Port Security is typically implemented on _________ ports to restrict the number of valid MAC addresses.

  • Access
  • Dynamic
  • EtherChannel
  • Trunk
Port Security is typically implemented on Access ports to restrict the number of valid MAC addresses.

Which network topology features a central hub or switch where all nodes are connected, offering simplicity but creating a single point of failure?

  • Bus
  • Mesh
  • Ring
  • Star
In a star topology, all nodes are connected to a central hub or switch, providing simplicity but creating a single point of failure.

For high-capacity data transmission within a metropolitan area, ________ is a preferred choice.

  • Fiber Optics
  • Satellite
  • Coaxial Cable
  • Microwave
For high-capacity data transmission within a metropolitan area, Fiber Optics is a preferred choice due to its high bandwidth and low signal loss.

In the context of advanced firewall configuration, what is deep packet inspection (DPI)?

  • A method to analyze and filter the actual content of data packets at the application layer
  • A technique to quickly route packets based on their source and destination addresses
  • A process of encrypting packet headers for enhanced security
  • A mechanism to reduce latency by inspecting only packet headers
Deep packet inspection (DPI) involves analyzing and filtering the actual content of data packets at the application layer, providing advanced security capabilities.

What is the impact of having a large number of OSPF areas on network performance?

  • Enhances network performance by reducing the size of the OSPF database and shortening SPF calculation times.
  • Has no impact on network performance as OSPF is designed to efficiently handle a large number of areas.
  • Improves network scalability, but at the cost of increased routing table size.
  • May degrade network performance due to increased LSA propagation and SPF computation overhead.
A large number of OSPF areas can impact network performance by increasing LSA propagation and SPF computation overhead, potentially leading to degradation.

An ISP needs to control network congestion during peak hours. What QoS strategy should they employ to manage bandwidth usage effectively?

  • Weighted Random Early Detection (WRED)
  • Traffic Policing
  • Class-Based Weighted Fair Queuing (CBWFQ)
  • Congestion Avoidance
Weighted Random Early Detection (WRED) is a congestion avoidance technique that an ISP can use to control network congestion during peak hours.

The election of the master virtual router in _______ is based on the priority configured on the routers participating in the VRRP group.

  • HSRP
  • GLBP
  • VRRP
  • OSPF
In VRRP (Virtual Router Redundancy Protocol), the election of the master virtual router is based on the priority configured on the routers participating in the VRRP group.

PPP (Point-to-Point Protocol) is primarily used for establishing a direct connection between two nodes in what type of network configurations?

  • LAN
  • WAN
  • MAN
  • PAN
PPP is primarily used for establishing a direct connection between two nodes in Wide Area Network (WAN) configurations.

What is the significance of the Network Interface Layer in the TCP/IP model in relation to OSI's Data Link Layer?

  • Handles flow control between devices on the same network
  • Manages error detection and correction
  • Provides a reliable and error-free link between two directly connected nodes
  • Responsible for logical addressing using MAC addresses
The Network Interface Layer in the TCP/IP model is significant as it is responsible for logical addressing using MAC addresses, akin to the OSI Data Link Layer.

In a network using multiple routing protocols, _________ is used to facilitate communication between different network segments.

  • BGP
  • OSPF
  • Route Redistribution
  • Route Summarization
In a network with multiple routing protocols, route redistribution is used to facilitate communication between different network segments by sharing routes between protocols.