What protocol is primarily used for network management and monitoring devices on IP networks?

  • TCP
  • UDP
  • ICMP
  • SNMP
SNMP (Simple Network Management Protocol) is primarily used for network management and monitoring devices on IP networks.

How does SD-WAN technology enhance WAN performance and reliability?

  • By using traditional routing protocols
  • By leveraging multiple WAN connections intelligently
  • By increasing bandwidth on a single connection
  • By prioritizing all traffic equally
SD-WAN enhances WAN performance and reliability by intelligently leveraging multiple WAN connections, optimizing traffic flow, and providing efficient use of resources.

DNS _________ is a technique used to distribute DNS load and increase reliability.

  • Round Robin
  • Load Balancing
  • Failover
  • Caching
DNS Load Balancing is a technique used to distribute DNS load and increase reliability. It involves distributing incoming DNS requests across multiple servers.

How does GLBP avoid the need for each host in the network to be configured with multiple gateway IP addresses?

  • Virtual MAC Address
  • Load Balancing
  • Priority Value
  • Preemption
GLBP uses load balancing to distribute traffic across multiple routers. Each host in the network only needs to be configured with a single virtual IP address.

In a ______ topology, each node cooperates in the distribution of data in the network.

  • Bus
  • Hybrid
  • Mesh
  • Ring
In a Hybrid topology, each node cooperates in the distribution of data in the network, combining features of different topologies.

In complex network environments, ________ is used to reduce the risk of VLAN hopping attacks.

  • VLAN Access Control
  • VLAN Pruning
  • VLAN Segmentation
  • VLAN Trunking
VLAN Access Control is used in complex network environments to reduce the risk of VLAN hopping attacks.

BGP uses the _______ attribute to identify the originating Autonomous System of a route.

  • AS Path
  • Origin
  • Next Hop
  • Local Preference
BGP uses the Origin attribute to identify the originating Autonomous System of a route.

The process of encapsulating data with necessary protocol information at each OSI layer is known as _______.

  • Encapsulation
  • Fragmentation
  • Framing
  • Segmentation
The process of encapsulating data with necessary protocol information at each OSI layer is known as encapsulation.

To prevent unauthorized access, a network administrator can configure _______ on switch ports.

  • Port Security
  • Routing Protocol
  • Subnet Masking
  • VLAN Trunking
To prevent unauthorized access, a network administrator can configure Port Security on switch ports.

In an IPv4 network, what is the primary reason for implementing CIDR (Classless Inter-Domain Routing)?

  • To improve security by assigning unique IP addresses to each device.
  • To overcome the limitations of the traditional class-based IP addressing scheme and efficiently allocate IP addresses.
  • To reduce the size of the routing tables and slow down the growth of the global routing table.
  • To simplify subnetting and make it easier for administrators to manage IP address assignments.
CIDR is implemented in IPv4 networks to overcome the limitations of the traditional class-based IP addressing scheme and efficiently allocate IP addresses.