How does switch stacking impact the scalability of a network infrastructure?

  • Decreases Scalability
  • Depends on the Network Topology
  • Increases Scalability
  • No Impact on Scalability
Switch stacking increases scalability by allowing multiple physical switches to be managed as a single entity, simplifying network administration and expanding port density.

What is the purpose of using an extended access list in network configuration?

  • To filter traffic based on source and destination IP addresses
  • To control access to network resources with more granularity
  • To provide basic packet filtering
  • To prioritize network traffic based on applications
An extended access list allows for more granular control over network traffic, specifying detailed conditions for filtering.

The process of ________ involves assigning different priority levels to various types of network traffic in QoS.

  • Shaping
  • Marking
  • Scheduling
  • Queuing
In Quality of Service (QoS), the process of marking involves assigning different priority levels to various types of network traffic.

Which redundancy protocol provides load balancing over multiple routers along with redundancy?

  • HSRP
  • VRRP
  • GLBP
  • OSPF
Gateway Load Balancing Protocol (GLBP) provides load balancing over multiple routers along with redundancy.

Which part of an IPv4 address identifies the network portion and the host portion?

  • Domain
  • Host
  • Network
  • Subnet
In an IPv4 address, the subnet portion identifies the network, and the host portion identifies the specific device on that network.

__________ involves identifying and resolving issues through a process of elimination, focusing on the most likely causes first.

  • Troubleshooting
  • Root Cause Analysis
  • Network Optimization
  • Diagnostic Testing
Root cause analysis involves identifying and resolving issues through a process of elimination, focusing on the most likely causes first.

________ is a cloud computing service model where hardware, software, servers, storage, and network components are provided to the customer.

  • IaaS (Infrastructure as a Service)
  • PaaS (Platform as a Service)
  • SaaS (Software as a Service)
  • XaaS (Everything as a Service)
In IaaS (Infrastructure as a Service), all the essential components of cloud infrastructure are provided to the customer.

Which type of VPN would be most suitable for a user who frequently travels and needs secure access to the corporate network?

  • Site-to-Site VPN
  • Remote Access VPN
  • MPLS VPN
  • PPTP VPN
A Remote Access VPN is most suitable for a user who frequently travels and needs secure access to the corporate network from various locations.

An organization requires a secure way to connect remote workers to its central office. Which technology would provide a secure and cost-effective solution?

  • VPN (Virtual Private Network)
  • MPLS
  • ISDN
  • DSL
A VPN (Virtual Private Network) would provide a secure and cost-effective solution for connecting remote workers to the central office over the internet.

In IPv6, the ________ address is used for multicast traffic to communicate with multiple devices simultaneously.

  • Anycast
  • Unicast
  • Broadcast
  • Multicast
In IPv6, the Multicast address is used for multicast traffic to communicate with multiple devices simultaneously.