When using VLSM, which of the following is a key advantage over traditional subnetting methods?

  • Easier implementation
  • Efficient use of IP addresses
  • Faster network speeds
  • Improved security
VLSM allows for the efficient use of IP addresses by allocating variable-sized subnets, optimizing address space usage.

What protocol is primarily used for network management and monitoring devices on IP networks?

  • TCP
  • UDP
  • ICMP
  • SNMP
SNMP (Simple Network Management Protocol) is primarily used for network management and monitoring devices on IP networks.

How does SD-WAN technology enhance WAN performance and reliability?

  • By using traditional routing protocols
  • By leveraging multiple WAN connections intelligently
  • By increasing bandwidth on a single connection
  • By prioritizing all traffic equally
SD-WAN enhances WAN performance and reliability by intelligently leveraging multiple WAN connections, optimizing traffic flow, and providing efficient use of resources.

DNS _________ is a technique used to distribute DNS load and increase reliability.

  • Round Robin
  • Load Balancing
  • Failover
  • Caching
DNS Load Balancing is a technique used to distribute DNS load and increase reliability. It involves distributing incoming DNS requests across multiple servers.

How does GLBP avoid the need for each host in the network to be configured with multiple gateway IP addresses?

  • Virtual MAC Address
  • Load Balancing
  • Priority Value
  • Preemption
GLBP uses load balancing to distribute traffic across multiple routers. Each host in the network only needs to be configured with a single virtual IP address.

_________ is a method in QoS that dynamically adjusts the priority of different traffic types based on network conditions.

  • Policing
  • Shaping
  • Queuing
  • Classification
In QoS, classification is a method that dynamically adjusts the priority of different traffic types based on network conditions.

In complex network environments, ________ is used to reduce the risk of VLAN hopping attacks.

  • VLAN Access Control
  • VLAN Pruning
  • VLAN Segmentation
  • VLAN Trunking
VLAN Access Control is used in complex network environments to reduce the risk of VLAN hopping attacks.

BGP uses the _______ attribute to identify the originating Autonomous System of a route.

  • AS Path
  • Origin
  • Next Hop
  • Local Preference
BGP uses the Origin attribute to identify the originating Autonomous System of a route.

The process of encapsulating data with necessary protocol information at each OSI layer is known as _______.

  • Encapsulation
  • Fragmentation
  • Framing
  • Segmentation
The process of encapsulating data with necessary protocol information at each OSI layer is known as encapsulation.

To prevent unauthorized access, a network administrator can configure _______ on switch ports.

  • Port Security
  • Routing Protocol
  • Subnet Masking
  • VLAN Trunking
To prevent unauthorized access, a network administrator can configure Port Security on switch ports.