How does route summarization affect the size of the routing table in a network?

  • Decreases the size by removing unnecessary routes
  • Has no impact on the size of the routing table
  • Increases the size by adding more specific routes
  • Reduces the size by aggregating multiple routes into a single summary route
Route summarization reduces the size of the routing table by aggregating multiple routes into a single summary route, which helps in efficient routing table management.

What type of cabling is recommended for a network that requires a bandwidth of up to 10 Gbps over a distance of 100 meters?

  • Coaxial
  • Ethernet
  • Fiber Optic
  • Twisted Pair
Twisted pair cabling, especially Cat6 or Cat6a, is recommended for a network that requires a bandwidth of up to 10 Gbps over a distance of 100 meters.

The encapsulation of various network layer protocols within IP is a fundamental feature of _______ tunnels.

  • PPTP
  • L2TP
  • GRE
  • SSL/TLS
The encapsulation of various network layer protocols within IP is a fundamental feature of GRE tunnels.

In the OSI model, which layer is responsible for establishing, managing, and terminating connections between applications?

  • Physical Layer
  • Presentation Layer
  • Session Layer
  • Transport Layer
The Session Layer in the OSI model is responsible for establishing, managing, and terminating connections between applications.

The ________ model in cloud computing is best suited for businesses that require high levels of management control over applications and infrastructure.

  • IaaS (Infrastructure as a Service)
  • PaaS (Platform as a Service)
  • SaaS (Software as a Service)
  • XaaS (Everything as a Service)
The IaaS (Infrastructure as a Service) model is best suited for businesses needing high management control over applications and infrastructure.

________ is a standard for connecting high-speed networking and storage systems, using a type of cable that supports both copper and optical interfaces.

  • Ethernet
  • Fibre Channel
  • Thunderbolt
  • USB
Fibre Channel is a standard for connecting high-speed networking and storage systems, supporting both copper and optical interfaces.

In which WAN connection type is traffic directed through labeled paths, offering efficient and flexible data forwarding?

  • MPLS
  • Frame Relay
  • DSL
  • ISDN
In MPLS (Multiprotocol Label Switching), traffic is directed through labeled paths, providing efficient and flexible data forwarding.

The ________ in SDN architecture is responsible for forwarding data packets based on the rules set by the controller.

  • Data Plane
  • Control Plane
  • Management Plane
  • Forwarding Plane
The Data Plane in SDN architecture is responsible for forwarding data packets based on the rules set by the controller.

The _______ field in the IPv4 header is used to limit the lifespan of a packet.

  • Checksum
  • Destination Address
  • Source Address
  • TTL (Time to Live)
The Time to Live (TTL) field in the IPv4 header is used to limit the lifespan of a packet by specifying the maximum number of hops the packet can take.

How do modern routers differ from traditional routers in terms of functionality and network management?

  • Application Layer Gateway (ALG)
  • Dynamic Routing Protocols
  • Network Address Translation (NAT)
  • Packet Filtering
Modern routers employ dynamic routing protocols, enhancing network management and adaptability compared to traditional routers.

________ is a QoS technique that prioritizes packets based on their sensitivity to delay.

  • Traffic Shaping
  • Packet Sniffing
  • Traffic Policing
  • Low Latency Queuing
Low Latency Queuing is a QoS technique that prioritizes packets based on their sensitivity to delay.

In IPSec, what is the role of the IKE (Internet Key Exchange) protocol?

  • IKE negotiates and establishes security associations (SAs) between devices.
  • IKE encrypts user data for secure transmission.
  • IKE authenticates users during the VPN connection setup.
  • IKE is responsible for routing decisions in IPSec networks.
In IPSec, the IKE protocol negotiates and establishes security associations (SAs) between devices, ensuring secure communication.