What is the maximum data transmission speed supported by Category 6 (Cat6) Ethernet cables?

  • 1 Gbps
  • 1 Tbps
  • 10 Gbps
  • 100 Gbps
Category 6 (Cat6) Ethernet cables support a maximum data transmission speed of 10 Gbps.

How does a switch learn the MAC addresses of the devices connected to it?

  • ARP requests
  • DHCP leases
  • IP addressing
  • MAC flooding
A switch learns the MAC addresses of devices connected to it by examining the source MAC address of incoming frames and associating them with the corresponding port.

A company is experiencing network congestion issues between its distribution and access layers. How can EtherChannel be effectively deployed to address this problem?

  • By aggregating multiple links into a logical bundle to increase bandwidth
  • By configuring static IP routes to improve packet forwarding
  • By disabling spanning-tree protocol to eliminate redundant paths
  • By implementing VLAN trunking to isolate traffic
EtherChannel can be effectively deployed by aggregating multiple links into a logical bundle to increase bandwidth and address network congestion issues between the distribution and access layers.

In basic access-list configuration, which command is used to permit or deny traffic based on IP address?

  • ALLOW
  • DENY
  • PERMIT
  • BLOCK
In basic access-list configuration, the "deny" command is used to deny traffic based on IP address.

An IPv4 address is typically divided into two parts: the ________ and the host identifier.

  • Gateway
  • Network portion
  • Prefix
  • Subnet portion
An IPv4 address is typically divided into two parts: the network portion and the host identifier. The network portion identifies the network to which the host belongs.

A company's security policy requires masking the internal IP addresses when accessing external websites. What configuration should the network engineer implement?

  • Dynamic NAT
  • NAT Overload
  • PAT
  • Static NAT
Static NAT should be implemented to mask internal IP addresses when accessing external websites, as it provides a one-to-one mapping of internal and external addresses.

In an organization, an auditor requires a system that can report on all individual user activities across network devices. Which aspect of AAA should be emphasized?

  • Authentication
  • Authorization
  • Accounting
  • Auditing
The Accounting aspect of AAA (Authentication, Authorization, and Accounting) is emphasized when reporting on individual user activities across network devices.

What is the primary purpose of DHCP in a network?

  • Assigning IP addresses dynamically
  • Resolving domain names to IP addresses
  • Managing network security
  • Establishing physical connections
DHCP (Dynamic Host Configuration Protocol) is primarily used for dynamically assigning IP addresses to devices on a network.

A network engineer needs to configure a device to send real-time alerts for specific events. Which SNMP component should they configure?

  • SNMP Manager
  • SNMP Agent
  • SNMP Trap
  • SNMP Get
To send real-time alerts for specific events, the SNMP Trap component should be configured on the device. SNMP Trap allows devices to send unsolicited messages (traps) to a central SNMP manager.

To avoid overlapping subnets in VLSM, network administrators must ensure ________ between subnet boundaries.

  • Consistency
  • Continuity
  • Separation
  • Synchronization
To avoid overlapping subnets in VLSM, network administrators must ensure separation between subnet boundaries.

If a network administrator is configuring a router to connect different IP networks, which layer of the TCP/IP model are they primarily working with?

  • Application
  • Data Link
  • Network
  • Transport
The network layer of the TCP/IP model (equivalent to the OSI model's Layer 3) is primarily responsible for routing and connecting different IP networks.

What is the primary advantage of using a declarative approach over an imperative approach in network automation?

  • It provides step-by-step instructions for network configuration
  • It focuses on the desired state of the network, allowing automation tools to determine how to achieve it
  • It requires less bandwidth for communication between devices
  • It is more suitable for small-scale networks
Declarative approaches in network automation focus on the desired state of the network, enabling automation tools to determine how to achieve it, which is advantageous for managing complex network configurations.