لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?
A. community
B. MED
C. local preference
D. As path
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which best practice ensures data security in the private cloud?
A. Use IPsec for communication between unsecured network connection
B. Encrypt data at rest and in transition
C. Use the same vendor for consistent encryption
D. Anonymize data ownership to comply with privacy rules
عرض الإجابة
اجابة صحيحة: A
السؤال #3
What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)
A. monitoring capabilities
B. project time frame
C. staff experience
D. component availability
E. total cost
عرض الإجابة
اجابة صحيحة: BD
السؤال #4
SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?
A. need for intelligent traffic monitoring
B. exponential growth of resource-intensive application
C. complex and distributed management flow
D. higher operating expense and capital expenditure
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which development model is closely associated with traditional project management?
A. static model
B. Agile model
C. evolutionary delivery model
D. lifecycle model
عرض الإجابة
اجابة صحيحة: C
السؤال #6
The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner However the company network does not support BFD Which other feature can be used to fulfill the design requirement?
A. STP
B. fast hello
C. LFA
D. DPD
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model: ? hardware sizing and power consumption ? Layer 2 and layer 3 services parameters ? configuration of all control plane protocols Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if th
A. This provides more opportunity to think outside the box
B. Rework is expected before the delivery
C. Significant effort and time are required
D. This provides a flexible approach to incorporate changes
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)
A. routing protocol authentication
B. SNMPv3
C. Control Plane Policing
D. redundant AAA servers
E. warning banners
F. to enable unused services
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?
A. Transmit delay
B. Throttle timer
C. SPF hold time
D. Interface dampening
عرض الإجابة
اجابة صحيحة: BE
السؤال #10
If the desire is to connect virtual network functions together to accommodate different types of network service connectivity what must be deployed?
A. bridging
B. service chaining
C. linking
D. daisy chaining
E. switching
عرض الإجابة
اجابة صحيحة: C
السؤال #11
What is a description of a control plane action?
A. de-encapsulating and re-encapsulating a packet in a data-link frame
B. matching the destination MAC address of an Ethernet frame to the MAC address table
C. matching the destination IP address of an IP packet to the IP routing table
D. hosts locating routers that reside on attached links using the IPv6 Neighbor Discover Protocol
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)
A. redundant AAA servers
B. Control Plane Policing
C. warning banners
D. to enable unused
E. SNMPv3
F. routing protocol authentication
عرض الإجابة
اجابة صحيحة: BEF
السؤال #13
Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)
A. device resiliency
B. device type
C. network type
D. network resiliency
E. network size
عرض الإجابة
اجابة صحيحة: B
السؤال #14
A business requirement is supplied to an architect from a car manufacturer stating their business model is changing to just-in-time manufacturing and a new network is required, the manufacturer does not produce all of the specific components m-house. which area should the architect focus on initially?
A. Automation
B. Zero Trust Networking
C. Low Latency Infrastructure
D. Modularity
عرض الإجابة
اجابة صحيحة: AE
السؤال #15
You have been tasked with designing a data center interconnect as part of business continuity You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)
A. DWDM
B. EoMPLS
C. SONET/SDH
D. Multichassis EtherChannel over Pseudowire
E. VPLS
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which function is performed at the access layer of the three-layer hierarchical network design model?
A. fault isolation
B. QoS classification and marking boundary
C. reliability
D. fast transport
E. redundancy and load balancing
عرض الإجابة
اجابة صحيحة: AC
السؤال #17
A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?
A. Static Routes for Route Leaking
B. Policy Based Routing
C. OSPF per VRF Instance
D. Multi-Protocol BGP
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?
A. It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger
B. It protects the network Infrastructure against spoofed DDoS attacks
C. It Classifies bogon traffic and remarks it with DSCP bulk
D. It filters RFC 1918 IP addresses
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?
A. working design over comprehensive documentation
B. contract negotiation over customer collaboration
C. following a plan over responding to change
D. processes and tools over individuals and interactions over time
عرض الإجابة
اجابة صحيحة: AD
السؤال #20
Which solution component helps to achieve rapid migration to the cloud for SaaS and public cloud leveraging SD-WAN capabilities?
A. service-oriented cloud architecture
B. Cloud onramp
C. cloud registry
D. microservices in the cloud
عرض الإجابة
اجابة صحيحة: B
السؤال #21
Drag and drop the multicast protocols from the left onto the current design situation on the right.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: D
السؤال #22
As part of a redesign project, you must predict multicast behavior What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated*?
A. It is dropped due to an unsuccessful RPF check against the multicast source
B. It is switched give that no RPF check is performed
C. It is switched due to a successful RPF check against the routing table
D. It is dropped due to an unsuccessful RPk8t8ck against the multicast receiver
عرض الإجابة
اجابة صحيحة: CD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: