The ________ platform is widely used for automating network operations and managing configurations across multiple systems.

  • Ansible
  • Puppet
  • Chef
  • SaltStack
Ansible is a widely used platform for automating network operations and managing configurations across multiple systems.

The ________ feature in IPSec helps in establishing and maintaining a secure communication channel.

  • Tunnel Mode
  • Dead Peer Detection
  • Perfect Forward Secrecy (PFS)
  • Security Association (SA)
The Perfect Forward Secrecy (PFS) feature in IPSec helps in establishing and maintaining a secure communication channel.

An IT manager wants to automate repetitive network management tasks to improve efficiency and accuracy. Which approach or tool should they consider integrating?

  • Packet Sniffer
  • CLI Scripting
  • Ping
  • Traceroute
CLI (Command Line Interface) scripting allows the automation of repetitive network management tasks, enhancing efficiency and accuracy by scripting command sequences.

In IPSec, what is the role of the IKE (Internet Key Exchange) protocol?

  • IKE negotiates and establishes security associations (SAs) between devices.
  • IKE encrypts user data for secure transmission.
  • IKE authenticates users during the VPN connection setup.
  • IKE is responsible for routing decisions in IPSec networks.
In IPSec, the IKE protocol negotiates and establishes security associations (SAs) between devices, ensuring secure communication.

________ is a QoS technique that prioritizes packets based on their sensitivity to delay.

  • Traffic Shaping
  • Packet Sniffing
  • Traffic Policing
  • Low Latency Queuing
Low Latency Queuing is a QoS technique that prioritizes packets based on their sensitivity to delay.

What is the primary benefit of switch stacking in a network environment?

  • Better Performance
  • Enhanced Redundancy
  • Improved Security
  • Increased Scalability
The primary benefit of switch stacking is increased scalability, allowing multiple switches to be interconnected and managed as a single logical unit.

The _______ mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.

  • Blocking
  • Forwarding
  • Listening
  • Root Guard
The blocking mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.

In WAN optimization, what is the main purpose of implementing compression techniques?

  • Reduce data transfer time
  • Increase data integrity
  • Improve network security
  • Minimize latency
The main purpose of implementing compression techniques in WAN optimization is to reduce data transfer time by compressing the data before transmission.

When designing a network monitoring system, an administrator decides to use a protocol that supports both polling and unsolicited updates from network devices. Which protocol should they use?

  • SNMP
  • Syslog
  • NetFlow
  • ICMP
SNMP (Simple Network Management Protocol) supports both polling (active requests for information) and unsolicited updates (traps) from network devices, making it suitable for a comprehensive network monitoring system.

What is the primary advantage of using EIGRP over RIP in a network?

  • Low bandwidth usage
  • Rapid convergence
  • Simple configuration
  • Support for VLSM
EIGRP (Enhanced Interior Gateway Routing Protocol) has the advantage of supporting Variable Length Subnet Masking (VLSM) in comparison to RIP.