Which type of firewall uses a defined set of rules to decide whether to allow or block network traffic?
- Proxy firewall
- Stateful firewall
- Stateless firewall
- Application-layer firewall
A stateful firewall uses a defined set of rules to decide whether to allow or block network traffic based on the state of connections.
In DHCP, what mechanism is used to ensure that multiple DHCP servers do not offer conflicting IP addresses?
- DHCP Snooping
- DHCP Relay
- DHCP Failover
- DHCP Lease Renewal
DHCP Failover is used to ensure that multiple DHCP servers coordinate and do not offer conflicting IP addresses to clients, enhancing network reliability.
Which system is utilized for sending and storing log messages in a network, helping in network management and security?
- DHCP
- DNS
- Syslog
- HTTP
Syslog is a system used for sending and storing log messages in a network, aiding in network management and security.
Which protocol within IPSec is used to provide data integrity and authentication?
- AH (Authentication Header)
- ESP (Encapsulating Security Payload)
- IKE (Internet Key Exchange)
- SSL (Secure Sockets Layer)
The Authentication Header (AH) protocol within IPSec is used to provide data integrity and authentication.
What is a key disadvantage of using a star topology in very large networks?
- Complex Wiring
- High Maintenance Cost
- Limited Scalability
- Single Point of Failure
A key disadvantage of using a star topology in very large networks is limited scalability. As more devices are added, the central hub may become a bottleneck for data traffic.
In a network, _______ is used to connect segments of a LAN and contains logic to filter traffic based on MAC addresses.
- Hub
- Repeater
- Router
- Switch
In a network, a Switch is used to connect segments of a LAN and contains logic to filter traffic based on MAC addresses.
For a business requiring remote access to servers in its private network from the internet, what NAT feature would be most appropriate to set up?
- Dynamic NAT
- PAT
- Port Forwarding
- Static NAT
Port Forwarding would be the most appropriate NAT feature for allowing remote access to servers in a private network from the internet, forwarding specific ports to internal servers.
_______ is a technique used in GRE tunnels to maintain a consistent network path and avoid fragmentation.
- MTU Path Discovery
- Spanning Tree Protocol
- Subnetting
- HSRP
MTU Path Discovery is a technique used in GRE tunnels to maintain a consistent network path and avoid fragmentation.
How does SNMPv3 differ from SNMPv1 and SNMPv2 in terms of security features?
- Community strings for authentication
- Addition of HMAC for message integrity
- Plain text communication
- Encryption of SNMP packets
SNMPv3 introduces the addition of HMAC for message integrity, enhancing security compared to SNMPv1 and SNMPv2.
When designing a BGP network for a large organization, what factor should be considered to ensure optimal route propagation and stability?
- Convergence Time
- Route Summarization
- BGP Confederations
- Prefix Length
Route summarization should be considered when designing a BGP network for a large organization to ensure optimal route propagation and stability. It helps reduce the number of BGP routes.