In ______, the active virtual gateway (AVG) assigns a virtual MAC address to each member of the GLBP group.

  • HSRP
  • GLBP
  • VRRP
  • OSPF
In GLBP (Gateway Load Balancing Protocol), the active virtual gateway (AVG) assigns a virtual MAC address to each member of the GLBP group.

________ is a technique used in BGP to filter out undesired routes.

  • Prefix Filtering
  • Route Aggregation
  • Route Summarization
  • Route Filtering
Route filtering is a technique used in BGP to filter out undesired routes.

In the context of device security, what is a major risk of using default passwords?

  • Improved User Convenience
  • Enhanced Device Performance
  • Increased Resistance to Cyber Attacks
  • Vulnerability to Unauthorized Access
Using default passwords poses a major risk by creating vulnerability to unauthorized access, as attackers often exploit devices with unchanged default credentials.

An enterprise wants to enhance its network security through granular control of network traffic. Which aspect of SDN would be most beneficial?

  • OpenFlow
  • Southbound API
  • Northbound API
  • Network Virtualization
OpenFlow, as part of SDN, allows granular control of network traffic by defining how packets are forwarded through network devices, enhancing security measures.

What is a major security challenge in implementing SDN in an enterprise network?

  • Insecure APIs and communication channels between the SDN controller and network devices.
  • Lack of scalability, making it difficult to secure large SDN deployments.
  • The absence of firewalls in SDN, exposing the network to external threats.
  • Limited support for encryption protocols in SDN environments.
A major security challenge in SDN is insecure APIs and communication channels between the controller and network devices, posing vulnerabilities.

Port Security is typically implemented on _________ ports to restrict the number of valid MAC addresses.

  • Access
  • Dynamic
  • EtherChannel
  • Trunk
Port Security is typically implemented on Access ports to restrict the number of valid MAC addresses.

Which network topology features a central hub or switch where all nodes are connected, offering simplicity but creating a single point of failure?

  • Bus
  • Mesh
  • Ring
  • Star
In a star topology, all nodes are connected to a central hub or switch, providing simplicity but creating a single point of failure.

For high-capacity data transmission within a metropolitan area, ________ is a preferred choice.

  • Fiber Optics
  • Satellite
  • Coaxial Cable
  • Microwave
For high-capacity data transmission within a metropolitan area, Fiber Optics is a preferred choice due to its high bandwidth and low signal loss.

In the context of advanced firewall configuration, what is deep packet inspection (DPI)?

  • A method to analyze and filter the actual content of data packets at the application layer
  • A technique to quickly route packets based on their source and destination addresses
  • A process of encrypting packet headers for enhanced security
  • A mechanism to reduce latency by inspecting only packet headers
Deep packet inspection (DPI) involves analyzing and filtering the actual content of data packets at the application layer, providing advanced security capabilities.

What is the impact of having a large number of OSPF areas on network performance?

  • Enhances network performance by reducing the size of the OSPF database and shortening SPF calculation times.
  • Has no impact on network performance as OSPF is designed to efficiently handle a large number of areas.
  • Improves network scalability, but at the cost of increased routing table size.
  • May degrade network performance due to increased LSA propagation and SPF computation overhead.
A large number of OSPF areas can impact network performance by increasing LSA propagation and SPF computation overhead, potentially leading to degradation.