In the context of device security, what is a major risk of using default passwords?

  • Improved User Convenience
  • Enhanced Device Performance
  • Increased Resistance to Cyber Attacks
  • Vulnerability to Unauthorized Access
Using default passwords poses a major risk by creating vulnerability to unauthorized access, as attackers often exploit devices with unchanged default credentials.

________ is a technique used in BGP to filter out undesired routes.

  • Prefix Filtering
  • Route Aggregation
  • Route Summarization
  • Route Filtering
Route filtering is a technique used in BGP to filter out undesired routes.

In ______, the active virtual gateway (AVG) assigns a virtual MAC address to each member of the GLBP group.

  • HSRP
  • GLBP
  • VRRP
  • OSPF
In GLBP (Gateway Load Balancing Protocol), the active virtual gateway (AVG) assigns a virtual MAC address to each member of the GLBP group.

A company's network often experiences changes in topology due to frequent addition and removal of devices. Which routing method should they primarily use?

  • Default Routing
  • Dynamic Routing
  • Policy-Based Routing
  • Static Routing
Dynamic Routing is the most appropriate for a network with frequent topology changes as it can adapt to changes automatically.

When a company is merging with another and needs to integrate their networks without redesigning IP addressing, which tunneling method is often used to simplify this process?

  • IPsec
  • L2TP
  • MPLS
  • GRE
GRE (Generic Routing Encapsulation) tunneling is often used when merging networks to integrate them without redesigning IP addressing, simplifying the integration process.

________ mechanisms in QoS help to avoid packet loss during high traffic periods by temporarily storing excess packets.

  • Congestion Avoidance
  • Traffic Shaping
  • Packet Sniffing
  • Bandwidth Policing
Congestion Avoidance mechanisms in QoS help to avoid packet loss during high traffic periods by temporarily storing excess packets.

PPP (Point-to-Point Protocol) is primarily used for establishing a direct connection between two nodes in what type of network configurations?

  • LAN
  • WAN
  • MAN
  • PAN
PPP is primarily used for establishing a direct connection between two nodes in Wide Area Network (WAN) configurations.

The election of the master virtual router in _______ is based on the priority configured on the routers participating in the VRRP group.

  • HSRP
  • GLBP
  • VRRP
  • OSPF
In VRRP (Virtual Router Redundancy Protocol), the election of the master virtual router is based on the priority configured on the routers participating in the VRRP group.

An ISP needs to control network congestion during peak hours. What QoS strategy should they employ to manage bandwidth usage effectively?

  • Weighted Random Early Detection (WRED)
  • Traffic Policing
  • Class-Based Weighted Fair Queuing (CBWFQ)
  • Congestion Avoidance
Weighted Random Early Detection (WRED) is a congestion avoidance technique that an ISP can use to control network congestion during peak hours.

How does a next-generation firewall (NGFW) enhance network security compared to traditional firewalls?

  • NGFW integrates intrusion prevention, application awareness, and other advanced features for more comprehensive protection
  • Traditional firewalls have faster throughput compared to NGFW
  • NGFW relies solely on packet filtering, which is more efficient than traditional methods
  • Traditional firewalls are more scalable and adaptable to evolving threats
Next-generation firewalls (NGFW) enhance network security by integrating intrusion prevention, application awareness, and other advanced features for more comprehensive protection compared to traditional firewalls.

The _________ feature of Layer 2 switches is crucial for preventing unauthorized DHCP servers from assigning IP addresses.

  • DHCP Snooping
  • MAC Address Filtering
  • STP
  • VLAN
DHCP Snooping is crucial for preventing unauthorized DHCP servers from assigning IP addresses in Layer 2 switches.

The command 'access-list 100 permit tcp any host 192.168.1.1 eq 80' in Cisco routers is an example of a(n) ________ ACL.

  • Dynamic
  • Extended
  • Named
  • Standard
The command 'access-list 100 permit tcp any host 192.168.1.1 eq 80' in Cisco routers is an example of an Extended ACL.