Which topology is best suited for large-scale networks due to its scalability and decentralized nature?

  • Bus
  • Mesh
  • Star
  • Tree
A tree topology is best suited for large-scale networks due to its scalability and decentralized nature. It combines elements of bus and star topologies.

Which protocol is more secure for remote device management: Telnet or SSH?

  • Telnet
  • SSH
  • SNMP
  • FTP
SSH (Secure Shell) is more secure for remote device management compared to Telnet. Telnet transmits data in plain text, while SSH encrypts the communication for enhanced security.

A network administrator is implementing a new policy to enhance device security. They need a protocol that encrypts both authentication and session data. Which protocol should they use?

  • SSL/TLS
  • SNMP
  • SSH
  • DHCP
SSH (Secure Shell) is a protocol that encrypts both authentication and session data, providing enhanced device security.

_________ is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

  • Dynamic NAT
  • NAT Overload
  • PAT (Port Address Translation)
  • Static NAT
PAT (Port Address Translation) is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

In a complex network, what is the primary challenge when implementing VLSM?

  • Incompatibility with DHCP
  • Increased routing table complexity
  • Lack of support from network devices
  • Limited number of available IP addresses
In complex networks, the primary challenge when implementing VLSM is increased routing table complexity, as it requires routers to maintain information about subnets of varying sizes.

A network administrator discovers that unauthorized devices are connecting to the network. Which Layer 2 security feature should be implemented to control access based on MAC addresses?

  • DHCP Snooping
  • MAC Spoofing
  • Port Security
  • VLANs
Port Security is a Layer 2 security feature that controls access based on MAC addresses, helping prevent unauthorized devices from connecting to the network.

SSH (Secure Shell) is primarily used for what purpose in network security?

  • File Transfer
  • Remote Access
  • Email Security
  • Web Browsing
SSH (Secure Shell) is primarily used for secure remote access to network devices, providing a secure channel for command-line access.

Syslog messages are categorized into different levels, where a level of 0 represents _______.

  • Emergency
  • Debugging
  • Critical
  • Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.

The _________ is a key component in SNMP, storing data about the managed objects within a device.

  • MIB (Management Information Base)
  • OID (Object Identifier)
  • RMON (Remote Monitoring)
  • ARP (Address Resolution Protocol)
The MIB (Management Information Base) is a key component in SNMP, storing data about the managed objects within a device.

A company is experiencing slow data transfers over its WAN. To address this, what WAN optimization technique would be most effective?

  • Compression
  • Caching
  • Quality of Service (QoS)
  • Traffic Shaping
Compression is a WAN optimization technique that reduces the size of data transferred over the network, improving data transfer speeds.