لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An external edge router provides connectivity from a service provider to an enterprise Which two Internet edge best practices meet compliance regulations'? (Choose two )
A. Implement filtenng to control traffic that is sourced from the infrastructure IP space
B. Enable and use only secure protocols
C. Send logs to a centralized logging collection server
D. Implement EBGP to advertise all owned IP blocks
E. Use login banners and interface access lists to restrict administrative access to the system
عرض الإجابة
اجابة صحيحة: D
السؤال #2
In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?
A. partial mesh
B. full mesh
C. ring
D. squared
E. triangulated
عرض الإجابة
اجابة صحيحة: AB
السؤال #3
The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco. Drag and drop the im
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: CD
السؤال #4
Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?
A. multipoint route-redistribution with route filtering using ACLs
B. DUMP multipoint route-redistribution with route filtering using route tags
C. DUMPS single point route-redistribution with route filtering using route tags
D. DUMPS single point route-redistribution with route filtering using ACLs
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which tool automates network implementation activities and shortens the implementation lifecycle?
A. LISP
B. Java
C. Conclusion
D. Python
عرض الإجابة
اجابة صحيحة: DE
السؤال #6
You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server The performance is only approximately 700 Mbps and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner?
A. Change the protocol to CIFS
B. Increase the queue to at least 1 GB
C. Use a WRED random drop policy
D. Enable the TCP Nagle algorithm on the receiver
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which undesired effect of increasing the jitter compensation buffer is true?
A. The overall transport jitter decreases and quality improves
B. The overall transport jitter increases and quality issues can occur
C. The overall transport delay increases and quality issues can occur
D. The overall transport delay decreases and quality improves
عرض الإجابة
اجابة صحيحة: B
السؤال #8
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?
A. asynchronous replication over dual data centers via DWDM
B. synchronous replication over geographically dispersed dual data centers via MPLS
C. synchronous replication over dual data centers via Metro Ethernet
D. asynchronous replication over geographically dispersed dual data centers via CWDM
عرض الإجابة
اجابة صحيحة: BE
السؤال #9
During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward ? Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years ? Network bandwidth capacity requirements are dynamic and are expected to change over the next year ? If new
A. private
B. hybrid
C. public
D. multicloud
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)
A. Ensure that strong cryptography is applied for users who have administrative access through networks
B. Apply strong cryptography and security protocols to safeguard sensitive cardholder data
C. Apply strong encryption for transmission of cardholder data across public networks
D. Protect all user systems against malware and frequently update antivirus software
E. Maintain a policy that addresses information security for employees and third parties
عرض الإجابة
اجابة صحيحة: B
السؤال #11
What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?
A. NFVIS
B. NFV
C. VNF
عرض الإجابة
اجابة صحيحة: A
السؤال #12
An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones. Which workaround solution meets the requirement?
A. Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed
B. Enable phone VPN authentication based on end-user username and password
C. Temporarily allow fallback to TLS 1
D. Use authentication-based clear text password with no EAP-MD5 on the legacy phones
عرض الإجابة
اجابة صحيحة: BE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: