Replace the omni antennas with directional antennas
C. Update the SSIDs on all the APs
D. Decrease power in AP 3 and AP 4
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which of the following is used to prioritize Internet usage per application and per user on the network?
A. Bandwidth management
B. Load balance routing
C. Border Gateway Protocol
D. Administrative distance
عرض الإجابة
اجابة صحيحة: A
السؤال #6
An ARP request is broadcasted and sends the following request. ''Who is 192.168.1.200? Tell 192.168.1.55'' At which of the following layers of the OSI model does this request operate?
A. Application
B. Data link
C. Transport
D. Network
E. Session
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?
A. Coaxial
B. Single-mode fiber
C. Cat 6e
D. Multimode fiber
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
A. SSO
B. TACACS+
C. Zero Trust
D. Separation of duties
E. Multifactor authentication
عرض الإجابة
اجابة صحيحة: C
السؤال #9
An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?
A. MS-CHAP
B. RADIUS
C. LDAPS
D. RSTP
عرض الإجابة
اجابة صحيحة: A
السؤال #10
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
A. 802
B. STP
C. Flow control
D. CSMA/CD
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which of the following is used to track and document various types of known vulnerabilities?
A. CVE
B. Penetration testing
C. Zero-day
D. SIEM
E. Least privilege
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)
A. CPU usage
B. Memory
C. Temperature
D. Bandwidth
E. Latency
F. Jitter
عرض الإجابة
اجابة صحيحة: B
السؤال #13
An IT technician is working on a support ticket regarding an unreachable web-site. The technician has utilized the ping command to the website, but the site is still unreachable. Which of the following tools should the technician use NEXT?
A. ipconfig
B. tracert
C. arp
D. netstat
عرض الإجابة
اجابة صحيحة: C
السؤال #14
An administrator would like to have two servers at different geographical locations provide fault tolerance and high performance while appearing as one URL to users. Which of the following should the administrator implement?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Warm site
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?
A. Layer 3 switch
B. VPN headend
C. Next-generation firewall
D. Proxy server
E. Intrusion prevention
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?
A. Mandatory access control
B. User-based permissions
C. Role-based access
D. Least privilege
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Which of the following technologies provides a failover mechanism for the default gateway?
A. FHRP
B. LACP
C. OSPF
D. STP
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
A. Replication traffic between an on-premises server and a remote backup facility
B. Traffic between VMs running on different hosts
C. Concurrent connections generated by Internet DDoS attacks
D. VPN traffic from remote offices to the datacenter’s VMs
عرض الإجابة
اجابة صحيحة: AB

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: