In AAA security, what does Authorization specifically control?

  • Authentication
  • Access
  • Accounting
  • Addressing
In AAA security, Authorization specifically controls access, determining what resources a user is allowed to access after successful authentication.

What is the first step typically taken in a systematic approach to network troubleshooting?

  • Identify the problem
  • Implement the solution
  • Document the findings
  • Verify the solution
The first step in a systematic approach to network troubleshooting is to identify the problem, which involves understanding and defining the issue at hand.

How does serverless computing differ from traditional cloud computing models?

  • Serverless computing abstracts server management entirely, and users only pay for actual usage
  • Serverless computing relies on physical servers for resource allocation
  • Traditional cloud computing models are event-driven, while serverless models are request-driven
  • Serverless computing uses virtualization technology exclusively
Serverless computing differs from traditional cloud computing by abstracting server management entirely, and users only pay for actual usage, eliminating the need for provisioning and managing servers.

In complex network environments, why is it crucial to document and analyze network change logs during troubleshooting?

  • Change logs provide a historical record of network configurations and changes
  • Change logs are unnecessary and can be ignored during troubleshooting
  • Analyzing change logs only helps in identifying minor issues
  • Change logs are useful only for auditing purposes
Documenting and analyzing network change logs in complex environments is crucial as they provide a historical record of network configurations and changes, aiding in identifying potential causes of issues.

A _________ is a set of rules applied to a router to control network traffic and mitigate security risks.

  • Firewall
  • Protocol
  • Routing Table
  • Access Control List (ACL)
An Access Control List (ACL) is a set of rules applied to a router to control network traffic and mitigate security risks.

In an organization looking to scale its network infrastructure with minimal physical changes, which SDN capability would be most critical?

  • Network Function Virtualization (NFV)
  • Southbound API
  • Northbound API
  • Control Plane Separation
Network Function Virtualization (NFV) in SDN allows scaling the network infrastructure by virtualizing network functions, minimizing the need for physical changes.

In a stacked configuration, individual switches are interconnected using a ________ link.

  • Backbone
  • Mesh
  • Trunk
  • Uplink
In a stacked configuration, individual switches are interconnected using a trunk link to facilitate communication and coordination.

How does GRE tunneling differ from traditional VPN tunneling in terms of encryption and security features?

  • GRE focuses on providing a simple encapsulation method without inherent encryption.
  • GRE offers stronger encryption and security features compared to traditional VPNs.
  • GRE and traditional VPNs have identical encryption and security features.
  • GRE and traditional VPNs do not support encryption.
GRE primarily provides encapsulation and does not inherently offer encryption, unlike traditional VPNs that focus on security features.

What is the main security benefit of using NAT in a network infrastructure?

  • It automatically detects and blocks malicious traffic.
  • It hides internal IP addresses from external networks.
  • It implements strong access control policies.
  • It provides encryption for all transmitted data.
The main security benefit of using NAT is that it hides internal IP addresses from external networks, adding a layer of security by obscuring the internal network structure.

In a data center, the network team is implementing EtherChannel to enhance throughput and redundancy. What configuration aspects are critical to ensure optimal performance and reliability?

  • DHCP configuration, broadcast storm control, and OSPF areas
  • Duplex settings, access control lists, and SNMP versions
  • Link aggregation mode, spanning-tree protocol parameters, and interface MTU
  • NAT settings, VLAN pruning, and HSRP priorities
Configuring link aggregation mode, spanning-tree protocol parameters, and interface MTU are critical aspects for ensuring optimal performance and reliability when implementing EtherChannel in a data center.