A company is moving from password-based authentication to a more secure method for device access. Which technology should they consider implementing to improve security?

  • VLANs
  • TACACS+
  • NAT
  • ICMP
TACACS+ (Terminal Access Controller Access-Control System Plus) is a technology that provides secure authentication for device access, improving security over password-based authentication.

The integration of _________ in SDN allows for automated network management and orchestration.

  • BGP
  • SNMP
  • Docker
  • VLANs
The integration of SNMP (Simple Network Management Protocol) in SDN allows for automated network management and orchestration.

In QoS, ________ is a mechanism that ensures a specific minimum level of bandwidth to a certain traffic class.

  • Policing
  • Shaping
  • Queuing
  • Guarantees
In Quality of Service (QoS), shaping is a mechanism that ensures a specific minimum level of bandwidth to a certain traffic class.

Which type of ACL is processed first in a Cisco router, standard or extended?

  • Extended
  • It depends on the router model
  • Standard
  • There is no specific order
In a Cisco router, standard ACLs are processed before extended ACLs.

In SDN, the process of centralizing network intelligence and state is known as ________.

  • Virtualization
  • Abstraction
  • Centralization
  • Orchestration
In SDN, the process of centralizing network intelligence and state is known as Centralization.

Which basic tool is commonly used to verify connectivity between two network devices?

  • Multimeter
  • Protocol Analyzer
  • Cable Tester
  • Ping
The basic tool commonly used to verify connectivity between two network devices is the "Ping" tool, which sends a test message to check if a device is reachable.

How does NetFlow assist in network management?

  • Captures and analyzes network traffic
  • Configures routing protocols
  • Monitors device temperature
  • Manages user authentication
NetFlow assists in network management by capturing and analyzing network traffic to provide insights into network utilization and application performance.

A network administrator needs to configure a solution for securely transmitting sensitive data over the internet to a cloud service provider. Which setup should they consider?

  • Direct Internet Connection
  • Site-to-Site VPN
  • Dedicated Leased Line
  • Cloud Connect Service
A site-to-site VPN provides a secure connection over the internet, making it an appropriate choice for transmitting sensitive data to a cloud service provider.

When configuring a VPN, what is an essential consideration for ensuring secure data transmission?

  • Using a static IP address for VPN endpoints to simplify configuration.
  • Enabling split tunneling to optimize network performance.
  • Implementing strong encryption algorithms and key management for data confidentiality.
  • Disabling authentication methods to streamline the VPN connection process.
An essential consideration for ensuring secure data transmission in a VPN is implementing strong encryption algorithms and key management to maintain data confidentiality.

For advanced WAN troubleshooting, which is a key metric to monitor in a network performance management tool?

  • Throughput
  • Latency
  • MTU (Maximum Transmission Unit)
  • Round-Trip Time (RTT)
Latency is a key metric to monitor in a network performance management tool for advanced WAN troubleshooting, as it measures the delay in data transmission.