لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets shold the IPS forward for BFD to work under all circumstances?
A. Fragmented packet with the do-not-fragment bit set
B. IP packets with broadcast IP source addresses
C. IP packets with the multicast IP source address
D. IP packet with the multicast IP destination address
E. IP packets with identical source and destination IP addresses
F. IP packets with the destination IP address 0
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A service provider hires you to design its new managed CE offering to meet these requirements ? The CEs cannot run a routing protocol with the PE ? Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios. ? Provide support for IPv6 customer routes ? Scale up to 250.000 CE devices per customer. ? Provide low operational management to scale customer growth. ? Utilize low-end (inexpensive) routing platforms for CE functionality. Which tunneling technology do you recommend?
A. FlexVPN
B. point-to-point GRE
C. DMVPN
D. LISP
عرض الإجابة
اجابة صحيحة: B
السؤال #3
IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?\
A. performance monitoring
B. security
C. observation of critical links
D. capacity planning
عرض الإجابة
اجابة صحيحة: BC
السؤال #4
Retef to the exhibit. This network is running OSPF and EIGRP as the routing protocols Mutual redistribution of the routing protocols has been contoured on the appropriate ASBRs The OSPF network must be designed so that flapping routes m EIGRP domains do not affect the SPF runs within OSPF The design solution must not affect the way EIGRP routes are propagated into the EIGRP domains Which technique accomplishes the requirement?
A. route summarization the ASBR interfaces facing the OSPF domain
B. route summarization on the appropriate ASBRS
C. route summarization on the appropriate ABRS
D. route summarization on EIDRP routers connecting toward the ASBR
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which main IoT migration aspect should be reviewed for a manufacturing plant?
A. Sensors
B. Security
C. Applications
D. Wi-Fi Infrastructure
E. Ethernet Switches
عرض الإجابة
اجابة صحيحة: E
السؤال #6
Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?
A. After the initial timer exchang
B. R2 sets its transmission rate to the R1 Desired Min TX interval
C. After the initial timer exchang
D. R1 sets its transmission rate to the R2 Required Min RX interval
E. Timers renegotiate indefinitely, so the timer exchange phase never converges
F. R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?
A. Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value
B. Redistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the ext value and the value is the same in all ASBRs
C. Enable OSPF load-balancing over unequal cost path
D. Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external internal values
عرض الإجابة
اجابة صحيحة: ACD
السؤال #8
What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?
A. The Layer 1 and Layer 2 domains can easily overlap
B. It reduces the complexity of the Layer 1 domains
C. It can be applied to any kind of topology
D. The Layer 2 domain is contained and more stable
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which two features describe controller-based networking solutions compared to traditional networking solutions? (Choose two.)
A. inflate licensing costs
B. reduce network configuration complexity
C. provide centralization of primary IT functions
D. allow for fewer network failures
E. increase network bandwidth usage
عرض الإجابة
اجابة صحيحة: B
السؤال #10
An enterprise network has two core routers that connect to 200 distribution routers and uses fullmesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?
A. Implement route reflectors on the two core routers
B. Increase the memory on the core routers
C. Implement e BGP between the core and distribution routers
D. Increase the memory on the distribution routers
E. Increase bandwidth between the core routers
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which two protocols are used bv SDN controllers to communicate with switches and routers? (Choose two )
A. OpenFlash
B. OpenFlow
C. NetFlash
D. Open vSwitch Database
E. NetFlow
عرض الإجابة
اجابة صحيحة: CE
السؤال #12
Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?
A. system-oriented architecture
B. OSASE architecture
C. platform-oriented architecture
D. SASE architecture
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)
A. confidential
B. serviceability
C. reliability
D. availability
E. integrity
F. scalability
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which network management framework can be used to develop a network architecture that contains business requirements analysis, gap analysis, and network diagrams as artifacts to be used for design and implementation later?
A. TOG
B. ITIL
C. FCAPS
D. Cobit
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)
A. workload
B. work domain
C. workplace
D. workgroup
E. workspace
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Company XYZ is migrating their existing network to IPv6 and they must plan for Layer 2 and Layer 3 devices Some of the access layer switches do not support IPv6, however, core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used in the design?
A. The access layer switches must support IGMP snooping at a minimu
B. Any switches that do not support IGM snooping must be replaced
C. Upgrade the nonsupporting switches Otherwise, it will cause an issue with the migration
D. Layer 2 switches will not affect the implementation of IPv6
E. The access layer switches must support DHCPv6
عرض الإجابة
اجابة صحيحة: BE
السؤال #17
Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?
A. access
B. core
C. collapsed core
D. distribution
عرض الإجابة
اجابة صحيحة: C
السؤال #18
What are two common approaches to analyzing and designing networks? (Choose two.)
A. bottom-up approach
B. high-low security approach
C. top-down approach
D. left-right approach
E. three-tier approach
عرض الإجابة
اجابة صحيحة: D
السؤال #19
The administrator of a small branch office wants to implement the Layer 2 network without running STP The office has some redundant paths Which mechanism can the administrator use to allow redundancy without creating Layer 2 loops?
A. Use double-sided VPC on both switches
B. Use two port channels as Flex links
C. Use fabric path with ECMP
D. Use 802
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?
A. The LA administrator should use route aggregation to summarize the 10 1 4
B. The LA administrator should use route dampening for the 10
C. The LA administrator should use route filtering to block the 10
D. The Chicago administrator should use route filtering to block the 10
عرض الإجابة
اجابة صحيحة: AC
السؤال #21
Which three Cisco products are used in conjunction with Red Hat to provide an NFVi solution? (Choose three.)
A. Cisco Prime Service Catalog
B. Cisco Open Virtual Switch
C. Cisco Nexus switches
D. Cisco UCS
E. Cisco Open Container Platform
F. Cisco Virtual Network Function
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: