In the context of advanced firewall configuration, what is deep packet inspection (DPI)?

  • A method to analyze and filter the actual content of data packets at the application layer
  • A technique to quickly route packets based on their source and destination addresses
  • A process of encrypting packet headers for enhanced security
  • A mechanism to reduce latency by inspecting only packet headers
Deep packet inspection (DPI) involves analyzing and filtering the actual content of data packets at the application layer, providing advanced security capabilities.

For high-capacity data transmission within a metropolitan area, ________ is a preferred choice.

  • Fiber Optics
  • Satellite
  • Coaxial Cable
  • Microwave
For high-capacity data transmission within a metropolitan area, Fiber Optics is a preferred choice due to its high bandwidth and low signal loss.

Which network topology features a central hub or switch where all nodes are connected, offering simplicity but creating a single point of failure?

  • Bus
  • Mesh
  • Ring
  • Star
In a star topology, all nodes are connected to a central hub or switch, providing simplicity but creating a single point of failure.

Port Security is typically implemented on _________ ports to restrict the number of valid MAC addresses.

  • Access
  • Dynamic
  • EtherChannel
  • Trunk
Port Security is typically implemented on Access ports to restrict the number of valid MAC addresses.

What is a major security challenge in implementing SDN in an enterprise network?

  • Insecure APIs and communication channels between the SDN controller and network devices.
  • Lack of scalability, making it difficult to secure large SDN deployments.
  • The absence of firewalls in SDN, exposing the network to external threats.
  • Limited support for encryption protocols in SDN environments.
A major security challenge in SDN is insecure APIs and communication channels between the controller and network devices, posing vulnerabilities.

An enterprise wants to enhance its network security through granular control of network traffic. Which aspect of SDN would be most beneficial?

  • OpenFlow
  • Southbound API
  • Northbound API
  • Network Virtualization
OpenFlow, as part of SDN, allows granular control of network traffic by defining how packets are forwarded through network devices, enhancing security measures.

In the context of device security, what is a major risk of using default passwords?

  • Improved User Convenience
  • Enhanced Device Performance
  • Increased Resistance to Cyber Attacks
  • Vulnerability to Unauthorized Access
Using default passwords poses a major risk by creating vulnerability to unauthorized access, as attackers often exploit devices with unchanged default credentials.

________ is a technique used in BGP to filter out undesired routes.

  • Prefix Filtering
  • Route Aggregation
  • Route Summarization
  • Route Filtering
Route filtering is a technique used in BGP to filter out undesired routes.

In ______, the active virtual gateway (AVG) assigns a virtual MAC address to each member of the GLBP group.

  • HSRP
  • GLBP
  • VRRP
  • OSPF
In GLBP (Gateway Load Balancing Protocol), the active virtual gateway (AVG) assigns a virtual MAC address to each member of the GLBP group.

A company's network often experiences changes in topology due to frequent addition and removal of devices. Which routing method should they primarily use?

  • Default Routing
  • Dynamic Routing
  • Policy-Based Routing
  • Static Routing
Dynamic Routing is the most appropriate for a network with frequent topology changes as it can adapt to changes automatically.

When a company is merging with another and needs to integrate their networks without redesigning IP addressing, which tunneling method is often used to simplify this process?

  • IPsec
  • L2TP
  • MPLS
  • GRE
GRE (Generic Routing Encapsulation) tunneling is often used when merging networks to integrate them without redesigning IP addressing, simplifying the integration process.

________ mechanisms in QoS help to avoid packet loss during high traffic periods by temporarily storing excess packets.

  • Congestion Avoidance
  • Traffic Shaping
  • Packet Sniffing
  • Bandwidth Policing
Congestion Avoidance mechanisms in QoS help to avoid packet loss during high traffic periods by temporarily storing excess packets.