SNMP traps are used for what purpose in network management?

  • Device configuration
  • Real-time event notification
  • Long-term event storage
  • Network topology discovery
SNMP traps are used for real-time event notification in network management, allowing devices to send asynchronous alerts to a central management system.

Which routing technique is more flexible and can adapt to changes in the network layout, like link failures?

  • Default Routing
  • Dynamic Routing
  • Hybrid Routing
  • Static Routing
Dynamic routing is more flexible and can adapt to changes in the network layout, such as link failures, by dynamically updating routing tables.

A company is expanding its office to another floor. They need a device to connect these two networks efficiently while managing traffic. Which device should be implemented?

  • Bridge
  • Hub
  • Router
  • Switch
A router is the most suitable device for connecting two networks efficiently, managing traffic, and providing inter-network communication.

An organization is concerned about VLAN hopping attacks. What configuration should be implemented to prevent this security threat?

  • Private VLANs
  • VLAN Access Control Lists (VACLs)
  • VLAN Pruning
  • VLAN Trunking Protocol (VTP)
Private VLANs should be implemented to prevent VLAN hopping attacks by restricting communication between certain VLANs within the same broadcast domain.

A company is experiencing frequent network issues. They need a solution to proactively monitor and identify potential problems before they affect operations. What type of system should they implement?

  • SNMP
  • NMS (Network Management System)
  • Syslog
  • SMTP
The company should implement a Network Management System (NMS) to proactively monitor and identify potential network problems before they affect operations. NMS provides comprehensive monitoring and management capabilities.

In EIGRP, the _______ is the lowest cost path to a destination that is guaranteed to be loop-free.

  • Advertised Distance
  • Feasible Successor
  • Reported Distance
  • Successor
In EIGRP, the Feasible Successor is the lowest cost path to a destination that is guaranteed to be loop-free.

Implementing __________ in a network firewall involves creating security zones for more granular control.

  • Proxy
  • Stateful Inspection
  • Zones
  • Virtual LANs
Implementing security zones in a network firewall involves creating security zones for more granular control.

What is the total number of bits used in an IPv4 address?

  • 128
  • 16
  • 32
  • 64
An IPv4 address uses a total of 32 bits.

A ________ port on a switch allows traffic from multiple VLANs to pass through while keeping the traffic separate.

  • Access
  • Tagged
  • Trunk
  • Untagged
A Trunk port on a switch allows traffic from multiple VLANs to pass through while keeping the traffic separate.

A _________ topology typically requires more cabling than other topologies but offers robustness and fault tolerance.

  • Bus
  • Mesh
  • Ring
  • Star
A Mesh topology typically requires more cabling than other topologies but offers robustness and fault tolerance. Each device is connected to every other device, providing multiple paths for data transmission.