لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What best describes the difference between Automation and Orchestration?
A. Automation refers to an automatic process for completing a single task and Orchestration refersto assembling and coordinating a set of tasks and conditions
B. Automation describes a hands-off configuration process while Orchestration refers to sets ofautomation tasks that require the network administrator to coordinate
C. Automation refers to an automatic process for completing multiple tasks with conditions andOrchestration refers to executing tasks in parallel
D. Automation refers to scripting languages (Pytho
E. Ansible etc
عرض الإجابة
اجابة صحيحة: AC
السؤال #2
What are two key design principles when using a hierarchical core-distribution-access network model? (Choose two )
A. A hierarchical network design model aids fault isolation
B. The core layer is designed first, followed by the distribution layer and then the access layer
C. The core layer provides server access in a small campus
D. A hierarchical network design facilitates changes
E. The core layer controls access to resources for security
عرض الإجابة
اجابة صحيحة: AE
السؤال #3
Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)
A. Loop Guard
B. PortFast
C. DTF
D. Root Guard
E. BPDU Guard
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?
A. first-hop router registration to the RP
B. multicast client registration to the RP
C. multicast source registration to the RP
D. transport of all IPv6 multicast traffic
عرض الإجابة
اجابة صحيحة: DE
السؤال #5
An engineer is designing the network for a multihomed customer running in AS 111 does not have any other Ass connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?
A. Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs
B. Use the local preference attribute to configure your AS as a non-transit'' AS
C. include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field
D. Include a prefix list to only receive routes from neighboring ASs
عرض الإجابة
اجابة صحيحة: D
السؤال #6
What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core layers?
A. low bandwidth
B. securityC scalability
C. high latency
عرض الإجابة
اجابة صحيحة: B
السؤال #7
You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?
A. Root guard
B. BPDU guard
C. Loop guard
D. BPDU filtering
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which two control plane policer designs must be considered to achieve high availability? (Choose two.)
A. Control plane policers are enforced in hardware to protect the software path, but they arehardware platform dependent in terms of classification ability
B. Control plane policers are really needed only on externally facing devices
C. Control plane policers can cause the network management systems to create false alarms
D. Control plane policers must be processed before a forwarding decision is made
E. Control plane policers require that adequate protocols overhead are factored in to allow protocolconvergence
عرض الإجابة
اجابة صحيحة: AD
السؤال #9
The enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer3 VPN solution and manages the CE routers, but they do not currently support multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?
A. Enable a GRE tunnel between nodes CE1 and CE2
B. Enable a GRE tunnel between nodes C2 and C4
C. Enable a GRE tunnel between nodes C1 and C4
D. Implement hub and spoke MPLS VPN over DMVPN (also known as 2547o DMVPN) between CE1 and CE2
E. The service provider must provide a Draft Rosen solution to enable a GRE tunnel between nodes PE1 and PE2
عرض الإجابة
اجابة صحيحة: BE
السؤال #10
SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?
A. TLS
B. DTLS
C. IPsec
D. GRE
عرض الإجابة
اجابة صحيحة: C
السؤال #11
What statement describes the application layer as defined in the software-defined networking architecture?
A. This layer is responsible for collecting the network status such as network usage and topology
B. This layer contains programs that communicate their desired network behavior to controllers
C. This layer is responsible for handling packets based on the rules provided by the controller
D. This layer processes the instructions and requirements sent by networking components
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Company A has a hub-and spoke topology over an SP-managed infrastructure. To measure traffic performance metrics. IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?
A. memory usage on the hub router
B. interface buffers on the hub and spoke routers
C. CPU and memory usage on the spoke routers
D. CPU usage on the hub router
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)
A. Check for high roaming delay
B. Check for uniform radio coverage across the floors
C. Check for high channel utilization
D. Check for latency over wireless
E. Identify frequent TX power changes
عرض الإجابة
اجابة صحيحة: C
السؤال #14
An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?
A. class-based traffic policing
B. LLQ
C. CBWFQ
D. class-based traffic shaping
عرض الإجابة
اجابة صحيحة: A
السؤال #15
An enterprise has identified these causes for inefficient CAPEX spending: CAPEX planning is driven by technology and not by business objectives. The CAPEX planning team lacks the data it needs to perform due diligence tasks. The organizational structure lacks sufficient accountability and incentives. Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?
A. Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting
B. CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully
C. Adopt new organizational models that promote real accountability for RO
D. not just revenu
E. EBITDA, and cash
F. Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?
A. southbound APIs
B. northbound APIs
C. orchestration layer
D. SDN controller
عرض الإجابة
اجابة صحيحة: B
السؤال #17
You were tasked to enhance the security of a network with these characteristics: ? A pool of servers is accessed by numerous data centers and remote sites ? The servers are accessed via a cluster of firewalls ? The firewalls are configured properly and are not dropping traffic ? The firewalls occasionally cause asymmetric routing of traffic within the server data center. Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstatio
A. Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers
B. Deploy uRPF strict mode
C. Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs
D. Deploy uRPF loose mode
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: