لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)
A. Loop Guard
B. PortFast
C. DTF
D. Root Guard
E. BPDU Guard
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which two statements describe network automation and network orchestration? (Choose two.)
A. Network automation does not provide governance or policy management
B. Network automation spans multiple network services, vendors, and environments
C. Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms
D. Provisioning network services is an example of network automation
E. Network orchestration is used to run single, low-level tasks without human intervention
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?
A. PortFast
B. UDLD
C. Root guard
D. BPDU guard
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which design consideration is valid when you contrast fabricPath and trill?
A. FabricPath uses IS-IS, but TRILL uses VxLAN
B. FabricPath permits active-active FHRP and TRILL support anycast gateway
C. FabricPath Permits ECMP, but TRILL does not
D. FabricPath permits active-active mode, but TRILL supports only active-standby mode
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)
A. flow-based analysis to measure bandwidth mix of applications and their flows
B. call management analysis to identify network convergence-related failures
C. call management analysis to identify CAC failures and call quality issues
D. active monitoring via synthetic probes to measure loss, latency, and jitter
E. passive monitoring via synthetic probes to measure loss, latency, and jitter
F. flow-based analysis with PTP time-stamping to measure loss, latency, and jitter
عرض الإجابة
اجابة صحيحة: BC
السؤال #6
Refer to the exhibit A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)
A. Enable unicast heartbeat messages to be periodically exchanged between MEPs
B. Enable Connectivity Fault Management on the SP switches
C. Use upward maintenance endpoints on the SP switches
D. Forward E-LMI PDUs over VPLS
E. Forward LLD PDUs over the VPLS
عرض الإجابة
اجابة صحيحة: AE
السؤال #7
Which two factors provide multifactor authentication for secure access to applications and data, no matter where the users are or which devices they are on? (Choose two.)
A. persona-based
B. power-based
C. push-based
D. possession-based
E. pull-based
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50MSEC). In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?
A. TE backup tunnel
B. Next-hop (NHop) tunnel
C. FRR Backup tunnel
D. next-next-hop (NNHop) tunnel
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?
A. CPU and memory usage on the spoke routers
B. memory usage on the hub router
C. CPU usage on the hub router
D. interface buffers on the hub and spoke routers
عرض الإجابة
اجابة صحيحة: DE
السؤال #10
Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10.1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can be used in the routing policy design so that the rest of the network is not affected by the flapping issue?
A. Use route dampening on LA router for the 10 1 5 0/24 network so that it does not get propagated when it flaps up and down
B. Use route filtering on Chicago router to block the 10
C. Use route filtering on LA router to block the 10
D. Use route aggregation on LA router to summarize the 10
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two)
A. DAI
B. IP Source Guard
C. BEEP
D. CPPr
E. MPP
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?
A. inside global
B. outside global
C. inside local
D. outside local
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)
A. inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation
B. ability to expand bandwidth over existing optical Infrastructure
C. inherent topology flexibility with built-in service protection
D. inherent topology flexibility with intelligent chromatic dispersion
E. inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol
عرض الإجابة
اجابة صحيحة: B
السؤال #14
As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?
A. Focus on the solution instead of the problem, which helps to reduce downtime duration
B. The location of the data collection
C. What direction the data or flows should be metered
D. Identify traffic types and top talkers over this link
عرض الإجابة
اجابة صحيحة: B
السؤال #15
An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?
A. Deploy a root controller to gather a complete network-level view
B. Use the East-West API to facilitate replication between controllers within a cluster
C. Build direct physical connectivity between different controllers
D. Use OpenFlow to implement and adapt new protocols
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?
A. It transmits packets that traverse over network devices like switches and routers
B. It encapsulates packets at source and destination, which incurs additional overhead
C. Packet delivery and reliability occurs at Layer 3 and Layer 4
D. It is responsible for the delivery of packets; NAT- or VRF-based segregation is required
عرض الإجابة
اجابة صحيحة: D
السؤال #17
According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?
A. requirement for data-in-motion encryption and 2FA authentication
B. requirement for data-at-rest encryption foe user identification within the VPN termination hardware
C. categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs
D. ensuring that authorized users have high-availability system access from defined zones to defined systems or zones
عرض الإجابة
اجابة صحيحة: A
السؤال #18
An enterprise campus is adopting a network virtualization design solution with these requirements It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs It must maintain end-to-end logical path transport separation across the network resources available grouped at the access edge Which two primary models can this network virtualization design be categorized? (Choose two)
A. Path isolation
B. Session isolation
C. Group virtualization
D. Services virtualization
E. Edge isolation
عرض الإجابة
اجابة صحيحة: D
السؤال #19
An enterprise wants to provide low-cost delivery of network systems that can be scaled on business demand, followed by an initiative to reduce capital expenses for new IT equipment. Which technology meets these goals'?
A. laaS within a private cloud
B. laaS within an on-premises location
C. PaaS within a public cloud
D. SaaS within an on-premises location
عرض الإجابة
اجابة صحيحة: AB
السؤال #20
Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?
A. Use switch clustering in the access layer
B. Use switch clustering in the core/distribution layer
C. Use spanning-tree PortFast
D. Use BFD
عرض الإجابة
اجابة صحيحة: C
السؤال #21
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?
A. Fate sharing
B. CPU resource allocation
C. Congestion control
D. Security
E. Bandwidth allocation
عرض الإجابة
اجابة صحيحة: AD
السؤال #22
Retef to the exhibit. An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain EIGRP routes are getting redistributed into OSPF ,OSPF area 20 has routers with limited memory and CPU resources The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222 routes to How in Which OSPF area type fulfills this design requirement?
A. area 20 as a stub area
B. type 5 LSA filtering on the ASBR between EIGRP 111 and area a
C. area 20 as a NSSA area
D. type 3 LSA filtering on the ABR between area 0 area 20
عرض الإجابة
اجابة صحيحة: AD
السؤال #23
You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)
A. EoMPLS
B. MPLS Layer 3 VPN
C. DMVPN
D. GET VPN
E. KVPLS
عرض الإجابة
اجابة صحيحة: AE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: