Which tool is most commonly used for basic troubleshooting of WAN links?
- Ping
- Traceroute
- SNMP
- Nmap
Ping is commonly used for basic troubleshooting of WAN links as it helps verify connectivity and measure round-trip time.
What is the best practice for applying ACLs in a network to maximize efficiency and security?
- Apply ACLs as close to the source as possible
- Apply ACLs at the core layer
- Apply ACLs on distribution switches
- Apply ACLs on the perimeter router
The best practice is to apply ACLs as close to the source as possible to minimize unnecessary traffic on the network and maximize security.
What is the difference between hard and soft QoS policies in terms of enforcement and flexibility?
- Hard QoS: Strict enforcement, less flexibility. Soft QoS: Flexible enforcement, more adaptability.
- Hard QoS: Flexible enforcement, more adaptability. Soft QoS: Strict enforcement, less flexibility.
- Hard QoS: Applied to voice traffic. Soft QoS: Applied to video traffic.
- Hard QoS: Priority for real-time applications. Soft QoS: Priority for non-real-time applications.
The difference between hard and soft QoS policies lies in their enforcement and flexibility. Hard QoS enforces strict rules with less flexibility, while soft QoS offers more adaptability.
In which routing method are routing decisions made based on pre-determined, static routes that do not change unless manually updated?
- Default Routing
- Dynamic Routing
- Hybrid Routing
- Static Routing
In static routing, routing decisions are made based on pre-determined, static routes that do not change unless manually updated.
________ is a WAN technology that prioritizes data packets based on labels instead of IP addresses.
- MPLS (Multiprotocol Label Switching)
- VPN (Virtual Private Network)
- DNS (Domain Name System)
- DHCP (Dynamic Host Configuration Protocol)
MPLS is a WAN technology that prioritizes data packets based on labels instead of IP addresses.
Which device is used to connect multiple devices within one local network, often used in homes and small businesses?
- Hub
- Modem
- Router
- Switch
A switch is used to connect multiple devices within one local network, commonly used in homes and small businesses.
For a small network with a stable topology, which routing method is generally more cost-effective and simpler to manage?
- Default Routing
- Dynamic Routing
- Hybrid Routing
- Static Routing
Static routing is generally more cost-effective and simpler to manage for small networks with stable topologies as it involves manually configuring routes.
A network engineer needs to design a network that can efficiently handle varying types of traffic, such as voice, video, and data. What technology would be most suitable for such requirements?
- QoS (Quality of Service)
- VLAN (Virtual Local Area Network)
- MPLS
- Frame Relay
QoS (Quality of Service) technology is most suitable for designing a network that can efficiently handle varying types of traffic, ensuring the prioritization of voice, video, and data.
SNMP operates in the ______ layer of the OSI model, providing a framework for managing devices in a network.
- Application
- Data Link
- Network
- Presentation
SNMP operates in the Application layer of the OSI model, providing a framework for managing devices in a network.
In network scripting, _______ patterns are used to extract specific information from structured text like logs or configuration files.
- Regular Expression
- JSON
- XPath
- YAML
In network scripting, Regular Expression patterns are used to extract specific information from structured text like logs or configuration files.
In AAA, ________ determines what resources a user can access and what operations they can perform.
- Authentication
- Authorization
- Accounting
- All of the Above
In AAA, Authorization determines what resources a user can access and what operations they can perform.
How does DHCP Snooping enhance network security?
- Blocks all DHCP traffic
- Enables dynamic IP allocation
- Encrypts DHCP messages
- Filters unauthorized DHCP messages
DHCP Snooping enhances network security by filtering unauthorized DHCP messages, preventing malicious DHCP attacks such as DHCP spoofing and starvation.