لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two)
A. Bandwidth utilization increases
B. Traffic flows are suboptimal
C. High-end routers are required to support NFV
D. OpenFlow must be supported in the network
E. An SDN orchestration layer is required to support NFV
عرض الإجابة
اجابة صحيحة: C
السؤال #2
An architect designs a multi-controller network architecture with these requirements: Achieve fast failover to control traffic when controllers fail. Reduce connectivity loss and enable smart recovery to improve the SDN survivability. Improve connectivity by adding path diversity and capacity awareness for controllers. Which control plane component of the multi-controller must be built to meet the requirements?
A. control node reliability
B. controller stale consistency
C. control path reliability
D. controller clustering
عرض الإجابة
اجابة صحيحة: B
السؤال #3
What are two advantages of controller-based networks versus traditional networks? (Choose two.)
A. the ability to have forwarding tables at each device
B. more flexible configuration per device
C. more consistent device configuration
D. programmatic APIs that are available per device
E. the ability to configure the features for the network rather than per device
عرض الإجابة
اجابة صحيحة: CE
السؤال #4
A business requirement stating that failure of WAN access for dual circuits into an MPLS provider for a Data Centre cannot happen due to related service credits that would need to be paid has led to diversely routed circuits to different points of presence on the providers network? What should a network designer also consider as part of the requirement?
A. Provision of an additional MPLS provider
B. Out of band access to the MPLS routers
C. Ensuring all related remote branches are dual homed to the MPLS network
D. Dual PSUs & Supervisors on each MPLS router
عرض الإجابة
اجابة صحيحة: CD
السؤال #5
What are two descriptions of network optimization? (Choose two.)
A. maintain high availability
B. proactive network management
C. network redesign
D. network health maintenance
E. identify network requirements
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which extensions to GRE tunneling provide session tracking and in-order packet delivery in exchange for additional state stored in tunnel endpoints?
A. GRE Protocol Type and Checksum extension fields
B. GRE Version and Reserved0 extension fields
C. No extension fields are available in the GRE header to track session data and packet sequences
D. GRE Key and Sequence number extensions
عرض الإجابة
اجابة صحيحة: C
السؤال #7
When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?
A. QoE estimation
B. security
C. traffic patterns
D. flow forwarding
عرض الإجابة
اجابة صحيحة: B
السؤال #8
What are two examples of components that are part of an SDN architecture? (Choose two.)
A. software plane
B. control plane
C. application plane
D. management plane
E. network plane
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?
A. Evaluate bandwidth utilization and connection quality
B. Enable special requirements such as direct DID lines on pickup
C. Make recommendations to limit the size of the half-open session table on routers
D. Check if anomaly detection is enabled for SIP and H
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)
A. Control Plane Protection using queue thresholding on the transit subinterface
B. Control Plane Protection using port filtering on the transit subinterface
C. Control Plane Protection using port filtering on the main interface
D. Control Plane Protection using queue thresholding on the host subinterface
E. Control Plane Protection using port filtering on the host subinterface
عرض الإجابة
اجابة صحيحة: D
السؤال #11
The major business applications of an enterprise are largely monolithic and hard-coded As part of a major modernization and overhaul of the applications the goal is to move to a modular and containerized application architecture mode At the same time decoupling from the hardware is desired to move to an on-demand provisioning However the CyberOps team mandated that the final architecture must provide the same security levels as an air-gapped data center. Which cloud architecture meets these requirements?
A. laaS
B. private cloud
C. PaaS
D. hybrid cloud
E. public cloud
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?
A. Ansible
B. Contrail
C. Java
D. Jinja2
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?
A. Redistribute using metric type 2 into OSPF
B. Redistribute using metric type 1 into OSPF
C. Redistribute using metric type 1 into EIGRP
D. Redistribute using metric type 2 into EIGRP
عرض الإجابة
اجابة صحيحة: C
السؤال #14
The SD-WAN architecture is composed of separate orchestration management, control, and data planes Which activity happens at the orchestration plane?
A. automatic onboarding of the SD-WAN routers into the SD-WAN overlay
B. decision-making process on where traffic flows
C. packet forwarding
D. central configuration and monitoring
عرض الإجابة
اجابة صحيحة: A
السؤال #15
For Company XYZ Bangkok is using ECMP to reach the 172 20 2 0/24 network The company wants a design that would allow them to forward traffic from 172 16 2 0/24 toward 172 20 2 0/24 via the Singapore router as the preferred route The rest of the traffic should continue to use ECMP Which technology fulfills this design requirement?
A. policy-based routing
B. route summarization
C. unequal-cost load balancing using variance
D. LFA
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A business customer deploys workloads in the public cloud. Now the customer network faces governance issues with the flow of IT traffic and must ensure the security of data and intellectual property. Which action helps to identify the issue for further resolution?
A. Set up a secure tunnel from customer routers to ensure that traffic is protected as it travels to the cloud service providers
B. Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud service providers
C. Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic sent to cloud service providers
D. Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?
A. OSPF fast hellos
B. BFD echo
C. Change the protocol to BGP
D. Change the OSPF hello and dead intervals
عرض الإجابة
اجابة صحيحة: DE
السؤال #18
What is a characteristic of a secure cloud architecture model?
A. limited access to job function
B. dedicated and restricted workstations
C. multi-factor authentication
D. software-defined network segmentation
عرض الإجابة
اجابة صحيحة: BD
السؤال #19
Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)
A. uses FEC constructs for traffic forwarding, thereby improving efficiency
B. separates infrastructure and policy
C. uses policy-based forwarding of real-time traffic with less complexity
D. unifies the WAN backbone
E. manages failures through backup links
عرض الإجابة
اجابة صحيحة: CD
السؤال #20
A customer migrates from a traditional Layer 2 data center network into a new SDN-based. spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2 Which activity should be completed each time a legacy network is migrated?
A. The migrated VLAN should be pruned from the Layer 2 interconnects
B. The migrated network should have a VXLAN VNID configured within the new network
C. The migrated network should be advertised to the EVPN network as a Type 2 network
D. The migrated network should be added to the EVPN BGP routing
عرض الإجابة
اجابة صحيحة: C
السؤال #21
The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)
A. access control lists
B. firewalls
C. QoS policy propagation with BGP
D. remote black-holing trigger
E. prefix lists
عرض الإجابة
اجابة صحيحة: CE
السؤال #22
Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)
A. Changes in the existing IP addressing and subnets are required
B. The firewall can participate actively on spanning tree
C. Multicast traffic can traverse the firewall
D. OSPF adjacencies can be established through the firewall
E. The firewall acts like a router hop in the network
عرض الإجابة
اجابة صحيحة: AD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: