Placing an ACL on the _________ of a router can prevent unwanted traffic from traversing the network.

  • Egress
  • External
  • Ingress
  • Internal
Placing an ACL on the Egress of a router can prevent unwanted traffic from traversing the network.

In _________, each outgoing or incoming request from a specific internal IP address is tracked and matched with a corresponding NAT table entry.

  • Dynamic NAT
  • NAT Overload
  • PAT (Port Address Translation)
  • Static NAT
In PAT (Port Address Translation), each outgoing or incoming request from a specific internal IP address is tracked and matched with a corresponding NAT table entry.

How does Weighted Fair Queueing (WFQ) differ from Priority Queueing in QoS?

  • WFQ assigns weights to different flows, allowing fair sharing of bandwidth based on priority, while Priority Queueing serves queues based on priority without considering fairness.
  • WFQ and Priority Queueing have similar functionalities and do not differ significantly.
  • Priority Queueing assigns weights to different flows, allowing fair sharing of bandwidth based on priority, while WFQ serves queues based on priority without considering fairness.
  • WFQ and Priority Queueing are two terms for the same QoS mechanism.
Weighted Fair Queueing (WFQ) assigns weights to different flows, allowing fair sharing of bandwidth based on priority. In contrast, Priority Queueing serves queues based on priority without considering fairness.

When designing a network with multiple routing domains, it's important to plan _________ to ensure efficient routing and prevent routing issues.

  • BGP
  • OSPF Areas
  • Route Filters
  • Route Summarization
When designing a network with multiple routing domains, planning OSPF areas is important to ensure efficient routing and prevent routing issues by logically segmenting the network.

In a high-security environment, the IT team needs to ensure that specific devices are allowed network access only through designated switch ports. Which combination of Layer 2 security features can achieve this?

  • DHCP Snooping and Port Security
  • Port Security and MAC Spoofing
  • VLANs and DHCP Snooping
  • VLANs and Port Security
Combining DHCP Snooping and Port Security can ensure that specific devices are allowed network access only through designated switch ports, enhancing security in a high-security environment.

________ cables are used for transmitting analog or digital audio signals from a source to an amplifier.

  • Coaxial
  • HDMI
  • Optical
  • RCA
RCA cables are commonly used for transmitting analog or digital audio signals from a source to an amplifier.

Which redundancy protocol is Cisco proprietary and allows for the creation of virtual routers to provide failover capability?

  • HSRP
  • VRRP
  • GLBP
  • OSPF
HSRP (Hot Standby Router Protocol) is a Cisco proprietary redundancy protocol that allows for the creation of virtual routers to provide failover capability in case of a primary router failure.

The _______ daemon is a widely used implementation of the Syslog protocol in Unix and Linux systems.

  • Syslogd
  • Kernel
  • Init
  • Bash
The Syslog daemon (Syslogd) is a widely used implementation of the Syslog protocol in Unix and Linux systems.

VLSM stands for Variable Length ________ Masking.

  • Line
  • Logical
  • Loop
  • Subnet
VLSM stands for Variable Length Subnet Masking, allowing for more flexibility in subnet design.

Implementing ACLs on the _________ side of the network is crucial for controlling traffic entering the network.

  • Egress
  • External
  • Ingress
  • Internal
Implementing ACLs on the Ingress side of the network is crucial for controlling traffic entering the network.