How does a stateful firewall differ from a stateless firewall in terms of traffic filtering?

  • Stateless firewall filters traffic based on source and destination information
  • Stateless firewall examines the state of active connections
  • Stateful firewall filters traffic based on source and destination information
  • Stateful firewall does not keep track of the state of connections
A stateful firewall filters traffic based on the state of active connections, considering the context of the traffic.

In QoS, ________ is a method used to measure and control the rate of traffic sent to the network.

  • Policing
  • Shaping
  • Dropping
  • Queuing
Policing in QoS is a method used to measure and control the rate of traffic sent to the network.

What is the primary purpose of SNMP (Simple Network Management Protocol) in network management?

  • Network Monitoring
  • Device Configuration
  • File Sharing
  • Web Browsing
SNMP is primarily used for network monitoring, allowing devices to be managed and monitored remotely.

What is the effect of placing an ACL close to the source of traffic in a network?

  • Causes network congestion
  • Decreases network performance
  • Has no impact on network traffic
  • Increases network security
Placing an ACL close to the source of traffic increases network security by filtering unwanted traffic before it enters the network.

The use of _________ in QoS refers to inspecting the contents of data packets to assign them to the appropriate traffic class.

  • Policing
  • Shaping
  • Queuing
  • Classification
In QoS, the use of classification refers to inspecting the contents of data packets to assign them to the appropriate traffic class.

In QoS, what does the term 'classification' refer to?

  • Identifying and categorizing network traffic
  • Adjusting the speed of data transmission
  • Managing network congestion
  • Allocating IP addresses
In Quality of Service (QoS), 'classification' involves identifying and categorizing network traffic based on specific criteria to prioritize or treat it differently.

OSPF uses ________ as its algorithm for computing the shortest path through the network.

  • Bellman-Ford algorithm
  • Dijkstra's algorithm
  • Floyd-Warshall algorithm
  • Johnson's algorithm
OSPF uses Dijkstra's algorithm for computing the shortest path through the network.

In DHCP, the _________ period is the time interval that a DHCP client waits before renewing or rebinding its IP address.

  • Lease
  • Renewal
  • Allocation
  • Rebinding
In DHCP, the Renewal period is the time interval that a DHCP client waits before renewing or rebinding its IP address with the DHCP server.

How does GLBP differ from HSRP in terms of gateway load balancing?

  • GLBP allows for load balancing across multiple gateways, while HSRP supports only active/standby mode.
  • HSRP provides better gateway load balancing than GLBP.
  • GLBP and HSRP offer the same load balancing capabilities.
  • GLBP is a Cisco proprietary protocol, while HSRP is an open standard.
GLBP differs from HSRP by allowing load balancing across multiple gateways, providing enhanced gateway load balancing capabilities.

The process of _________ involves a firewall analyzing the content of packets to prevent various types of cyber attacks.

  • Deep Packet Inspection
  • Intrusion Detection
  • Stateful Inspection
  • Packet Filtering
The process of Deep Packet Inspection involves a firewall analyzing the content of packets to prevent various types of cyber attacks.

GRE tunnels are primarily used for which of the following purposes in a network?

  • Encryption
  • Compression
  • Tunneling
  • Authentication
GRE tunnels are primarily used for tunneling purposes in a network, allowing the encapsulation of a wide variety of network layer protocols.

What OSI layer is equivalent to the combination of the Session, Presentation, and Application layers in the TCP/IP model?

  • Application Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
The Application Layer in the OSI model is equivalent to the combination of the Session, Presentation, and Application layers in the TCP/IP model.