An organization requires a secure way to connect remote workers to its central office. Which technology would provide a secure and cost-effective solution?
- VPN (Virtual Private Network)
- MPLS
- ISDN
- DSL
A VPN (Virtual Private Network) would provide a secure and cost-effective solution for connecting remote workers to the central office over the internet.
In IPv6, the ________ address is used for multicast traffic to communicate with multiple devices simultaneously.
- Anycast
- Unicast
- Broadcast
- Multicast
In IPv6, the Multicast address is used for multicast traffic to communicate with multiple devices simultaneously.
________ is a technique used in BGP to filter out undesired routes.
- Prefix Filtering
- Route Aggregation
- Route Summarization
- Route Filtering
Route filtering is a technique used in BGP to filter out undesired routes.
In the context of device security, what is a major risk of using default passwords?
- Improved User Convenience
- Enhanced Device Performance
- Increased Resistance to Cyber Attacks
- Vulnerability to Unauthorized Access
Using default passwords poses a major risk by creating vulnerability to unauthorized access, as attackers often exploit devices with unchanged default credentials.
An enterprise wants to enhance its network security through granular control of network traffic. Which aspect of SDN would be most beneficial?
- OpenFlow
- Southbound API
- Northbound API
- Network Virtualization
OpenFlow, as part of SDN, allows granular control of network traffic by defining how packets are forwarded through network devices, enhancing security measures.
What is a major security challenge in implementing SDN in an enterprise network?
- Insecure APIs and communication channels between the SDN controller and network devices.
- Lack of scalability, making it difficult to secure large SDN deployments.
- The absence of firewalls in SDN, exposing the network to external threats.
- Limited support for encryption protocols in SDN environments.
A major security challenge in SDN is insecure APIs and communication channels between the controller and network devices, posing vulnerabilities.
Port Security is typically implemented on _________ ports to restrict the number of valid MAC addresses.
- Access
- Dynamic
- EtherChannel
- Trunk
Port Security is typically implemented on Access ports to restrict the number of valid MAC addresses.
Which network topology features a central hub or switch where all nodes are connected, offering simplicity but creating a single point of failure?
- Bus
- Mesh
- Ring
- Star
In a star topology, all nodes are connected to a central hub or switch, providing simplicity but creating a single point of failure.
For high-capacity data transmission within a metropolitan area, ________ is a preferred choice.
- Fiber Optics
- Satellite
- Coaxial Cable
- Microwave
For high-capacity data transmission within a metropolitan area, Fiber Optics is a preferred choice due to its high bandwidth and low signal loss.
In the context of advanced firewall configuration, what is deep packet inspection (DPI)?
- A method to analyze and filter the actual content of data packets at the application layer
- A technique to quickly route packets based on their source and destination addresses
- A process of encrypting packet headers for enhanced security
- A mechanism to reduce latency by inspecting only packet headers
Deep packet inspection (DPI) involves analyzing and filtering the actual content of data packets at the application layer, providing advanced security capabilities.