A network administrator discovers that unauthorized devices are connecting to the network. Which Layer 2 security feature should be implemented to control access based on MAC addresses?

  • DHCP Snooping
  • MAC Spoofing
  • Port Security
  • VLANs
Port Security is a Layer 2 security feature that controls access based on MAC addresses, helping prevent unauthorized devices from connecting to the network.

In a complex network, what is the primary challenge when implementing VLSM?

  • Incompatibility with DHCP
  • Increased routing table complexity
  • Lack of support from network devices
  • Limited number of available IP addresses
In complex networks, the primary challenge when implementing VLSM is increased routing table complexity, as it requires routers to maintain information about subnets of varying sizes.

_________ is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

  • Dynamic NAT
  • NAT Overload
  • PAT (Port Address Translation)
  • Static NAT
PAT (Port Address Translation) is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

A network administrator is implementing a new policy to enhance device security. They need a protocol that encrypts both authentication and session data. Which protocol should they use?

  • SSL/TLS
  • SNMP
  • SSH
  • DHCP
SSH (Secure Shell) is a protocol that encrypts both authentication and session data, providing enhanced device security.

What is the primary purpose of using passwords in network device security?

  • Authentication
  • Authorization
  • Confidentiality
  • Integrity
Passwords in network device security primarily serve the purpose of authentication, ensuring that users are who they claim to be.

What is EtherChannel primarily used for in network configurations?

  • Assigning IP addresses
  • Encrypting data transmission
  • Load balancing
  • Reducing network congestion
EtherChannel is primarily used for load balancing in network configurations, distributing traffic across multiple links.

Which feature in Layer 2 security helps prevent DHCP starvation attacks?

  • DHCP Snooping
  • MAC Filtering
  • Port Security
  • VLANs
DHCP Snooping is a Layer 2 security feature that helps prevent DHCP starvation attacks by inspecting and filtering DHCP messages.

Automating network security tasks is often done using ________, which help in identifying and mitigating security threats.

  • Intrusion Detection Systems
  • Firewalls
  • VPNs
  • Access Control Lists
Automating network security tasks is often done using Intrusion Detection Systems, which help in identifying and mitigating security threats.

In a network with high mobility and frequent device changes, what DHCP feature should be emphasized to manage network addresses effectively?

  • DHCP Reservation
  • DHCP Relay Agent
  • DHCP Lease Time
  • DHCP Option 82
A shorter DHCP lease time should be emphasized in a network with high mobility and frequent device changes to manage network addresses effectively.

The _______ topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors.

  • Hybrid
  • Mesh
  • Ring
  • Star
The Mesh topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors. Mesh networks provide high fault tolerance and scalability due to multiple connections.

What type of WAN connection uses a private network to securely connect remote sites over the internet?

  • VPN (Virtual Private Network)
  • MPLS
  • ISDN (Integrated Services Digital Network)
  • DSL
A VPN (Virtual Private Network) uses a private network to securely connect remote sites over the internet.

QoS policies applied to a network affect which of the following: Bandwidth allocation, Delay, Jitter, or All of these?

  • Bandwidth allocation
  • Delay
  • Jitter
  • All of these
QoS policies applied to a network can affect all of these factors: Bandwidth allocation, Delay, and Jitter.