The _______ mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.

  • Blocking
  • Forwarding
  • Listening
  • Root Guard
The blocking mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.

In WAN optimization, what is the main purpose of implementing compression techniques?

  • Reduce data transfer time
  • Increase data integrity
  • Improve network security
  • Minimize latency
The main purpose of implementing compression techniques in WAN optimization is to reduce data transfer time by compressing the data before transmission.

When designing a network monitoring system, an administrator decides to use a protocol that supports both polling and unsolicited updates from network devices. Which protocol should they use?

  • SNMP
  • Syslog
  • NetFlow
  • ICMP
SNMP (Simple Network Management Protocol) supports both polling (active requests for information) and unsolicited updates (traps) from network devices, making it suitable for a comprehensive network monitoring system.

What is the role of YAML in network automation scripts?

  • It defines network protocols for communication.
  • It is used for configuring network devices directly.
  • It is a scripting language for automation.
  • It provides a human-readable data format for configuration files.
YAML in network automation scripts plays the role of providing a human-readable data format for configuration files, making it easier for users to understand and modify configurations.

During an audit, it's found that an unauthorized DHCP server is distributing IP addresses, leading to network issues. Which Layer 2 feature can prevent this scenario?

  • DHCP Snooping
  • MAC Spoofing
  • Port Security
  • VLANs
DHCP Snooping is a Layer 2 feature that can prevent unauthorized DHCP servers from distributing IP addresses, ensuring network integrity.

_________ is a QoS technique that allows categorizing traffic into multiple classes based on priority.

  • Traffic Policing
  • Traffic Shaping
  • Classification
  • Marking
Classification is a QoS technique that allows categorizing traffic into multiple classes based on priority.

Which legacy WAN technology was historically used for connecting distant networks but is now largely replaced by more modern technologies?

  • ISDN (Integrated Services Digital Network)
  • Frame Relay
  • DSL
  • Satellite
Frame Relay, a legacy WAN technology, was historically used for connecting distant networks but is now largely replaced by more modern technologies.

How does VLSM contribute to more efficient use of IP address space?

  • It allocates larger address blocks
  • It allows subnetting of subnets
  • It reduces the need for NAT
  • It uses IPv6 exclusively
VLSM (Variable Length Subnet Masking) allows subnetting of subnets, enabling more efficient utilization of IP address space by assigning different-sized subnets based on network requirements.

________ is a key protocol in IPv6 that replaces ARP used in IPv4 for resolving IP addresses to MAC addresses.

  • Neighbor Discovery Protocol (NDP)
  • Internet Group Management Protocol (IGMPv6)
  • Reverse Address Resolution Protocol (RARP)
  • Border Gateway Protocol (BGP)
Neighbor Discovery Protocol (NDP) is a key protocol in IPv6 that replaces ARP used in IPv4 for resolving IP addresses to MAC addresses.

What is a key advantage of using MetroEthernet in a corporate WAN environment?

  • MetroEthernet provides higher bandwidth and lower latency than traditional WAN technologies.
  • MetroEthernet supports only point-to-point connections, ensuring secure data transmission.
  • MetroEthernet operates exclusively over wireless connections, reducing cable infrastructure costs.
  • MetroEthernet is limited to small-scale deployments and is not suitable for corporate WANs.
A key advantage of using MetroEthernet in a corporate WAN environment is its ability to provide higher bandwidth and lower latency compared to traditional WAN technologies.