لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An ISP configured an internet connection to provide 20Mbps, but actual data rates are occurring at 10Mbps and causing a significant delay in data transmission. Which of the following specifications should the ISP check?
A. Throughput
B. Latency
C. Bandwidth
D. Jitter
عرض الإجابة
اجابة صحيحة: C
السؤال #2
During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Select TWO).
A. 22
B. 23
C. 69
D. 443
E. 587
F. 8080
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A company is reviewing ways to cut the overall cost of Its IT budget. A network technician suggests removing various computer programs from the IT budget and only providing these programs on an as-needed basis. Which of the following models would meet this requirement?
A. Multitinency
B. laaS
C. SaaS
D. VPN
عرض الإجابة
اجابة صحيحة: B
السؤال #4
During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to perform file rights assignment Which of the following mitigation techniques is being applied'
A. Privileged user accounts
B. Role separation
C. Container administration
D. Job rotation
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?
A. netstat -a
B. ifconfig
C. ip addr
D. ipconfig /all
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A technician is checking network devices to look for opportunities to improve security Which of the following toots would BEST accomplish this task?
A. Wi-Fi analyzer
B. Protocol analyzer
C. Nmap
D. IP scanner
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which of the following protocols can be routed?
A. FCoE
B. Fibre Channel
C. iSCSl
D. NetBEUI
عرض الإجابة
اجابة صحيحة: BC
السؤال #8
Many IP security cameras use RTSP to control media playback. Which of the following default transport layer port numbers does RTSP use?
A. 445
B. 554
C. 587
D. 5060
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which of the following allows for an devices within a network to share a highly reliable time source?
A. NTP
B. SNMP
C. SIP
D. DNS
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which of the following issues are present with RIPv2? (Select TWO).
A. Route poisoning
B. Time to converge
C. Scalability
D. Unicast
E. Adjacent neighbors
F. Maximum transmission unit
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?
A. VLAN hopping
B. Evil twin
C. DNS poisoning
D. Social engineering
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate?
A. Configuring DHCP snooping on the switch
B. Preventing broadcast messages leaving the client network
C. Blocking ports 67/68 on the client network
D. Enabling port security on access ports
عرض الإجابة
اجابة صحيحة: A
السؤال #13
A network technician receives a report about a performance issue on a client PC that is connected to port 1/3 on a network switch. The technician observes the following configuration output from the switch: Which of the following is a cause of the issue on port 1/3?
A. Speed
B. Duplex
C. Errors
D. VLAN
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which of the following has the capability to centrally manage configuration, logging, and firmware versioning for distributed devices?
A. WLAN controller
B. Load balancer
C. SIEM solution
D. Syslog server
عرض الإجابة
اجابة صحيحة: A
السؤال #15
An IT technician needs to increase bandwidth to a server. The server has multiple gigabit ports. Which of the following can be used to accomplish this without replacing hardware?
A. STP
B. 802
C. Duplex
D. LACP
عرض الإجابة
اجابة صحيحة: C
السؤال #16
A network technician is working at a new office location and needs to connect one laptop to another to transfer files. The laptops are newer models and do not have Ethernet ports. Access points are not available either. Which Of the following types Of wireless network SSIDs does the network technician need to configure to be able to connect the laptops together?
A. Independent Basic Service Set
B. Extended Service Set
C. Distribution System Service
D. Basic Service Set
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of me following actions can reduce repair time?
A. Using a tone generator and wire map to determine the fault location
B. Using a multimeter to locate the fault point
C. Using an OTDR In one end of the optic cable to get the liber length information
D. Using a spectrum analyzer and comparing the current wavelength with a working baseline
عرض الإجابة
اجابة صحيحة: B
السؤال #18
A network engineer receives the following when connecting to a switch to configure a port: Which of the following is the MOST likely cause for the failure?
A. The network engineer is using the wrong protocol
B. The network engineer does not have permission to configure the device
C. SNMP has been secured with an ACL
D. The switchport the engineer is trying to configure is down
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation coordination, and termination of the call?
A. Session
B. Physical
C. Transport
D. Data link
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: