A company is transitioning to a fully automated network system. Which scripting language should they prioritize for their network engineers to learn for efficient automation and script-based configurations?
- Python
- Java
- C++
- Ruby
Python is widely used for network automation due to its simplicity, readability, and extensive libraries like Netmiko and NAPALM.
In a scenario where network issues are intermittent, using ___________ can help in capturing and analyzing transient events.
- Packet Captures
- SNMP
- NetFlow
- Syslog
Packet captures are invaluable in capturing and analyzing transient events, especially in scenarios with intermittent network issues.
Which topology is best suited for large-scale networks due to its scalability and decentralized nature?
- Bus
- Mesh
- Star
- Tree
A tree topology is best suited for large-scale networks due to its scalability and decentralized nature. It combines elements of bus and star topologies.
Which protocol is more secure for remote device management: Telnet or SSH?
- Telnet
- SSH
- SNMP
- FTP
SSH (Secure Shell) is more secure for remote device management compared to Telnet. Telnet transmits data in plain text, while SSH encrypts the communication for enhanced security.
A network administrator discovers that unauthorized devices are connecting to the network. Which Layer 2 security feature should be implemented to control access based on MAC addresses?
- DHCP Snooping
- MAC Spoofing
- Port Security
- VLANs
Port Security is a Layer 2 security feature that controls access based on MAC addresses, helping prevent unauthorized devices from connecting to the network.
SSH (Secure Shell) is primarily used for what purpose in network security?
- File Transfer
- Remote Access
- Email Security
- Web Browsing
SSH (Secure Shell) is primarily used for secure remote access to network devices, providing a secure channel for command-line access.
The _________ is a key component in SNMP, storing data about the managed objects within a device.
- MIB (Management Information Base)
- OID (Object Identifier)
- RMON (Remote Monitoring)
- ARP (Address Resolution Protocol)
The MIB (Management Information Base) is a key component in SNMP, storing data about the managed objects within a device.
A company is experiencing slow data transfers over its WAN. To address this, what WAN optimization technique would be most effective?
- Compression
- Caching
- Quality of Service (QoS)
- Traffic Shaping
Compression is a WAN optimization technique that reduces the size of data transferred over the network, improving data transfer speeds.
Syslog messages are categorized into different levels, where a level of 0 represents _______.
- Emergency
- Debugging
- Critical
- Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.
What is EtherChannel primarily used for in network configurations?
- Assigning IP addresses
- Encrypting data transmission
- Load balancing
- Reducing network congestion
EtherChannel is primarily used for load balancing in network configurations, distributing traffic across multiple links.