What is the primary benefit of switch stacking in a network environment?

  • Better Performance
  • Enhanced Redundancy
  • Improved Security
  • Increased Scalability
The primary benefit of switch stacking is increased scalability, allowing multiple switches to be interconnected and managed as a single logical unit.

The _______ mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.

  • Blocking
  • Forwarding
  • Listening
  • Root Guard
The blocking mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.

In WAN optimization, what is the main purpose of implementing compression techniques?

  • Reduce data transfer time
  • Increase data integrity
  • Improve network security
  • Minimize latency
The main purpose of implementing compression techniques in WAN optimization is to reduce data transfer time by compressing the data before transmission.

To enable many users in a local network to access the internet simultaneously, _________ technique is employed.

  • NAT (Network Address Translation)
  • Proxy Server
  • VLAN (Virtual Local Area Network)
  • VPN (Virtual Private Network)
Network Address Translation (NAT) is employed to enable many users in a local network to access the internet simultaneously.

A company's security policy requires that all remote communications with the corporate network must be encrypted and authenticated. Which technology would best fit these requirements?

  • VPN (Virtual Private Network)
  • SSL/TLS (Secure Sockets Layer/Transport Layer Security)
  • IPsec (Internet Protocol Security)
  • SSH (Secure Shell)
IPsec is commonly used for encrypting and authenticating remote communications, making it suitable for the described security policy.

In advanced network automation, what is the significance of using containerization technologies like Docker?

  • Containers isolate network configurations for security
  • Docker simplifies the deployment and scaling of network applications
  • Containerization reduces the need for network automation
  • Docker provides a graphical user interface for network management
Containerization technologies like Docker simplify the deployment and scaling of network applications in advanced network automation, enhancing flexibility and efficiency.

IPSec's ________ mode encrypts the entire IP packet for secure data transmission.

  • Transport
  • Tunnel
  • Network
  • Security
IPSec's Tunnel mode encrypts the entire IP packet for secure data transmission.

What is the role of YAML in network automation scripts?

  • It defines network protocols for communication.
  • It is used for configuring network devices directly.
  • It is a scripting language for automation.
  • It provides a human-readable data format for configuration files.
YAML in network automation scripts plays the role of providing a human-readable data format for configuration files, making it easier for users to understand and modify configurations.

During an audit, it's found that an unauthorized DHCP server is distributing IP addresses, leading to network issues. Which Layer 2 feature can prevent this scenario?

  • DHCP Snooping
  • MAC Spoofing
  • Port Security
  • VLANs
DHCP Snooping is a Layer 2 feature that can prevent unauthorized DHCP servers from distributing IP addresses, ensuring network integrity.

_________ is a QoS technique that allows categorizing traffic into multiple classes based on priority.

  • Traffic Policing
  • Traffic Shaping
  • Classification
  • Marking
Classification is a QoS technique that allows categorizing traffic into multiple classes based on priority.