________ allows for multiple virtual router identifiers (VRIs) to be assigned to different interfaces on the same router.
- HSRP
- GLBP
- VRRP
- OSPF
GLBP (Gateway Load Balancing Protocol) allows for multiple virtual router identifiers (VRIs) to be assigned to different interfaces on the same router.
Which routing protocol is classful and does not support VLSM or CIDR?
- EIGRP
- OSPF
- RIP
- RIPv1
RIPv1 (Routing Information Protocol version 1) is a classful routing protocol that does not support Variable Length Subnet Masking (VLSM) or Classless Inter-Domain Routing (CIDR).
The _______ feature of EtherChannel helps in avoiding network loops and provides redundancy.
- Load Balancing
- Loop Guard
- Port Security
- Redundancy
The Loop Guard feature of EtherChannel helps in avoiding network loops and provides redundancy.
DNS primarily translates which of the following?
- IP addresses to domain names
- Hostnames to IP addresses
- MAC addresses to IP addresses
- IP addresses to MAC addresses
DNS (Domain Name System) primarily translates hostnames to IP addresses, allowing users to access resources using human-readable names.
When designing a network for a multinational corporation with various branch offices and data centers, which technique is essential to manage the routing tables effectively?
- Border Gateway Protocol (BGP)
- Multi-Protocol Label Switching (MPLS)
- Route Summarization
- Virtual Private Networks (VPNs)
Route summarization is essential when designing a network for a multinational corporation with various branch offices and data centers to manage the routing tables effectively, reducing the size and complexity of routing information.
The A* search algorithm uses a _______ function to estimate the cost of reaching the goal from a given state.
- Admissible
- Cost
- Heuristic
- Informed
A* utilizes a heuristic function to estimate the cost of reaching the goal from a given state. This heuristic guides the search by providing an informed guess about the remaining cost, helping A* prioritize paths likely to lead to the optimal solution efficiently.
Merge sort demonstrates _______ behavior, making it a suitable choice for sorting large datasets.
- Backtracking
- Divide-and-conquer
- Dynamic programming
- Greedy
Merge sort demonstrates divide-and-conquer behavior, as it recursively breaks down the sorting problem into smaller sub-problems, making it efficient for handling large datasets.
How is the coin change problem related to dynamic programming?
- Dynamic programming is employed to solve subproblems efficiently and avoid redundant calculations.
- Dynamic programming is only applicable to certain variations of the problem.
- Dynamic programming is used to count the total number of coins, but not for optimization.
- It isn't related to dynamic programming.
The coin change problem is related to dynamic programming as it involves solving subproblems efficiently and storing their solutions to avoid redundant calculations. Dynamic programming is used to find the optimal combination of coins to minimize the total count.
In cloud computing, ________ is a method used to minimize the risk of data loss and downtime by distributing copies of data across multiple data centers.
- Load Balancing
- Redundancy
- Encryption
- Virtualization
Redundancy in cloud computing involves distributing copies of data across multiple data centers, minimizing the risk of data loss and downtime.
EtherChannel can be configured using which of these methods?
- DHCP (Dynamic Host Configuration Protocol)
- NAT (Network Address Translation)
- RIP (Routing Information Protocol)
- Static configuration
EtherChannel can be configured using static configuration methods, where administrators manually define the channel configuration.