What is the purpose of the STP port states like blocking, listening, learning, and forwarding?
- Enhance Security
- Prevent Loops
- Prioritize Voice Traffic
- Speed Up Data Transmission
STP port states serve to prevent loops in the network. Blocking, listening, learning, and forwarding are stages in the convergence process to ensure a loop-free topology.
What is the significance of configuring zone-based firewalls in complex network environments?
- Zone-based firewalls provide a flexible and granular approach to defining security policies between network zones
- Zone-based firewalls are only suitable for small-scale networks and may not be effective in complex environments
- Configuring zone-based firewalls is unnecessary in complex network environments
- Zone-based firewalls only support stateless packet filtering, limiting their effectiveness
Configuring zone-based firewalls in complex network environments is significant because it provides a flexible and granular approach to defining security policies between different network zones.
To enhance security, Port Security settings can be made persistent across reboots by saving them in the ________.
- Flash Memory
- NVRAM
- Running Configuration
- Startup Configuration
Port Security settings can be saved in the startup configuration to make them persistent across reboots.
In _______ topology, data is transmitted in one direction only, making it less prone to data collision.
- Bus
- Point-to-Point
- Ring
- Star
In Point-to-Point topology, data is transmitted in one direction only, making it less prone to data collision. This is suitable for dedicated communication between two devices.
In SDN, what term describes the process of making decisions about where traffic is sent in the network?
- Network Virtualization
- OpenFlow
- SDN Controller
- Traffic Engineering
In SDN, the process of making decisions about where traffic is sent in the network is handled by the SDN Controller.
What methodology involves checking each layer of the OSI model in sequence to isolate a network issue?
- Bottom-Up
- Top-Down
- Sideways
- Diagonal
The top-down methodology involves checking each layer of the OSI model in sequence to isolate a network issue, starting from the application layer down to the physical layer.
________ ACLs are more specific and versatile than standard ACLs, as they can filter packets based on port numbers and protocol types.
- Dynamic
- Extended
- Named
- Standard
Extended ACLs are more specific and versatile than standard ACLs, allowing filtering based on port numbers and protocol types.
Which protocol is used to encrypt management sessions with network devices?
- SNMP
- HTTPS
- Telnet
- ICMP
HTTPS (Hypertext Transfer Protocol Secure) is the protocol used to encrypt management sessions with network devices, ensuring secure communication for managing devices.
A network administrator notices that their AS is receiving suboptimal BGP routes. What BGP attribute should they adjust to influence incoming traffic paths?
- Local Preference
- AS Path
- MED (Multi-Exit Discriminator)
- Weight
The Local Preference attribute in BGP is adjusted to influence incoming traffic paths. It is used within the same AS to set preferences for routes.
In a network with multiple switches, how does the Spanning Tree Protocol (STP) determine the root bridge?
- Highest MAC address
- Highest bridge priority
- Lowest MAC address
- Lowest bridge priority
The Spanning Tree Protocol (STP) determines the root bridge based on the lowest bridge priority. If priorities are the same, it uses the lowest MAC address as a tiebreaker.