What technique is used in VLSM to avoid IP address exhaustion?
- ARP (Address Resolution Protocol)
- CIDR (Classless Inter-Domain Routing)
- DHCP (Dynamic Host Configuration Protocol)
- NAT (Network Address Translation)
CIDR (Classless Inter-Domain Routing) is the technique used in VLSM to avoid IP address exhaustion by allowing the allocation of address blocks with variable lengths, matching the actual network requirements.
A company is experiencing network congestion issues between its distribution and access layers. How can EtherChannel be effectively deployed to address this problem?
- By aggregating multiple links into a logical bundle to increase bandwidth
- By configuring static IP routes to improve packet forwarding
- By disabling spanning-tree protocol to eliminate redundant paths
- By implementing VLAN trunking to isolate traffic
EtherChannel can be effectively deployed by aggregating multiple links into a logical bundle to increase bandwidth and address network congestion issues between the distribution and access layers.
How does a switch learn the MAC addresses of the devices connected to it?
- ARP requests
- DHCP leases
- IP addressing
- MAC flooding
A switch learns the MAC addresses of devices connected to it by examining the source MAC address of incoming frames and associating them with the corresponding port.
In basic access-list configuration, which command is used to permit or deny traffic based on IP address?
- ALLOW
- DENY
- PERMIT
- BLOCK
In basic access-list configuration, the "deny" command is used to deny traffic based on IP address.
If a network administrator is configuring a router to connect different IP networks, which layer of the TCP/IP model are they primarily working with?
- Application
- Data Link
- Network
- Transport
The network layer of the TCP/IP model (equivalent to the OSI model's Layer 3) is primarily responsible for routing and connecting different IP networks.
To avoid overlapping subnets in VLSM, network administrators must ensure ________ between subnet boundaries.
- Consistency
- Continuity
- Separation
- Synchronization
To avoid overlapping subnets in VLSM, network administrators must ensure separation between subnet boundaries.
A network engineer needs to configure a device to send real-time alerts for specific events. Which SNMP component should they configure?
- SNMP Manager
- SNMP Agent
- SNMP Trap
- SNMP Get
To send real-time alerts for specific events, the SNMP Trap component should be configured on the device. SNMP Trap allows devices to send unsolicited messages (traps) to a central SNMP manager.
What is the primary purpose of DHCP in a network?
- Assigning IP addresses dynamically
- Resolving domain names to IP addresses
- Managing network security
- Establishing physical connections
DHCP (Dynamic Host Configuration Protocol) is primarily used for dynamically assigning IP addresses to devices on a network.
In an organization, an auditor requires a system that can report on all individual user activities across network devices. Which aspect of AAA should be emphasized?
- Authentication
- Authorization
- Accounting
- Auditing
The Accounting aspect of AAA (Authentication, Authorization, and Accounting) is emphasized when reporting on individual user activities across network devices.
A company's security policy requires masking the internal IP addresses when accessing external websites. What configuration should the network engineer implement?
- Dynamic NAT
- NAT Overload
- PAT
- Static NAT
Static NAT should be implemented to mask internal IP addresses when accessing external websites, as it provides a one-to-one mapping of internal and external addresses.