Which protocol is more secure for remote device management: Telnet or SSH?

  • Telnet
  • SSH
  • SNMP
  • FTP
SSH (Secure Shell) is more secure for remote device management compared to Telnet. Telnet transmits data in plain text, while SSH encrypts the communication for enhanced security.

Which topology is best suited for large-scale networks due to its scalability and decentralized nature?

  • Bus
  • Mesh
  • Star
  • Tree
A tree topology is best suited for large-scale networks due to its scalability and decentralized nature. It combines elements of bus and star topologies.

In a scenario where network issues are intermittent, using ___________ can help in capturing and analyzing transient events.

  • Packet Captures
  • SNMP
  • NetFlow
  • Syslog
Packet captures are invaluable in capturing and analyzing transient events, especially in scenarios with intermittent network issues.

A company is transitioning to a fully automated network system. Which scripting language should they prioritize for their network engineers to learn for efficient automation and script-based configurations?

  • Python
  • Java
  • C++
  • Ruby
Python is widely used for network automation due to its simplicity, readability, and extensive libraries like Netmiko and NAPALM.

What is the primary goal of WAN optimization in a corporate network environment?

  • Reduce latency
  • Increase bandwidth
  • Enhance security
  • Minimize packet loss
The primary goal of WAN optimization is to increase the efficiency of data transfer across a corporate network by enhancing bandwidth utilization.

For a business expanding its operations internationally, which WAN optimization strategy would best support efficient and reliable communication between global offices?

  • Multiprotocol Label Switching (MPLS)
  • Virtual Private Network (VPN)
  • Content Delivery Network (CDN)
  • Wide Area Application Services (WAAS)
Using a Content Delivery Network (CDN) can help optimize communication between global offices by caching content closer to users and reducing latency.

A simple network device that connects other devices to a network and operates on the principle of electrical signal amplification is a _______.

  • Hub
  • Repeater
  • Router
  • Switch
A repeater is a simple network device that connects other devices to a network and operates on the principle of electrical signal amplification.

For a company that uses a mix of legacy and modern systems, which strategy would be most effective in managing both IPv4 and IPv6 addresses?

  • Dual-Stack
  • Subnetting
  • Tunneling
  • VLAN
Implementing a dual-stack strategy allows a company to manage both IPv4 and IPv6 addresses effectively, accommodating legacy and modern systems.

A company is experiencing slow data transfers over its WAN. To address this, what WAN optimization technique would be most effective?

  • Compression
  • Caching
  • Quality of Service (QoS)
  • Traffic Shaping
Compression is a WAN optimization technique that reduces the size of data transferred over the network, improving data transfer speeds.

The _________ is a key component in SNMP, storing data about the managed objects within a device.

  • MIB (Management Information Base)
  • OID (Object Identifier)
  • RMON (Remote Monitoring)
  • ARP (Address Resolution Protocol)
The MIB (Management Information Base) is a key component in SNMP, storing data about the managed objects within a device.

Syslog messages are categorized into different levels, where a level of 0 represents _______.

  • Emergency
  • Debugging
  • Critical
  • Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.

SSH (Secure Shell) is primarily used for what purpose in network security?

  • File Transfer
  • Remote Access
  • Email Security
  • Web Browsing
SSH (Secure Shell) is primarily used for secure remote access to network devices, providing a secure channel for command-line access.