What is a key benefit of implementing TACACS+ in AAA?

  • Centralized Authentication
  • Encryption of Data
  • Load Balancing
  • Port Security
TACACS+ provides centralized authentication, which is a key benefit in AAA (Authentication, Authorization, and Accounting) systems.

In an organization where network redundancy and reliability are crucial, the network administrator is tasked with choosing a topology that ensures continuous network operation even if one connection fails. Which topology is the most suitable?

  • Bus
  • Mesh
  • Ring
  • Star
Mesh topology provides maximum redundancy and reliability as every device is connected to every other device, ensuring continuous operation even if one connection fails.

An IT manager is troubleshooting intermittent WAN connectivity issues. What should be the initial step in diagnosing the problem?

  • Check for Physical Layer Issues
  • Analyze Network Traffic
  • Review Router Configurations
  • Monitor WAN Bandwidth
Checking for physical layer issues, such as cable connections and hardware problems, is the initial step in diagnosing intermittent WAN connectivity issues.

What is the primary function of the control plane in a Software-Defined Networking (SDN) architecture?

  • Data forwarding
  • Network management
  • Control and decision-making
  • Physical device configuration
The control plane in SDN is responsible for control and decision-making, separating it from the data plane for flexibility and programmability.

________ is a network device that strengthens the signal along a network cable and works on the principle of signal regeneration.

  • Bridge
  • Hub
  • Modem
  • Repeater
A Repeater is a network device that strengthens the signal along a network cable and works on the principle of signal regeneration.

A network administrator is tasked with designing a subnetting scheme for a university campus. The scheme needs to efficiently accommodate varying sizes of departments and user groups. What approach should they adopt?

  • CIDR (Classless Inter-Domain Routing)
  • Classful Subnetting
  • Supernetting
  • Variable Length Subnet Masking (VLSM)
Variable Length Subnet Masking (VLSM) is suitable for accommodating varying sizes of departments and user groups in a subnetting scheme for a university campus.

How does route summarization affect the size of the routing table in a network?

  • Decreases the size by removing unnecessary routes
  • Has no impact on the size of the routing table
  • Increases the size by adding more specific routes
  • Reduces the size by aggregating multiple routes into a single summary route
Route summarization reduces the size of the routing table by aggregating multiple routes into a single summary route, which helps in efficient routing table management.

For automated network deployment and testing, the use of _______ tools can significantly reduce manual intervention and human errors.

  • Monitoring
  • Orchestration
  • Configuration Management
  • DevOps
The use of configuration management tools can significantly reduce manual intervention and human errors in automated network deployment and testing.

In a network using VLSM, how is the subnet size determined for different network segments?

  • Subnet size is determined by the geographical location of each segment
  • Subnet size is determined by the number of hosts in each segment
  • Subnet size is determined by the specific requirements of each segment
  • Subnet size is fixed and the same for all segments
In VLSM, the subnet size is determined based on the specific requirements of each network segment, allowing for flexibility in addressing.

The encapsulation of various network layer protocols within IP is a fundamental feature of _______ tunnels.

  • PPTP
  • L2TP
  • GRE
  • SSL/TLS
The encapsulation of various network layer protocols within IP is a fundamental feature of GRE tunnels.