IPv6 uses _________ to simplify and improve aspects of IP address assignment and network renumbering.

  • Dynamic Host Configuration Protocol (DHCPv6)
  • Internet Control Message Protocol version 6 (ICMPv6)
  • Routing Information Protocol version 6 (RIPng)
  • Stateless Address Configuration (SLAAC)
IPv6 uses Stateless Address Configuration (SLAAC) to simplify and improve aspects of IP address assignment and network renumbering.

In a multi-homed network environment, what BGP strategy could be employed to avoid being a transit AS for other networks?

  • Weight
  • Local Preference
  • AS Path Prepending
  • Route Reflectors
AS Path Prepending is a BGP strategy in a multi-homed network to avoid being a transit AS for other networks. It adds the AS number multiple times to make the path less favorable.

In a network with multiple switches, how does the Spanning Tree Protocol (STP) determine the root bridge?

  • Highest MAC address
  • Highest bridge priority
  • Lowest MAC address
  • Lowest bridge priority
The Spanning Tree Protocol (STP) determines the root bridge based on the lowest bridge priority. If priorities are the same, it uses the lowest MAC address as a tiebreaker.

A network administrator notices that their AS is receiving suboptimal BGP routes. What BGP attribute should they adjust to influence incoming traffic paths?

  • Local Preference
  • AS Path
  • MED (Multi-Exit Discriminator)
  • Weight
The Local Preference attribute in BGP is adjusted to influence incoming traffic paths. It is used within the same AS to set preferences for routes.

Which protocol is used to encrypt management sessions with network devices?

  • SNMP
  • HTTPS
  • Telnet
  • ICMP
HTTPS (Hypertext Transfer Protocol Secure) is the protocol used to encrypt management sessions with network devices, ensuring secure communication for managing devices.

________ ACLs are more specific and versatile than standard ACLs, as they can filter packets based on port numbers and protocol types.

  • Dynamic
  • Extended
  • Named
  • Standard
Extended ACLs are more specific and versatile than standard ACLs, allowing filtering based on port numbers and protocol types.

What methodology involves checking each layer of the OSI model in sequence to isolate a network issue?

  • Bottom-Up
  • Top-Down
  • Sideways
  • Diagonal
The top-down methodology involves checking each layer of the OSI model in sequence to isolate a network issue, starting from the application layer down to the physical layer.

In SDN, what term describes the process of making decisions about where traffic is sent in the network?

  • Network Virtualization
  • OpenFlow
  • SDN Controller
  • Traffic Engineering
In SDN, the process of making decisions about where traffic is sent in the network is handled by the SDN Controller.

In _______ topology, data is transmitted in one direction only, making it less prone to data collision.

  • Bus
  • Point-to-Point
  • Ring
  • Star
In Point-to-Point topology, data is transmitted in one direction only, making it less prone to data collision. This is suitable for dedicated communication between two devices.

What does GRE stand for in the context of network tunneling?

  • Generic Routing Encapsulation
  • General Resource Encryption
  • Graphical Routing Environment
  • Global Reachability Extension
GRE stands for Generic Routing Encapsulation in the context of network tunneling.

Which OSI layer handles the routing of packets across different networks?

  • Data Link Layer
  • Network Layer
  • Physical Layer
  • Transport Layer
The Network Layer of the OSI model is responsible for routing packets across different networks.

The _______ record in DNS is used to point a domain to a physical IP address.

  • A
  • MX
  • CNAME
  • PTR
The CNAME (Canonical Name) record in DNS is used to point a domain to a physical IP address.