لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), although it is connected to a gigabit switch. While reviewing the interface information in the switch CLI, the technician notes the port is operating at IOOFD but Shows many RX and TX errors. The technician moves the computer to another switchport and experiences the same issues. Which of the following is MOST likely the cause of the low data rate and port errors?
A. Bad switch ports
B. Duplex issues
C. Cable length
D. Incorrect pinout
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A network administrator is decommissioning a server. Which of the following will the network administrator MOST likely consult?
A. Onboarding and off boarding policies
B. Business continuity plan
C. Password requirements
D. Change management documentation
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following DNS records works as an alias to another record?
A. AAAA
B. CNAME
C. MX
D. SOA
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A network administrator has received calls every day for the past few weeks from three users who cannot access the network. The administrator asks all the users to reboot their PCs, but the same users still cannot access the system. The following day, three different users report the same issue, and the administrator asks them all to reboot their PCs; however, this does not fix the issue. Which of the following is MOST likely occurring?
A. Incorrect firewall settings
B. Inappropriate VLAN assignment
C. Hardware failure
D. Overloaded CAM table in switch
E. DHCP scope exhaustion
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?
A. Increased CRC errors
B. Increased giants and runts
C. Increased switching loops
D. Increased device temperature
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following protocols will a security appliance that is correlating network events from multiple devices MOST likely rely on to receive event messages?
A. Syslog
B. Session Initiation Protocol
C. Secure File Transfer Protocol
D. Server Message Block
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO).
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack
عرض الإجابة
اجابة صحيحة: A
السؤال #9
A technician notices that equipment is being moved around and misplaced in the server room, even though the room has locked doors and cabinets. Which of the following would be the BEST solution to identify who is responsible?
A. Install motion detection
B. Install cameras
C. Install tamper detection
D. Hire a security guard
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?
A. Install load balancers
B. Install more switches
C. Decrease the number of VLANs
D. Reduce the lease time
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
A. NetFlow analyzer
B. Bandwidth analyzer
C. Protocol analyzer
D. Spectrum analyzer
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following would be BEST to use to detect a MAC spoofing attack?
A. Internet Control Message Protocol
B. Reverse Address Resolution Protocol
C. Dynamic Host Configuration Protocol
D. Internet Message Access Protocol
عرض الإجابة
اجابة صحيحة: B
السؤال #13
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
A. 2
B. 5GHz
C. 6GHz
D. 900MHz
عرض الإجابة
اجابة صحيحة: B
السؤال #14
A technician is trying to install a VolP phone, but the phone is not turning on. The technician checks the cable gong from the phone to the switch, and the cable is good. Which of the following actions IS needed for this phone to work?
A. Add a POE injector
B. Enable MDIX
C. Use a crossover cable
D. Reconfigure the port
عرض الإجابة
اجابة صحيحة: A
السؤال #15
A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU?
A. CRC errors
B. Giants
C. Runts
D. Flooding
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?
A. Audit logs
B. CPU utilization
C. CRC errors
D. Jitter
عرض الإجابة
اجابة صحيحة: D
السؤال #17
A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?
A. NFV
B. SDWAN
C. VIP
D. MPLS
عرض الإجابة
اجابة صحيحة: A
السؤال #18
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:
A. using a bottom-to-top approach
B. establishing a plan of action
C. documenting a finding
D. questioning the obvious
عرض الإجابة
اجابة صحيحة: A
السؤال #19
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. Captive portal
B. Two-factor authentication
C. Complex passwords
D. Geofencing
E. Role-based access
F. Explicit deny
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: