To enhance security, a network administrator needs to restrict access to the SSH and Telnet services on their routers. Which type of ACL would be most appropriate for this purpose?
- Extended ACL
- Named ACL
- Reflexive ACL
- Standard ACL
An extended ACL is suitable for filtering based on specific services such as SSH and Telnet, using port numbers.
An ISP needs to manage different types of traffic from various customers effectively. Which QoS strategy should they employ to ensure fair bandwidth distribution?
- Class-Based Weighted Fair Queuing (CBWFQ)
- Traffic Shaping
- Weighted Random Early Detection (WRED)
- Hierarchical Queuing Framework
Class-Based Weighted Fair Queuing (CBWFQ) allows ISPs to manage different types of traffic effectively by assigning bandwidth based on defined classes, ensuring fair distribution.
A network technician is troubleshooting a connection problem and needs to verify the path of the packets at the network level. Which OSI layer should they focus on?
- Data Link
- Network
- Physical
- Transport
The network layer (Layer 3) is responsible for packet forwarding, routing, and addressing, making it crucial for troubleshooting the path of packets at the network level.
In STP, which type of port directly forwards frames and participates in the active topology?
- Blocking Port
- Designated Port
- Non-Designated Port
- Root Port
A designated port in STP directly forwards frames and participates in the active topology, ensuring the loop-free operation of the network.
An organization requires a centralized logging solution for their multi-vendor network devices. Which protocol would best suit this requirement?
- Syslog
- SNMP
- NetFlow
- ICMP
Syslog is a protocol used for centralized logging in a network. It is suitable for collecting and managing logs from multi-vendor network devices.
To prevent unauthorized device access, it is recommended to change ________ regularly.
- IP address
- MAC address
- Passwords
- Encryption keys
To prevent unauthorized device access, it is recommended to change passwords regularly.
Which type of firewall examines network traffic based solely on IP addresses and ports?
- Stateful firewall
- Proxy firewall
- Packet-filtering firewall
- Application-layer firewall
A packet-filtering firewall examines network traffic based solely on IP addresses and ports.
The ________ record in DNS is used to redirect one domain to another domain.
- CNAME
- MX
- A
- PTR
The CNAME (Canonical Name) record in DNS is used to redirect one domain to another domain. It is commonly used for creating aliases or redirects in the DNS system.
_________ is a common SDN framework that allows direct programmable control of the network.
- OpenFlow
- SNMP
- BGP
- OSPF
OpenFlow is a common SDN framework that allows direct programmable control of the network.
What is a fundamental characteristic of PPP that distinguishes it from other data link layer protocols?
- Connection-oriented
- Connectionless
- Both
- Neither
A fundamental characteristic of PPP is that it is connection-oriented, distinguishing it from other data link layer protocols.