Employing _________ during troubleshooting ensures a comprehensive understanding of the problem from higher to lower layers of the network.

  • Ping
  • Traceroute
  • SNMP
  • Wireshark
Employing Wireshark during troubleshooting provides a comprehensive understanding of the problem by capturing and analyzing traffic from higher to lower layers of the network.

In a mesh topology, what method is typically used to ensure data reaches its destination via the most efficient route?

  • Broadcasting
  • Multicasting
  • Routing
  • Switching
In a mesh topology, routing is typically used to ensure data reaches its destination via the most efficient route. Routing algorithms determine the optimal path for data transmission.

What mechanism does BGP use to ensure that route updates are received and processed correctly?

  • TCP
  • MD5 Authentication
  • TTL Security
  • Prefix Lists
BGP uses the TCP (Transmission Control Protocol) to ensure that route updates are received and processed correctly.

What does GRE stand for in the context of network tunneling?

  • Generic Routing Encapsulation
  • General Resource Encryption
  • Graphical Routing Environment
  • Global Reachability Extension
GRE stands for Generic Routing Encapsulation in the context of network tunneling.

In _______ topology, data is transmitted in one direction only, making it less prone to data collision.

  • Bus
  • Point-to-Point
  • Ring
  • Star
In Point-to-Point topology, data is transmitted in one direction only, making it less prone to data collision. This is suitable for dedicated communication between two devices.

In SDN, what term describes the process of making decisions about where traffic is sent in the network?

  • Network Virtualization
  • OpenFlow
  • SDN Controller
  • Traffic Engineering
In SDN, the process of making decisions about where traffic is sent in the network is handled by the SDN Controller.

What methodology involves checking each layer of the OSI model in sequence to isolate a network issue?

  • Bottom-Up
  • Top-Down
  • Sideways
  • Diagonal
The top-down methodology involves checking each layer of the OSI model in sequence to isolate a network issue, starting from the application layer down to the physical layer.

________ ACLs are more specific and versatile than standard ACLs, as they can filter packets based on port numbers and protocol types.

  • Dynamic
  • Extended
  • Named
  • Standard
Extended ACLs are more specific and versatile than standard ACLs, allowing filtering based on port numbers and protocol types.

Which protocol is used to encrypt management sessions with network devices?

  • SNMP
  • HTTPS
  • Telnet
  • ICMP
HTTPS (Hypertext Transfer Protocol Secure) is the protocol used to encrypt management sessions with network devices, ensuring secure communication for managing devices.

A network administrator notices that their AS is receiving suboptimal BGP routes. What BGP attribute should they adjust to influence incoming traffic paths?

  • Local Preference
  • AS Path
  • MED (Multi-Exit Discriminator)
  • Weight
The Local Preference attribute in BGP is adjusted to influence incoming traffic paths. It is used within the same AS to set preferences for routes.