What mechanism does HSRP use to determine the active and standby routers in a network?
- Priority
- Virtual IP
- MAC Address
- Hello Protocol
HSRP uses priority values to determine the active and standby routers in a network. The router with the highest priority becomes the active router.
What is the best practice for applying ACLs in a network to maximize efficiency and security?
- Apply ACLs as close to the source as possible
- Apply ACLs at the core layer
- Apply ACLs on distribution switches
- Apply ACLs on the perimeter router
The best practice is to apply ACLs as close to the source as possible to minimize unnecessary traffic on the network and maximize security.
Which tool is most commonly used for basic troubleshooting of WAN links?
- Ping
- Traceroute
- SNMP
- Nmap
Ping is commonly used for basic troubleshooting of WAN links as it helps verify connectivity and measure round-trip time.
How does NAT traversal technique help in peer-to-peer communication across networks using NAT?
- It encrypts the entire communication to bypass NAT restrictions.
- It establishes a direct connection between the peers without NAT involvement.
- It relies on the use of globally routable IP addresses for all devices.
- It uses special NAT-aware protocols to negotiate the traversal.
NAT traversal involves using special NAT-aware protocols to negotiate the traversal, allowing peer-to-peer communication across networks using NAT.
Which protocol is commonly encapsulated within GRE tunnels to provide VPN services?
- IPsec
- MPLS
- L2TP
- PPTP
IPsec is commonly encapsulated within GRE tunnels to provide VPN services.
In SDN, what is the role of Network Function Virtualization (NFV)?
- NFV virtualizes network functions, such as firewalls and load balancers, allowing them to run as software instances on commodity hardware.
- NFV is responsible for physical connectivity in SDN, ensuring that network devices are properly connected.
- NFV is an obsolete concept in SDN, and its role has been replaced by more advanced technologies.
- NFV is only applicable in traditional, non-virtualized networking environments.
In SDN, NFV virtualizes network functions, enabling them to run as software instances on commodity hardware for increased flexibility.
How does DHCP Snooping enhance network security?
- Blocks all DHCP traffic
- Enables dynamic IP allocation
- Encrypts DHCP messages
- Filters unauthorized DHCP messages
DHCP Snooping enhances network security by filtering unauthorized DHCP messages, preventing malicious DHCP attacks such as DHCP spoofing and starvation.
In AAA, ________ determines what resources a user can access and what operations they can perform.
- Authentication
- Authorization
- Accounting
- All of the Above
In AAA, Authorization determines what resources a user can access and what operations they can perform.
In network scripting, _______ patterns are used to extract specific information from structured text like logs or configuration files.
- Regular Expression
- JSON
- XPath
- YAML
In network scripting, Regular Expression patterns are used to extract specific information from structured text like logs or configuration files.
SNMP operates in the ______ layer of the OSI model, providing a framework for managing devices in a network.
- Application
- Data Link
- Network
- Presentation
SNMP operates in the Application layer of the OSI model, providing a framework for managing devices in a network.