Implementing __________ in a network firewall involves creating security zones for more granular control.

  • Proxy
  • Stateful Inspection
  • Zones
  • Virtual LANs
Implementing security zones in a network firewall involves creating security zones for more granular control.

What is the total number of bits used in an IPv4 address?

  • 128
  • 16
  • 32
  • 64
An IPv4 address uses a total of 32 bits.

A ________ port on a switch allows traffic from multiple VLANs to pass through while keeping the traffic separate.

  • Access
  • Tagged
  • Trunk
  • Untagged
A Trunk port on a switch allows traffic from multiple VLANs to pass through while keeping the traffic separate.

A _________ topology typically requires more cabling than other topologies but offers robustness and fault tolerance.

  • Bus
  • Mesh
  • Ring
  • Star
A Mesh topology typically requires more cabling than other topologies but offers robustness and fault tolerance. Each device is connected to every other device, providing multiple paths for data transmission.

In network management, ________ is a method that provides a centralized platform to control different network devices from various vendors.

  • SNMP (Simple Network Management Protocol)
  • Syslog
  • ICMP (Internet Control Message Protocol)
  • SMTP (Simple Mail Transfer Protocol)
SNMP (Simple Network Management Protocol) is a method used in network management to provide a centralized platform for controlling different network devices from various vendors.

The process of translating an IPv4 address into an IPv6 address is known as _______.

  • Dual Stack
  • NAT64 (Network Address Translation 64)
  • Subnetting
  • Tunneling
NAT64 (Network Address Translation 64) is the process of translating an IPv4 address into an IPv6 address, allowing communication between IPv4 and IPv6 networks.

_________ firewalls are known for their ability to filter traffic based on applications or services.

  • Stateful Inspection
  • Proxy
  • Application Layer
  • Packet Filtering
Application Layer firewalls are known for their ability to filter traffic based on applications or services.

________ offers a cost-effective way to connect multiple sites over a shared network infrastructure.

  • MPLS (Multiprotocol Label Switching)
  • VPN (Virtual Private Network)
  • DNS (Domain Name System)
  • DHCP (Dynamic Host Configuration Protocol)
MPLS offers a cost-effective way to connect multiple sites over a shared network infrastructure.

A _________ is a set of rules applied to a router to control network traffic and mitigate security risks.

  • Firewall
  • Protocol
  • Routing Table
  • Access Control List (ACL)
An Access Control List (ACL) is a set of rules applied to a router to control network traffic and mitigate security risks.

In an organization looking to scale its network infrastructure with minimal physical changes, which SDN capability would be most critical?

  • Network Function Virtualization (NFV)
  • Southbound API
  • Northbound API
  • Control Plane Separation
Network Function Virtualization (NFV) in SDN allows scaling the network infrastructure by virtualizing network functions, minimizing the need for physical changes.