_________ is a method used in conjunction with Port Security to specify a predefined action when a security violation occurs.
- MAC Address Filtering
- STP
- VLAN
- Violation Mode
Violation Mode is a method used in conjunction with Port Security to specify a predefined action when a security violation occurs.
For connecting servers to a SAN (Storage Area Network), ________ cables are often used due to their high-speed data transfer capabilities.
- Coaxial
- Fiber optic
- HDMI
- Twisted pair
For connecting servers to a SAN, fiber optic cables are often used due to their high-speed data transfer capabilities.
In SNMP, what term is used to describe a set of variables on the managed device that store information about the device?
- MIB
- OID
- SNMPSET
- TRAP
MIB (Management Information Base) is the term used to describe a set of variables on the managed device that store information about the device in SNMP.
The integration of DHCP Snooping with _________ helps in mitigating ARP poisoning attacks on a network.
- Dynamic ARP Inspection
- IP Source Guard
- Port Security
- VLAN ACLs
Integrating DHCP Snooping with Dynamic ARP Inspection helps mitigate ARP poisoning attacks by validating ARP packets.
______ routing is preferred in environments where network traffic patterns are predictable and do not change often.
- Default
- Dynamic
- Hybrid
- Static
Static routing is preferred in environments where network traffic patterns are predictable and do not change often.
The process of ________ involves assigning different priority levels to various types of network traffic in QoS.
- Shaping
- Marking
- Scheduling
- Queuing
In Quality of Service (QoS), the process of marking involves assigning different priority levels to various types of network traffic.
Which redundancy protocol provides load balancing over multiple routers along with redundancy?
- HSRP
- VRRP
- GLBP
- OSPF
Gateway Load Balancing Protocol (GLBP) provides load balancing over multiple routers along with redundancy.
Which part of an IPv4 address identifies the network portion and the host portion?
- Domain
- Host
- Network
- Subnet
In an IPv4 address, the subnet portion identifies the network, and the host portion identifies the specific device on that network.
__________ involves identifying and resolving issues through a process of elimination, focusing on the most likely causes first.
- Troubleshooting
- Root Cause Analysis
- Network Optimization
- Diagnostic Testing
Root cause analysis involves identifying and resolving issues through a process of elimination, focusing on the most likely causes first.
________ is a cloud computing service model where hardware, software, servers, storage, and network components are provided to the customer.
- IaaS (Infrastructure as a Service)
- PaaS (Platform as a Service)
- SaaS (Software as a Service)
- XaaS (Everything as a Service)
In IaaS (Infrastructure as a Service), all the essential components of cloud infrastructure are provided to the customer.