In QoS, what is the term used for the mechanism that limits the bandwidth used by certain types of traffic?
- Shaping
- Policing
- Queuing
- Dropping
Bandwidth shaping is the mechanism used in QoS to limit the bandwidth used by certain types of traffic.
Which routing protocol supports automatic summarization at classful network boundaries?
- BGP (Border Gateway Protocol)
- EIGRP (Enhanced Interior Gateway Routing Protocol)
- OSPF (Open Shortest Path First)
- RIP (Routing Information Protocol)
RIP supports automatic summarization at classful network boundaries, aggregating routes into a summarized form.
How does switch stacking impact the scalability of a network infrastructure?
- Decreases Scalability
- Depends on the Network Topology
- Increases Scalability
- No Impact on Scalability
Switch stacking increases scalability by allowing multiple physical switches to be managed as a single entity, simplifying network administration and expanding port density.
What is the purpose of using an extended access list in network configuration?
- To filter traffic based on source and destination IP addresses
- To control access to network resources with more granularity
- To provide basic packet filtering
- To prioritize network traffic based on applications
An extended access list allows for more granular control over network traffic, specifying detailed conditions for filtering.
The process of ________ involves assigning different priority levels to various types of network traffic in QoS.
- Shaping
- Marking
- Scheduling
- Queuing
In Quality of Service (QoS), the process of marking involves assigning different priority levels to various types of network traffic.
What distinguishes VRRP from HSRP in terms of configuration and deployment?
- VRRP uses a virtual MAC address while HSRP uses a real MAC address.
- VRRP is a Cisco proprietary protocol, and HSRP is an industry standard.
- VRRP allows for load balancing, while HSRP does not.
- VRRP has a higher priority range than HSRP.
VRRP distinguishes itself from HSRP by using a virtual MAC address during configuration and deployment.
In BGP, the ______ attribute determines the shortest path to a destination network.
- AS Path
- Next Hop
- Local Preference
- Weight
In BGP, the AS Path attribute determines the shortest path to a destination network.
What is the primary advantage of using GRE tunnels in conjunction with IPsec VPNs?
- GRE tunnels enhance IPsec VPN security by adding an extra layer of encryption.
- GRE tunnels simplify IPsec VPN configurations and reduce complexity.
- GRE tunnels provide tunneling capabilities, while IPsec VPNs handle encryption.
- There is no advantage to using GRE tunnels with IPsec VPNs.
GRE tunnels offer tunneling capabilities, allowing IPsec VPNs to focus on encryption, reducing complexity in the overall setup.
In an environment where data security is crucial, ________ cables are preferred for their resistance to eavesdropping and tapping.
- Coaxial
- Fiber optic
- HDMI
- Twisted pair
In environments where data security is crucial, fiber optic cables are preferred for their resistance to eavesdropping and tapping.
What is the primary function of Port Security in a network switch?
- Block all incoming traffic
- Control access to the network based on MAC addresses
- Encrypt data on the network
- Filter traffic based on IP addresses
The primary function of Port Security is to control access to the network based on MAC addresses, allowing only specified devices to connect.