SNMP traps are used for what purpose in network management?
- Device configuration
- Real-time event notification
- Long-term event storage
- Network topology discovery
SNMP traps are used for real-time event notification in network management, allowing devices to send asynchronous alerts to a central management system.
Which routing technique is more flexible and can adapt to changes in the network layout, like link failures?
- Default Routing
- Dynamic Routing
- Hybrid Routing
- Static Routing
Dynamic routing is more flexible and can adapt to changes in the network layout, such as link failures, by dynamically updating routing tables.
A company is expanding its office to another floor. They need a device to connect these two networks efficiently while managing traffic. Which device should be implemented?
- Bridge
- Hub
- Router
- Switch
A router is the most suitable device for connecting two networks efficiently, managing traffic, and providing inter-network communication.
An organization is concerned about VLAN hopping attacks. What configuration should be implemented to prevent this security threat?
- Private VLANs
- VLAN Access Control Lists (VACLs)
- VLAN Pruning
- VLAN Trunking Protocol (VTP)
Private VLANs should be implemented to prevent VLAN hopping attacks by restricting communication between certain VLANs within the same broadcast domain.
A company is experiencing frequent network issues. They need a solution to proactively monitor and identify potential problems before they affect operations. What type of system should they implement?
- SNMP
- NMS (Network Management System)
- Syslog
- SMTP
The company should implement a Network Management System (NMS) to proactively monitor and identify potential network problems before they affect operations. NMS provides comprehensive monitoring and management capabilities.
In EIGRP, the _______ is the lowest cost path to a destination that is guaranteed to be loop-free.
- Advertised Distance
- Feasible Successor
- Reported Distance
- Successor
In EIGRP, the Feasible Successor is the lowest cost path to a destination that is guaranteed to be loop-free.
Implementing __________ in a network firewall involves creating security zones for more granular control.
- Proxy
- Stateful Inspection
- Zones
- Virtual LANs
Implementing security zones in a network firewall involves creating security zones for more granular control.
What is the total number of bits used in an IPv4 address?
- 128
- 16
- 32
- 64
An IPv4 address uses a total of 32 bits.
A ________ port on a switch allows traffic from multiple VLANs to pass through while keeping the traffic separate.
- Access
- Tagged
- Trunk
- Untagged
A Trunk port on a switch allows traffic from multiple VLANs to pass through while keeping the traffic separate.
A _________ topology typically requires more cabling than other topologies but offers robustness and fault tolerance.
- Bus
- Mesh
- Ring
- Star
A Mesh topology typically requires more cabling than other topologies but offers robustness and fault tolerance. Each device is connected to every other device, providing multiple paths for data transmission.