A company is transitioning to a fully automated network system. Which scripting language should they prioritize for their network engineers to learn for efficient automation and script-based configurations?

  • Python
  • Java
  • C++
  • Ruby
Python is widely used for network automation due to its simplicity, readability, and extensive libraries like Netmiko and NAPALM.

In a scenario where network issues are intermittent, using ___________ can help in capturing and analyzing transient events.

  • Packet Captures
  • SNMP
  • NetFlow
  • Syslog
Packet captures are invaluable in capturing and analyzing transient events, especially in scenarios with intermittent network issues.

Which topology is best suited for large-scale networks due to its scalability and decentralized nature?

  • Bus
  • Mesh
  • Star
  • Tree
A tree topology is best suited for large-scale networks due to its scalability and decentralized nature. It combines elements of bus and star topologies.

Which protocol is more secure for remote device management: Telnet or SSH?

  • Telnet
  • SSH
  • SNMP
  • FTP
SSH (Secure Shell) is more secure for remote device management compared to Telnet. Telnet transmits data in plain text, while SSH encrypts the communication for enhanced security.

A network administrator discovers that unauthorized devices are connecting to the network. Which Layer 2 security feature should be implemented to control access based on MAC addresses?

  • DHCP Snooping
  • MAC Spoofing
  • Port Security
  • VLANs
Port Security is a Layer 2 security feature that controls access based on MAC addresses, helping prevent unauthorized devices from connecting to the network.

SSH (Secure Shell) is primarily used for what purpose in network security?

  • File Transfer
  • Remote Access
  • Email Security
  • Web Browsing
SSH (Secure Shell) is primarily used for secure remote access to network devices, providing a secure channel for command-line access.

The _________ is a key component in SNMP, storing data about the managed objects within a device.

  • MIB (Management Information Base)
  • OID (Object Identifier)
  • RMON (Remote Monitoring)
  • ARP (Address Resolution Protocol)
The MIB (Management Information Base) is a key component in SNMP, storing data about the managed objects within a device.

A company is experiencing slow data transfers over its WAN. To address this, what WAN optimization technique would be most effective?

  • Compression
  • Caching
  • Quality of Service (QoS)
  • Traffic Shaping
Compression is a WAN optimization technique that reduces the size of data transferred over the network, improving data transfer speeds.

Syslog messages are categorized into different levels, where a level of 0 represents _______.

  • Emergency
  • Debugging
  • Critical
  • Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.

What is EtherChannel primarily used for in network configurations?

  • Assigning IP addresses
  • Encrypting data transmission
  • Load balancing
  • Reducing network congestion
EtherChannel is primarily used for load balancing in network configurations, distributing traffic across multiple links.