________ is a technique used in BGP to filter out undesired routes.

  • Prefix Filtering
  • Route Aggregation
  • Route Summarization
  • Route Filtering
Route filtering is a technique used in BGP to filter out undesired routes.

In the context of device security, what is a major risk of using default passwords?

  • Improved User Convenience
  • Enhanced Device Performance
  • Increased Resistance to Cyber Attacks
  • Vulnerability to Unauthorized Access
Using default passwords poses a major risk by creating vulnerability to unauthorized access, as attackers often exploit devices with unchanged default credentials.

An enterprise wants to enhance its network security through granular control of network traffic. Which aspect of SDN would be most beneficial?

  • OpenFlow
  • Southbound API
  • Northbound API
  • Network Virtualization
OpenFlow, as part of SDN, allows granular control of network traffic by defining how packets are forwarded through network devices, enhancing security measures.

An ISP needs to control network congestion during peak hours. What QoS strategy should they employ to manage bandwidth usage effectively?

  • Weighted Random Early Detection (WRED)
  • Traffic Policing
  • Class-Based Weighted Fair Queuing (CBWFQ)
  • Congestion Avoidance
Weighted Random Early Detection (WRED) is a congestion avoidance technique that an ISP can use to control network congestion during peak hours.

The election of the master virtual router in _______ is based on the priority configured on the routers participating in the VRRP group.

  • HSRP
  • GLBP
  • VRRP
  • OSPF
In VRRP (Virtual Router Redundancy Protocol), the election of the master virtual router is based on the priority configured on the routers participating in the VRRP group.

PPP (Point-to-Point Protocol) is primarily used for establishing a direct connection between two nodes in what type of network configurations?

  • LAN
  • WAN
  • MAN
  • PAN
PPP is primarily used for establishing a direct connection between two nodes in Wide Area Network (WAN) configurations.

What is the significance of the Network Interface Layer in the TCP/IP model in relation to OSI's Data Link Layer?

  • Handles flow control between devices on the same network
  • Manages error detection and correction
  • Provides a reliable and error-free link between two directly connected nodes
  • Responsible for logical addressing using MAC addresses
The Network Interface Layer in the TCP/IP model is significant as it is responsible for logical addressing using MAC addresses, akin to the OSI Data Link Layer.

In a network using multiple routing protocols, _________ is used to facilitate communication between different network segments.

  • BGP
  • OSPF
  • Route Redistribution
  • Route Summarization
In a network with multiple routing protocols, route redistribution is used to facilitate communication between different network segments by sharing routes between protocols.

How does a ring topology manage the data collision and ensure efficient data transmission?

  • Collision Detection
  • Frequency Division Multiplexing
  • Time Division Multiplexing
  • Token Passing
In a ring topology, token passing is used to manage data collisions and ensure efficient data transmission. Only the device with the token can transmit data at any given time.

Chassis aggregation is mainly used to improve what aspect of network performance?

  • Bandwidth
  • Latency
  • Reliability
  • Security
Chassis aggregation is mainly used to improve bandwidth in a network, combining the capacity of multiple physical devices.