To allow communication between VLANs, network administrators set up a ________, which routes traffic between different VLANs.

  • Firewall
  • Hub
  • Router
  • Switch
A router is used to route traffic between different VLANs, allowing communication between them.

Efficient IP address allocation in VLSM requires careful ________ planning.

  • Address
  • Host
  • Network
  • Subnet
Efficient IP address allocation in VLSM requires careful subnet planning.

______ routing protocols, such as OSPF and EIGRP, adjust automatically to network changes, providing redundancy and fault tolerance.

  • Adaptive
  • Convergent
  • Dynamic
  • Static
Dynamic routing protocols, such as OSPF and EIGRP, adjust automatically to network changes, providing redundancy and fault tolerance.

In high-availability network designs, _________ is a feature that allows for multiple switches to be managed as a single unit.

  • GLBP (Gateway Load Balancing Protocol)
  • HSRP (Hot Standby Router Protocol)
  • StackWise
  • VRRP (Virtual Router Redundancy Protocol)
In high-availability network designs, StackWise is a feature that allows for multiple switches to be managed as a single unit.

In firewall settings, the term "_______" refers to allowing specific traffic through based on defined criteria.

  • Blocking
  • Permitting
  • Denying
  • Filtering
In firewall settings, the term "Permitting" refers to allowing specific traffic through based on defined criteria.

In subnetting, what does the term CIDR stand for and what is its significance?

  • Centralized IP Distribution and Routing; It simplifies the management of IP addresses
  • Classful IP Dynamic Routing; It enhances dynamic routing capabilities
  • Classless Inter-Domain Routing; It allows for more efficient allocation of IP addresses and routing
  • Continuous IP Data Routing; It ensures constant data flow within subnets
CIDR stands for Classless Inter-Domain Routing, and its significance lies in allowing more efficient allocation of IP addresses and routing.

The process of verifying a user's identity in AAA is known as ________.

  • Authorization
  • Authentication
  • Accounting
  • Access Control
The process of verifying a user's identity in AAA (Authentication, Authorization, and Accounting) is known as Authentication.

Which PPP component is responsible for establishing, configuring, and testing the data-link connection?

  • LCP (Link Control Protocol)
  • NCP (Network Control Protocol)
  • HDLC (High-Level Data Link Control)
  • IPCP (Internet Protocol Control Protocol)
LCP (Link Control Protocol) in PPP is responsible for establishing, configuring, and testing the data-link connection between two devices.

How does IPv6 handle packet fragmentation compared to IPv4?

  • IPv6 does not support packet fragmentation
  • IPv6 fragmentation is handled by specialized fragmentation servers
  • IPv6 relies on end-hosts to perform packet fragmentation
  • IPv6 routers perform packet fragmentation
Unlike IPv4, IPv6 routers do not perform packet fragmentation. Instead, it relies on end-hosts to handle packet fragmentation as needed.

Which DHCP message is used by a client to accept an IP address offered by a DHCP server?

  • DHCPREQUEST
  • DHCPDISCOVER
  • DHCPACK
  • DHCPNAK
The DHCPREQUEST message is used by a client to accept an IP address offered by a DHCP server during the DHCP negotiation process.