When a network experiences an issue immediately after a configuration change, what troubleshooting principle should the technician follow first?
- Roll back the configuration change
- Implement additional security measures
- Increase network bandwidth
- Reboot the affected devices
In troubleshooting issues after a configuration change, the technician should first consider rolling back the configuration change to the previous state and observe the impact.
In a large data center, network engineers need to rapidly deploy changes across thousands of devices. What network automation strategy should they adopt to manage this effectively?
- Orchestration
- Configuration Management
- Continuous Integration/Continuous Deployment (CI/CD)
- Scripting
CI/CD is a strategy that allows rapid deployment and changes across a large number of devices in a data center.
Which QoS feature is used to manage congestion by controlling the rate at which packets are sent into the network?
- Traffic shaping
- Packet filtering
- Congestion avoidance
- Link aggregation
Traffic shaping is a QoS feature used to manage congestion by controlling the rate at which packets are sent into the network, preventing network congestion.
What is the process called that enables a cloud service customer to increase or decrease resources as needed?
- Cloud Scaling
- Elasticity
- Resource Provisioning
- Cloud Expansion
Elasticity is the process that enables a cloud service customer to increase or decrease resources as needed.
In BGP, what is the purpose of the AS_PATH attribute?
- Identify Neighbors
- Define Preferred Path
- Prevent Routing Loops
- Advertise Local IP Prefixes
The AS_PATH attribute in BGP is used to prevent routing loops by tracking the Autonomous Systems through which the route has passed.
The _______ time is the interval during which STP listens to and learns the network topology before transitioning to the forwarding state.
- Blocking
- Forwarding
- Learning
- Listening
The listening time in STP is the interval during which the protocol listens to and learns the network topology before transitioning to the forwarding state.
The process of adding a VLAN tag to frames on a trunk port is known as ________.
- VLAN Encapsulation
- VLAN Framing
- VLAN Tagging
- VLAN Untagging
The process of adding a VLAN tag to frames on a trunk port is known as VLAN Encapsulation.
A company is moving from password-based authentication to a more secure method for device access. Which technology should they consider implementing to improve security?
- VLANs
- TACACS+
- NAT
- ICMP
TACACS+ (Terminal Access Controller Access-Control System Plus) is a technology that provides secure authentication for device access, improving security over password-based authentication.
The integration of _________ in SDN allows for automated network management and orchestration.
- BGP
- SNMP
- Docker
- VLANs
The integration of SNMP (Simple Network Management Protocol) in SDN allows for automated network management and orchestration.
In QoS, ________ is a mechanism that ensures a specific minimum level of bandwidth to a certain traffic class.
- Policing
- Shaping
- Queuing
- Guarantees
In Quality of Service (QoS), shaping is a mechanism that ensures a specific minimum level of bandwidth to a certain traffic class.