Which topology is best suited for large-scale networks due to its scalability and decentralized nature?

  • Bus
  • Mesh
  • Star
  • Tree
A tree topology is best suited for large-scale networks due to its scalability and decentralized nature. It combines elements of bus and star topologies.

Which protocol is more secure for remote device management: Telnet or SSH?

  • Telnet
  • SSH
  • SNMP
  • FTP
SSH (Secure Shell) is more secure for remote device management compared to Telnet. Telnet transmits data in plain text, while SSH encrypts the communication for enhanced security.

For a company that uses a mix of legacy and modern systems, which strategy would be most effective in managing both IPv4 and IPv6 addresses?

  • Dual-Stack
  • Subnetting
  • Tunneling
  • VLAN
Implementing a dual-stack strategy allows a company to manage both IPv4 and IPv6 addresses effectively, accommodating legacy and modern systems.

A simple network device that connects other devices to a network and operates on the principle of electrical signal amplification is a _______.

  • Hub
  • Repeater
  • Router
  • Switch
A repeater is a simple network device that connects other devices to a network and operates on the principle of electrical signal amplification.

Syslog messages are categorized into different levels, where a level of 0 represents _______.

  • Emergency
  • Debugging
  • Critical
  • Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.

What is EtherChannel primarily used for in network configurations?

  • Assigning IP addresses
  • Encrypting data transmission
  • Load balancing
  • Reducing network congestion
EtherChannel is primarily used for load balancing in network configurations, distributing traffic across multiple links.

What is the primary purpose of using passwords in network device security?

  • Authentication
  • Authorization
  • Confidentiality
  • Integrity
Passwords in network device security primarily serve the purpose of authentication, ensuring that users are who they claim to be.

A network administrator is implementing a new policy to enhance device security. They need a protocol that encrypts both authentication and session data. Which protocol should they use?

  • SSL/TLS
  • SNMP
  • SSH
  • DHCP
SSH (Secure Shell) is a protocol that encrypts both authentication and session data, providing enhanced device security.

_________ is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

  • Dynamic NAT
  • NAT Overload
  • PAT (Port Address Translation)
  • Static NAT
PAT (Port Address Translation) is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

In a complex network, what is the primary challenge when implementing VLSM?

  • Incompatibility with DHCP
  • Increased routing table complexity
  • Lack of support from network devices
  • Limited number of available IP addresses
In complex networks, the primary challenge when implementing VLSM is increased routing table complexity, as it requires routers to maintain information about subnets of varying sizes.