A network engineer is designing a network for a small company. They need a simple, cost-effective topology that is easy to set up and manage. Which topology should they consider?

  • Bus
  • Mesh
  • Ring
  • Star
For a small company with the need for a simple, cost-effective topology that is easy to set up and manage, a star topology is suitable.

What is the primary purpose of subnetting in IP networking?

  • Enhance network security
  • Improve network performance
  • Increase the number of available host addresses
  • Simplify IP address management
The primary purpose of subnetting is to increase the number of available host addresses within a network.

Which protocol is commonly used for communication between the SDN controller and network devices?

  • SNMP
  • OSPF
  • OpenFlow
  • BGP
OpenFlow is a widely used protocol for communication between the SDN controller and network devices, enabling centralized control.

In a data center, the network team is implementing EtherChannel to enhance throughput and redundancy. What configuration aspects are critical to ensure optimal performance and reliability?

  • DHCP configuration, broadcast storm control, and OSPF areas
  • Duplex settings, access control lists, and SNMP versions
  • Link aggregation mode, spanning-tree protocol parameters, and interface MTU
  • NAT settings, VLAN pruning, and HSRP priorities
Configuring link aggregation mode, spanning-tree protocol parameters, and interface MTU are critical aspects for ensuring optimal performance and reliability when implementing EtherChannel in a data center.

What is the main security benefit of using NAT in a network infrastructure?

  • It automatically detects and blocks malicious traffic.
  • It hides internal IP addresses from external networks.
  • It implements strong access control policies.
  • It provides encryption for all transmitted data.
The main security benefit of using NAT is that it hides internal IP addresses from external networks, adding a layer of security by obscuring the internal network structure.

How does GRE tunneling differ from traditional VPN tunneling in terms of encryption and security features?

  • GRE focuses on providing a simple encapsulation method without inherent encryption.
  • GRE offers stronger encryption and security features compared to traditional VPNs.
  • GRE and traditional VPNs have identical encryption and security features.
  • GRE and traditional VPNs do not support encryption.
GRE primarily provides encapsulation and does not inherently offer encryption, unlike traditional VPNs that focus on security features.

In a stacked configuration, individual switches are interconnected using a ________ link.

  • Backbone
  • Mesh
  • Trunk
  • Uplink
In a stacked configuration, individual switches are interconnected using a trunk link to facilitate communication and coordination.

In an organization looking to scale its network infrastructure with minimal physical changes, which SDN capability would be most critical?

  • Network Function Virtualization (NFV)
  • Southbound API
  • Northbound API
  • Control Plane Separation
Network Function Virtualization (NFV) in SDN allows scaling the network infrastructure by virtualizing network functions, minimizing the need for physical changes.

A _________ is a set of rules applied to a router to control network traffic and mitigate security risks.

  • Firewall
  • Protocol
  • Routing Table
  • Access Control List (ACL)
An Access Control List (ACL) is a set of rules applied to a router to control network traffic and mitigate security risks.

________ computing involves abstracting the underlying infrastructure in a way that allows software containers to deploy and run consistently across various computing environments.

  • Edge
  • Container
  • Quantum
  • Fog
Container computing involves abstracting the underlying infrastructure to enable software containers to deploy and run consistently across various computing environments.

Which feature of SDN allows for the creation of virtual networks over the physical network infrastructure?

  • Network Virtualization
  • OpenFlow
  • SDN Controller
  • Traffic Engineering
Network virtualization in SDN enables the creation of virtual networks over the physical network infrastructure.

In DHCP, what is the purpose of the lease time?

  • To specify the client's hardware address
  • To determine the subnet mask
  • To define the period a client can use an IP address
  • To assign a default gateway
The lease time in DHCP defines the period during which a client can use the assigned IP address before renewal is required.