لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)
A. informational
B. emergency C
E. debug
F. error
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which type of information resides on a DHCP server?
A. a list of the available IP addresses in a pool
B. a list of public IP addresses and their corresponding names C
عرض الإجابة
اجابة صحيحة: C
السؤال #3
In which two ways does a password manager reduce the chance of a hacker stealing a user's password? (Choose two.)
A. It encourages users to create stronger passwords
B. It uses an internal firewall to protect the password repository from unauthorized access C
E. It protects against keystroke logging on a compromised device or web site
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which API is used in controller-based architectures to interact with edge devices?
A. southbound
B. overlay C
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which feature is enabled by this configuration? A.static NAT translation
B. a DHCP pool C
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
Which statement about the interface that generated the output is true?
A. A syslog message is generated when a violation occurs
B. One secure MAC address is manually configured on the interface
عرض الإجابة
اجابة صحيحة: A
السؤال #7
An extended ACL has been configured and applied to router R2. The configuration failed to work as intended. Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two.)
A. Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic
B. Add a "permit ip any any" statement to the beginning of ACL 101 for allowed traffic
عرض الإجابة
اجابة صحيحة: D
السؤال #8
What makes Cisco DNA Center different from traditional network management applications and their management of networks?
A. Its modular design allows someone to implement different versions to meet the specific needs of an organization
B. It only supports auto-discovery of network elements in a greenfield deployment
عرض الإجابة
اجابة صحيحة: B
السؤال #9
An administrator configures four switches for local authentication using passwords that are stored as a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements? A.SW1 B.SW2 C.SW3 D.SW4
An administrator configures four switches for local authentication using passwords that are stored as a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure
عرض الإجابة
اجابة صحيحة: CD
السؤال #10
Which type of wireless encryption is used for WPA2 in preshared key mode? A.AES-128 B.TKIP with RC4 C.AES-256 D.RC4
Which type of wireless encryption is used for WPA2 in preshared key mode? A. ES-128 B
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which command is used to verify the DHCP relay agent address that has been set up on your Cisco IOS router?
A. show ip interface brief B
E. show interface
F. show ip dhcp pool
عرض الإجابة
اجابة صحيحة: D
السؤال #12
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user's smartphone being lost or stolen?
A. The application requires the user to enter a PIN before it provides the second factor
B. The application requires an administrator password to reactivate after a configured interval C
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which NAT term is defined as a group of addresses available for NAT use?
A. NAT pool B
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which Cisco IOS command will indicate that interface GigabitEthernet 0/0 is configured via DHCP?
A. show ip interface GigabitEthernet 0/0 dhcp
B. show interface GigabitEthernet 0/0 C
E. show ip interface GigabitEthernet 0/0 brief
عرض الإجابة
اجابة صحيحة: D
السؤال #15
What is the effect of this configuration?
A. The switch discards all ingress ARP traffic with invalid MAC-to-IP address bindings
B. All ARP packets are dropped by the switch
عرض الإجابة
اجابة صحيحة: A
السؤال #16
When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format? A.6 B.8 C.12 D.18
When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format? A. B
عرض الإجابة
اجابة صحيحة: A
السؤال #17
If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1? A.DHCP client
B. access point C
عرض الإجابة
اجابة صحيحة: BC
السؤال #18
Which two statements about the interface that generated the output are true? (Choose two.)
A. learned MAC addresses are deleted after five minutes of inactivity
B. the interface is error-disabled if packets arrive from a new unknown source address C
E. the security violation counter increments if packets arrive from a new unknown source address
عرض الإجابة
اجابة صحيحة: AE
السؤال #19
How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?
A. Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management
B. Cisco DNA Center device management can deploy a network more quickly than traditional campus device management
عرض الإجابة
اجابة صحيحة: B
السؤال #20
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two.)
A. Configure the ports as trunk ports
B. Enable the Cisco Discovery Protocol
E. Configure the ports in an EtherChannel
عرض الإجابة
اجابة صحيحة: C
السؤال #21
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two.)
A. The ACL is empty
B. A matching permit statement is too broadly defined C
E. A matching permit statement is too high in the access list
عرض الإجابة
اجابة صحيحة: C
السؤال #22
An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe, but the link may have contained malicious code. Which type of security program is in place?
A. user awareness
B. brute force attack C
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Which device performs stateful inspection of traffic? A.switch B.firewall C.access point D.wireless controller
Which device performs stateful inspection of traffic? A. witch B
عرض الإجابة
اجابة صحيحة: C
السؤال #24
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two.)
A. decimal B
E. base64
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Which technology must be implemented to configure network device monitoring with the highest security? A.IP SLA B.syslog C.NetFlow D.SNMPv3
Which technology must be implemented to configure network device monitoring with the highest security? A. P SLA B
عرض الإجابة
اجابة صحيحة: D
السؤال #26
The service password-encryption command is entered on a router. What is the effect of this configuration?
A. restricts unauthorized users from viewing clear-text passwords in the running configuration
B. prevents network administrators from configuring clear-text passwords C
عرض الإجابة
اجابة صحيحة: A
السؤال #27
Which effete does the aaa new-model configuration command have?
A. It enables AAA services on the device
B. It configures the device to connect to a RADIUS server for AAA
عرض الإجابة
اجابة صحيحة: C
السؤال #28
Which goal is achieved by the implementation of private IPv4 addressing on a network?
A. provides an added level of protection against Internet exposure
B. provides a reduction in size of the forwarding table on network routers C
عرض الإجابة
اجابة صحيحة: B
السؤال #29
Which purpose does a northbound API serve in a controller-based networking architecture?
A. facilitates communication between the controller and the applications
B. reports device errors to a controller C
عرض الإجابة
اجابة صحيحة: C
السؤال #30
What will happen if you configure the logging trap debug command on a router?
A. It causes the router to send messages with lower severity levels to the syslog server
B. It causes the router to send all messages with the severity levels Warning, Error, Critical, and Emergency to the syslog server C
عرض الإجابة
اجابة صحيحة: C
السؤال #31
What is the primary difference between AAA authentication and authorization?
A. Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform
B. Authentication controls the system processes a user can access, and authorization logs the activities the user initiates
عرض الإجابة
اجابة صحيحة: D
السؤال #32
Which type of attack is mitigated by dynamic ARP inspection?
A. DDoS B
عرض الإجابة
اجابة صحيحة: BE
السؤال #33
What are two southbound APIs? (Choose two.) A.Thrift B.DSC C.CORBA D.NETCONF
E. OpenFlow
عرض الإجابة
اجابة صحيحة: C
السؤال #34
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks? A.TACACS
B. CPU ACL C
عرض الإجابة
اجابة صحيحة: D
السؤال #35
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
A. enable secret
B. enable password C
عرض الإجابة
اجابة صحيحة: C
السؤال #36
After you apply the given configuration to a router, the DHCP clients behind the device cannot communicate with hosts outside of their subnet. Which action is most likely to correct the problem?
A. Configure the dns server on the same subnet as the clients
B. Activate the dhcp pool C
عرض الإجابة
اجابة صحيحة: C
السؤال #37
Which rule does the DHCP server use when there is an IP address conflict?
A. The address is removed from the pool until the conflict is resolved
B. The address remains in the pool until the conflict is resolved
E. The IP will be shown, even after the conflict is resolved
عرض الإجابة
اجابة صحيحة: D
السؤال #38
What are two roles of Domain Name Services (DNS)? (Choose two.)
A. builds a flat structure of DNS names for more efficient IP operations
B. encrypts network Traffic as it travels across a WAN by default C
E. allows a single host name to be shared across more than one IP address
عرض الإجابة
اجابة صحيحة: AB
السؤال #39
What is the effect of this configuration?
A. The switch port remains administratively down until the interface is connected to another switch
B. Dynamic ARP Inspection is disabled because the ARP ACL is missing
عرض الإجابة
اجابة صحيحة: A
السؤال #40
Which command can you enter to allow Telnet to be supported in addition to SSH?
A. transport input telnet ssh
B. transport input telnet C
عرض الإجابة
اجابة صحيحة: D
السؤال #41
What is the authoritative source for an address lookup? A.a recursive DNS search
B. the operating system cache C
عرض الإجابة
اجابة صحيحة: BD
السؤال #42
Which set of actions satisfy the requirement for multifactor authentication?
A. The user enters a user name and password, and then re-enters the credentials on a second screen
B. The user swipes a key fob, then clicks through an email link
عرض الإجابة
اجابة صحيحة: A
السؤال #43
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
A. enable dynamic MAC address learning
B. implement static MAC addressing C
عرض الإجابة
اجابة صحيحة: A
السؤال #44
An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine? A.platform-as-a-service B.network-as-a-service C.software-as-a-service D.infrastructure-as-a-service
An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine? A
عرض الإجابة
اجابة صحيحة: A
السؤال #45
Which two events occur on the interface, if packets from an unknown Source address arrive after the interface learns the maximum number of secure MAC address? (Choose two.)
A. The security violation counter dose not increment
B. The port LED turns off C
E. The interface drops traffic from unknown MAC address
عرض الإجابة
اجابة صحيحة: C
السؤال #46
An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement? A.WEP B.AES C.RC4 D.TKIP
An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement? A
عرض الإجابة
اجابة صحيحة: C
السؤال #47
What mechanism carries multicast traffic between remote sites and supports encryption? A.ISATAP B.IPsec over ISATAP C.GRE D.GRE over IPsec
What mechanism carries multicast traffic between remote sites and supports encryption? A. SATAP B
عرض الإجابة
اجابة صحيحة: A
السؤال #48
When a site-to-site VPN is used, which protocol is responsible for the transport of user data? A.IPsec B.IKEv1 C.MD5 D.IKEv2
When a site-to-site VPN is used, which protocol is responsible for the transport of user data? A. Psec B
عرض الإجابة
اجابة صحيحة: B
السؤال #49
Which configuration is needed to generate an RSA key for SSH on a router?
A. Configure VTY access
B. Configure the version of SSH
عرض الإجابة
اجابة صحيحة: DE
السؤال #50
Which command can you enter to determine the addresses that have been assigned on a DHCP Server?
A. Show ip DHCP database
B. Show ip DHCP pool
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: