The process of ________ involves assigning different priority levels to various types of network traffic in QoS.
- Shaping
- Marking
- Scheduling
- Queuing
In Quality of Service (QoS), the process of marking involves assigning different priority levels to various types of network traffic.
What is the primary function of a network switch in a LAN environment?
- Amplifying signals
- Assigning IP addresses
- Forwarding data between devices
- Routing between networks
The primary function of a network switch in a LAN environment is to forward data between devices within the same network.
Which layer of the OSI model is responsible for error checking and reliable packet delivery?
- Data Link
- Network
- Physical
- Transport
The Transport Layer in the OSI model is responsible for error checking and reliable packet delivery.
When configuring redistribution on a router, what is a common challenge that network engineers must address?
- Duplicate IP addresses
- Inconsistent metrics
- Route summarization
- Routing loops
A common challenge in redistribution is dealing with inconsistent metrics between different routing protocols, which can impact the selection of optimal routes.
What is the primary function of Port Security in a network switch?
- Block all incoming traffic
- Control access to the network based on MAC addresses
- Encrypt data on the network
- Filter traffic based on IP addresses
The primary function of Port Security is to control access to the network based on MAC addresses, allowing only specified devices to connect.
In an environment where data security is crucial, ________ cables are preferred for their resistance to eavesdropping and tapping.
- Coaxial
- Fiber optic
- HDMI
- Twisted pair
In environments where data security is crucial, fiber optic cables are preferred for their resistance to eavesdropping and tapping.
What is the primary advantage of using GRE tunnels in conjunction with IPsec VPNs?
- GRE tunnels enhance IPsec VPN security by adding an extra layer of encryption.
- GRE tunnels simplify IPsec VPN configurations and reduce complexity.
- GRE tunnels provide tunneling capabilities, while IPsec VPNs handle encryption.
- There is no advantage to using GRE tunnels with IPsec VPNs.
GRE tunnels offer tunneling capabilities, allowing IPsec VPNs to focus on encryption, reducing complexity in the overall setup.
In BGP, the ______ attribute determines the shortest path to a destination network.
- AS Path
- Next Hop
- Local Preference
- Weight
In BGP, the AS Path attribute determines the shortest path to a destination network.
What distinguishes VRRP from HSRP in terms of configuration and deployment?
- VRRP uses a virtual MAC address while HSRP uses a real MAC address.
- VRRP is a Cisco proprietary protocol, and HSRP is an industry standard.
- VRRP allows for load balancing, while HSRP does not.
- VRRP has a higher priority range than HSRP.
VRRP distinguishes itself from HSRP by using a virtual MAC address during configuration and deployment.
In IPv6, the ________ address is used for multicast traffic to communicate with multiple devices simultaneously.
- Anycast
- Unicast
- Broadcast
- Multicast
In IPv6, the Multicast address is used for multicast traffic to communicate with multiple devices simultaneously.
An organization requires a secure way to connect remote workers to its central office. Which technology would provide a secure and cost-effective solution?
- VPN (Virtual Private Network)
- MPLS
- ISDN
- DSL
A VPN (Virtual Private Network) would provide a secure and cost-effective solution for connecting remote workers to the central office over the internet.
Which type of VPN would be most suitable for a user who frequently travels and needs secure access to the corporate network?
- Site-to-Site VPN
- Remote Access VPN
- MPLS VPN
- PPTP VPN
A Remote Access VPN is most suitable for a user who frequently travels and needs secure access to the corporate network from various locations.