DNS _________ is a technique used to distribute DNS load and increase reliability.
- Round Robin
- Load Balancing
- Failover
- Caching
DNS Load Balancing is a technique used to distribute DNS load and increase reliability. It involves distributing incoming DNS requests across multiple servers.
How does GLBP avoid the need for each host in the network to be configured with multiple gateway IP addresses?
- Virtual MAC Address
- Load Balancing
- Priority Value
- Preemption
GLBP uses load balancing to distribute traffic across multiple routers. Each host in the network only needs to be configured with a single virtual IP address.
In a ______ topology, each node cooperates in the distribution of data in the network.
- Bus
- Hybrid
- Mesh
- Ring
In a Hybrid topology, each node cooperates in the distribution of data in the network, combining features of different topologies.
Which cloud service model provides users with a platform to develop, run, and manage applications without the complexity of building and maintaining the infrastructure?
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
- Function as a Service (FaaS)
Platform as a Service (PaaS) provides users with a platform to develop, run, and manage applications without the complexity of building and maintaining the infrastructure.
In a network, which device operates at the data link layer and is used to divide a network into segments?
- Bridge
- Hub
- Router
- Switch
A bridge operates at the data link layer and is used to divide a network into segments, controlling traffic between them.
The process of encapsulating data with necessary protocol information at each OSI layer is known as _______.
- Encapsulation
- Fragmentation
- Framing
- Segmentation
The process of encapsulating data with necessary protocol information at each OSI layer is known as encapsulation.
To prevent unauthorized access, a network administrator can configure _______ on switch ports.
- Port Security
- Routing Protocol
- Subnet Masking
- VLAN Trunking
To prevent unauthorized access, a network administrator can configure Port Security on switch ports.
In an IPv4 network, what is the primary reason for implementing CIDR (Classless Inter-Domain Routing)?
- To improve security by assigning unique IP addresses to each device.
- To overcome the limitations of the traditional class-based IP addressing scheme and efficiently allocate IP addresses.
- To reduce the size of the routing tables and slow down the growth of the global routing table.
- To simplify subnetting and make it easier for administrators to manage IP address assignments.
CIDR is implemented in IPv4 networks to overcome the limitations of the traditional class-based IP addressing scheme and efficiently allocate IP addresses.
Which type of DNS record is used to translate domain names into IP addresses?
- A Record
- CNAME Record
- PTR Record
- MX Record
An A Record (Address Record) is used to translate domain names into IP addresses.
What is the impact of configuring PortFast on a switch port connected to an end device?
- Allows the port to immediately transition to the forwarding state
- Binds the MAC address to the switch port
- Disables spanning tree on the port
- Enables rapid spanning tree convergence
Configuring PortFast on a switch port connected to an end device allows the port to immediately transition to the forwarding state, eliminating the delay introduced by spanning tree protocol.