لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
How must the queue sizes be designed to ensure that an application functions correctly?
A. The default queue sizes are good for any deployment as it compensates the serialization delay
B. The queuing delay on every device in the chain must be exactly the same to the application required delay
C. Each individual device queuing delay in the chain must be less than or equal to the application required delay
D. The sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay
عرض الإجابة
اجابة صحيحة: D
السؤال #2
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?
A. CAPS
B. obit
C. OGAF
D. TIL
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Refer to the table. A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The migration is estimated to take 20 months to complete but might extend an additional 10 months if issues arise. All connectivity options meet the requirements to migrate workloads. Which transport technology provides the best ROI based on cost and flexibility?
A. TLS
B. LS
C. Psec
D. RE
عرض الإجابة
اجابة صحيحة: D
السؤال #4
07. What are two examples of business goals to be considered when a network design is built?
A. tandardizeresiliency
B. inimizeoperationalc
C. ntegrateendpointposture
D. nsurefasterobsolescence
عرض الإجابة
اجابة صحيحة: B
السؤال #5
05. According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?
A. equirementfordata-in-motionencryptionand2FAauthenticati
B. equirementfordata-at-restencryptionfoeuseridentificationwithintheVPNterminationhardware
C. ategorizationofsystems,data,andenterpriseBYODassetsthatareconnectedtonetworkzonesbasedonindividualprivacyneed
D. nsuringthatauthorizedusershavehigh-availabilitysystemaccessfromdefinedzonestodefinedsystemsorzone
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the Layer 2 interconnection?
A. t the core layer, to otter the possibility to isolate STP domains
B. t me aggregation layer because it is the Layer 2 to Layer 3 demarcation point
C. t the access layer because the STP root bridge does not need to align with the HSRP active node
D. t the core layer because all external connections must terminate there for security reasons
عرض الإجابة
اجابة صحيحة: B
السؤال #7
DRAG DROP (Drag and Drop is not supported)Drag and drop the multicast protocols from the left onto the correct design situations on the right. Not all options are used.Select and Place:
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A multinational enterprise integrates a cloud solution with these objectives* Achieve seamless connectivity across different countries and regions* Extend data center and private clouds into public clouds and provider-hosted cloudsWhat are two outcomes of deploying data centers and fabrics that interconnect different cloud networks? (Choose two.)
A. nhanced security
B. ata and network ownership
C. bility to place workloads across clouds
D. entralized visibility
E. nidirectional workload mobility across the cloud
عرض الإجابة
اجابة صحيحة: AC
السؤال #9
Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)
A. arget RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites
B. SANs must be extended from the primary to the secondary site to improve performance and availability
C. SANs must be routed between sites to isolate fault domains and increase overall availability
D. ynchronous data replication must be used to meet the business requirements
E. synchronous data replication should be used in this scenario to avoid performance impact in the primary site
عرض الإجابة
اجابة صحيحة: BD
السؤال #10
A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?
A. security
B. cloud connectivity
C. additional latency
D. data governance
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever increasing cybersecurity threats. To achieve this, federated identity services have been deployed in the Company XYZ network to provide single sign-on and Multi-Factor Authentication for the applications and services. Which protocol can be used by Company XYZ to provide authentication and authorization services?
A. Auth2
B. penID Connect
C. penID
D. AML 2
عرض الإجابة
اجابة صحيحة: D
السؤال #12
An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network’s 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?
A. lass-based traffic policing
B. lass-based traffic shaping
C. BWFQ
D. LQ
عرض الإجابة
اجابة صحيحة: C
السؤال #13
06. How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?
A. imitthequerydomainbyuseofdistributelists
B. uildneighboradjacenciesinatriangulatedfashion
C. uildneighboradjacenciesinsquaredfashion
D. imitthequerydomainbyuseofsummarization
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)
A. ulti-factor authentication
B. imited access to job function
C. edicated and restricted workstations
D. oftware-defined network segmentation
عرض الإجابة
اجابة صحيحة: BCF
السؤال #15
Which two control plane policer designs must be considered to achieve high availability? (Choose two.)
A. EAN
B. ix-Sigma
C. crum
D. anban
عرض الإجابة
اجابة صحيحة: DE
السؤال #16
Which best practice ensures data security in the private cloud?
A. nonymize data ownership to comply with privacy rules
B. ncrypt data at rest and in transition
C. se the same vendor for consistent encryption
D. se IPsec for communication between unsecured network connections
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which two impacts of adding the IP event dampening feature to a network design are true? (Choose two.)
A. hen the switch hardware is faster than the debounce timer down detection
B. hen numerous adjacent flaps of very short duration occur
C. hen occasional flaps of long duration occur
D. hen the router hardware is slower than the carrier delay down detection
عرض الإجابة
اجابة صحيحة: BE
السؤال #18
Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?
A. ype 3 LSA filtering on the ABR between area 0 and area 20
B. ype 5 LSA filtering on the ASBR between EIGRP 111 and area 0
C. rea 20 as a stub area
D. rea 20 as a NSSA area
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?
A. se BFD
B. se switch clustering in the core/distribution layer
C. se spanning-tree PortFast
D. se switch clustering in the access layer
عرض الإجابة
اجابة صحيحة: B
السؤال #20
DRAG DROP (Drag and Drop is not supported)Drag and drop the characteristics from the left onto the corresponding network management options on the right.
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?
A. ingle point route-redistribution with route filtering using route tags
B. ultipoint route-redistribution with route filtering using ACLs
C. ultipoint route-redistribution with route filtering using route tags
D. ingle point route-redistribution with route filtering using ACLs
عرض الإجابة
اجابة صحيحة: C
السؤال #22
The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?
A. ontrol Plane Protection transit subinterface
B. ontrol Plane Protection host subinterface
C. ontrol Plane Protection CEF-exception subinterface
D. ontrol Plane Protection main interface
عرض الإجابة
اجابة صحيحة: B
السؤال #23
An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services if one ISP suffers loss or latency?
A. loud onRamp SWG
B. loud onRamp
C. loud onRamp gateway site
D. loud onRamp SaaS
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Refer to the table. A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The solution must provide a single 10G connection between locations and be able to run its own varying QoS profiles without service provider interaction based on the migration stages. All connectivity methods are at 10 Gbps. Which transport technology costs the least if the connectivity is required for just one year?
A. WDM
B. WDM
C. PLS
D. etro Ethernet
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Refer to the exhibit. An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?
A. GP-LS
B. GP FlowSpec
C. GP-EVPN
D. GP PIC
عرض الإجابة
اجابة صحيحة: C
السؤال #26
Which function is performed at the access layer of the three-layer hierarchical network design model?
A. ast transport
B. eliability
C. ault isolation
D. edundancy and load balancing
E. oS classification and marking boundary
عرض الإجابة
اجابة صحيحة: E
السؤال #27
Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:•hardware sizing and power consumption•Layer 2 and layer 3 services parameters•configuration of all control plane protocolsInput from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stake
A. he access layer switches must support IGMP snooping at a minimum
B. he access layer switches must support DHCPv6
C. pgrade the nonsupporting switches
D. ayer 2 switches will not affect the implementation of IPv6
عرض الإجابة
اجابة صحيحة: B
السؤال #28
SD-WAN can be used to provide secure connectivity to remote offices, branch offices, campus networks, data centers, and the cloud over any type of IP-based underlay transport network. Which two statements describe SD-WAN solutions? (Choose two.)
A. oth technologies should be used
B. PLS meets all these requirements and it is more reliable than using the Internet
C. oftware-defined WAN should be the preferred choice because it complements both technologies, covers all the required features, and it is the most cost- effective solution
D. nternet should be the preferred option because it is cost effective and supports BFD, IP SLA, and IPsec for secure transport over the public Internet
عرض الإجابة
اجابة صحيحة: AD
السؤال #29
What is the most important operational driver in building a resilient and secure modular network design?
A. inimize app downtime
B. educe the frequency of failures requiring human intervention
C. ncrease time spent on developing new features
D. ependencies on hardware or software that is difficult to scale
عرض الإجابة
اجابة صحيحة: A
السؤال #30
Refer to the exhibit. Traffic was equally balanced between Layer 3 links on core switches SW1 and SW2 before an introduction of the new video server in the network. This video server uses multicast to send video streams to hosts and now one of the links between core switches is over utilized. Which design solution solves this issue?
A. ggregate links using Layer 2 link aggregation
B. dd more links between core switches
C. pply a more granular load-balancing method on SW2
D. ilter IGMP joins on an over-utilized link
E. pply a more granular load-balancing method on SW1
عرض الإجابة
اجابة صحيحة: A
السؤال #31
As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS), by hosting the backend system in their on- premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. traffic policing
B. WRED
C. tail drop
D. traffic shaping
عرض الإجابة
اجابة صحيحة: B
السؤال #32
Refer to the exhibit. Which impact of using three or more ABRs between the backbone area and area 1 is true?
A. n a large-scale network, multiple ABRs can create microloops
B. ultiple ABRs reduce the CPU processing on each ABR due to splitting prefix advertisement between areas
C. refixes from the non-backbone area are advertised by one ABR to the backbone area
D. n a large-scale network, LSA replication, by all ABRs, can cause serious scalability issues
عرض الإجابة
اجابة صحيحة: D
السؤال #33
A European government passport agency considers upgrading its IT systems to increase performance and workload flexibility in response to constantly changing requirements. The budget manager wants to reduce capital expenses and IT staff and must adopt the lowest-cost technology. Which technology choice is suitable?
A. public cloud
B. hybrid cloud
C. on premises
D. private cloud
عرض الإجابة
اجابة صحيحة: A
السؤال #34
Which undesired effect of increasing the jitter compensation buffer is true?
A. he overall transport delay decreases and quality improves
B. he overall transport jitter increases and quality issues can occur
C. he overall transport delay increases and quality issues can occur
D. he overall transport jitter decreases and quality improves
عرض الإجابة
اجابة صحيحة: C
السؤال #35
03. Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network.
A. ocaladdresse
B. rivateaddresse
C. ink-localaddresse
D. niquelocaladdresse
عرض الإجابة
اجابة صحيحة: D
السؤال #36
You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)
A. yslog
B. NMPv3
C. NMPv2
D. yslog TLS
E. SH
عرض الإجابة
اجابة صحيحة: AB
السؤال #37
The major business applications of an enterprise are largely monolithic and hard-coded As part of a major modernization and overhaul of the applications the goal is to move to a modular and containerized application architecture mode At the same time decoupling from the hardware is desired to move to an on-demand provisioning However the CyberOps team mandated that the final architecture must provide the same security levels as an air-gapped data center. Which cloud architecture meets these requirements?
A. aaS
B. rivate cloud
C. aaS
D. ybrid cloud
E. ublic cloud
عرض الإجابة
اجابة صحيحة: B
السؤال #38
Which two technologies enable multilayer segmentation? (Choose two.)
A. ecurity
B. bservation of critical links
C. apacity planning
D. erformance monitoring
عرض الإجابة
اجابة صحيحة: BD
السؤال #39
What are two examples of business goals to be considered when a network design is built? (Choose two.)
A. WDM over dark fiber
B. PLS
C. WDM over dark fiber
D. etro Ethernet
عرض الإجابة
اجابة صحيحة: CD
السؤال #40
Refer to the exhibit. This network is running legacy STP 802.1d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?
A. nly the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802
B. he max_age and forward delay parameters can be adjusted to speed up STP convergence process
C. he transit_delay=5 and bpdu_delay=20 are recommended values, considering hello_timer=2 and specified diameter
D. nly the transit_delay and bpdu_delay timers are configurable parameters in 802
عرض الإجابة
اجابة صحيحة: B
السؤال #41
An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services if one ISP suffers loss or latency?
A. Cloud onRamp SWG
B. Cloud onRamp
C. Cloud onRamp gateway site
D. Cloud onRamp SaaS
عرض الإجابة
اجابة صحيحة: C
السؤال #42
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?
A. ynchronous replication over geographically dispersed dual data centers via MPLS
B. ynchronous replication over dual data centers via Metro Ethernet
C. synchronous replication over geographically dispersed dual data centers via CWDM
D. synchronous replication over dual data centers via DWDM
عرض الإجابة
اجابة صحيحة: A
السؤال #43
You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?
A. PDU guard
B. oot guard
C. oop guard
D. PDU filtering
عرض الإجابة
اجابة صحيحة: C
السؤال #44
Which relationship between iBGP and the underlying physical topology is true?
A. iBGP full mesh requires an underlying fully meshed network topology
B. iBGP full mesh requirement does not dictate any specific network topology
C. iBGP does not work on a ring network topology even with an underlying IGP
D. iBGP can work only on a ring network topology with a link-state protocol like OSPF or IS-IS
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: