The ________ layer of the OSI model ensures data integrity and error recovery at the transport level.
- Data Link
- Network
- Physical
- Transport
The Transport layer of the OSI model ensures data integrity and error recovery at the transport level.
In setting up a small office network, which device would be the most cost-effective for connecting multiple PCs while ensuring basic connectivity?
- Bridge
- Hub
- Router
- Switch
A hub is the most cost-effective device for connecting multiple PCs in a small office network, ensuring basic connectivity without advanced features.
________ is a secure alternative to Telnet for accessing command-line interfaces on network devices.
- SSH
- SNMP
- SMTP
- HTTPS
SSH (Secure Shell) is a secure alternative to Telnet for accessing command-line interfaces on network devices.
How does dynamic routing differ from static routing in terms of scalability in a growing network?
- Both dynamic and static routing have similar scalability in a growing network.
- Dynamic routing is more scalable as it adapts to changes in the network, while static routing becomes impractical in a large and dynamic environment.
- Scalability is not a consideration in routing protocols.
- Static routing is more scalable as it allows for easy management of routes, while dynamic routing may become complex and less scalable as the network grows.
Dynamic routing is more scalable in a growing network as it can adapt to changes, making it suitable for larger and dynamic environments.
What is the primary benefit of using microservices architecture in cloud-based applications?
- Improved scalability, flexibility, and easier maintenance
- Reduced reliance on cloud services
- Simplified monolithic application structure
- Enhanced security through centralized control
The primary benefit of using microservices architecture in cloud-based applications is improved scalability, flexibility, and easier maintenance, as it allows for the independent development and deployment of services.
GRE tunnels are often used in conjunction with _______ to provide a more secure VPN solution.
- IPsec
- SSL/TLS
- PPTP
- L2TP
GRE tunnels are often used in conjunction with IPsec to provide a more secure VPN solution.
How does STP's root bridge election process determine which switch will be the root bridge in a network?
- Highest IP Address
- Highest MAC Address
- Lowest IP Address
- Lowest MAC Address
The root bridge is determined in the STP election process based on the switch with the lowest Bridge ID, which includes the priority and MAC address.
A non-root bridge port that is selected to forward traffic towards the root bridge is called a _______ port.
- Blocking Port
- Designated Port
- Listening Port
- Root Port
A non-root bridge port that is selected to forward traffic towards the root bridge is called a Root Port. The Root Port offers the shortest path to the root bridge.
_________ enables dynamic, programmatically efficient network configuration in SDN to improve network performance and monitoring.
- OpenFlow
- REST API
- Python scripting
- NETCONF
OpenFlow enables dynamic, programmatically efficient network configuration in SDN to improve network performance and monitoring.
What is a key benefit of implementing TACACS+ in AAA?
- Centralized Authentication
- Encryption of Data
- Load Balancing
- Port Security
TACACS+ provides centralized authentication, which is a key benefit in AAA (Authentication, Authorization, and Accounting) systems.
A network administrator is tasked with designing a subnetting scheme for a university campus. The scheme needs to efficiently accommodate varying sizes of departments and user groups. What approach should they adopt?
- CIDR (Classless Inter-Domain Routing)
- Classful Subnetting
- Supernetting
- Variable Length Subnet Masking (VLSM)
Variable Length Subnet Masking (VLSM) is suitable for accommodating varying sizes of departments and user groups in a subnetting scheme for a university campus.
________ is a network device that strengthens the signal along a network cable and works on the principle of signal regeneration.
- Bridge
- Hub
- Modem
- Repeater
A Repeater is a network device that strengthens the signal along a network cable and works on the principle of signal regeneration.