A network engineer needs to design a network that can efficiently handle varying types of traffic, such as voice, video, and data. What technology would be most suitable for such requirements?
- QoS (Quality of Service)
- VLAN (Virtual Local Area Network)
- MPLS
- Frame Relay
QoS (Quality of Service) technology is most suitable for designing a network that can efficiently handle varying types of traffic, ensuring the prioritization of voice, video, and data.
SNMP operates in the ______ layer of the OSI model, providing a framework for managing devices in a network.
- Application
- Data Link
- Network
- Presentation
SNMP operates in the Application layer of the OSI model, providing a framework for managing devices in a network.
In network scripting, _______ patterns are used to extract specific information from structured text like logs or configuration files.
- Regular Expression
- JSON
- XPath
- YAML
In network scripting, Regular Expression patterns are used to extract specific information from structured text like logs or configuration files.
In AAA, ________ determines what resources a user can access and what operations they can perform.
- Authentication
- Authorization
- Accounting
- All of the Above
In AAA, Authorization determines what resources a user can access and what operations they can perform.
How does DHCP Snooping enhance network security?
- Blocks all DHCP traffic
- Enables dynamic IP allocation
- Encrypts DHCP messages
- Filters unauthorized DHCP messages
DHCP Snooping enhances network security by filtering unauthorized DHCP messages, preventing malicious DHCP attacks such as DHCP spoofing and starvation.
In SDN, what is the role of Network Function Virtualization (NFV)?
- NFV virtualizes network functions, such as firewalls and load balancers, allowing them to run as software instances on commodity hardware.
- NFV is responsible for physical connectivity in SDN, ensuring that network devices are properly connected.
- NFV is an obsolete concept in SDN, and its role has been replaced by more advanced technologies.
- NFV is only applicable in traditional, non-virtualized networking environments.
In SDN, NFV virtualizes network functions, enabling them to run as software instances on commodity hardware for increased flexibility.
Which protocol is commonly encapsulated within GRE tunnels to provide VPN services?
- IPsec
- MPLS
- L2TP
- PPTP
IPsec is commonly encapsulated within GRE tunnels to provide VPN services.
How does NAT traversal technique help in peer-to-peer communication across networks using NAT?
- It encrypts the entire communication to bypass NAT restrictions.
- It establishes a direct connection between the peers without NAT involvement.
- It relies on the use of globally routable IP addresses for all devices.
- It uses special NAT-aware protocols to negotiate the traversal.
NAT traversal involves using special NAT-aware protocols to negotiate the traversal, allowing peer-to-peer communication across networks using NAT.
The process of adding a VLAN tag to frames on a trunk port is known as ________.
- VLAN Encapsulation
- VLAN Framing
- VLAN Tagging
- VLAN Untagging
The process of adding a VLAN tag to frames on a trunk port is known as VLAN Encapsulation.
In BGP, what is the purpose of the AS_PATH attribute?
- Identify Neighbors
- Define Preferred Path
- Prevent Routing Loops
- Advertise Local IP Prefixes
The AS_PATH attribute in BGP is used to prevent routing loops by tracking the Autonomous Systems through which the route has passed.
What is the process called that enables a cloud service customer to increase or decrease resources as needed?
- Cloud Scaling
- Elasticity
- Resource Provisioning
- Cloud Expansion
Elasticity is the process that enables a cloud service customer to increase or decrease resources as needed.
Which QoS feature is used to manage congestion by controlling the rate at which packets are sent into the network?
- Traffic shaping
- Packet filtering
- Congestion avoidance
- Link aggregation
Traffic shaping is a QoS feature used to manage congestion by controlling the rate at which packets are sent into the network, preventing network congestion.