SSH (Secure Shell) is primarily used for what purpose in network security?

  • File Transfer
  • Remote Access
  • Email Security
  • Web Browsing
SSH (Secure Shell) is primarily used for secure remote access to network devices, providing a secure channel for command-line access.

The _________ is a key component in SNMP, storing data about the managed objects within a device.

  • MIB (Management Information Base)
  • OID (Object Identifier)
  • RMON (Remote Monitoring)
  • ARP (Address Resolution Protocol)
The MIB (Management Information Base) is a key component in SNMP, storing data about the managed objects within a device.

A company is experiencing slow data transfers over its WAN. To address this, what WAN optimization technique would be most effective?

  • Compression
  • Caching
  • Quality of Service (QoS)
  • Traffic Shaping
Compression is a WAN optimization technique that reduces the size of data transferred over the network, improving data transfer speeds.

Syslog messages are categorized into different levels, where a level of 0 represents _______.

  • Emergency
  • Debugging
  • Critical
  • Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.

How does a stateful firewall differ from a stateless firewall in terms of traffic filtering?

  • Stateless firewall filters traffic based on source and destination information
  • Stateless firewall examines the state of active connections
  • Stateful firewall filters traffic based on source and destination information
  • Stateful firewall does not keep track of the state of connections
A stateful firewall filters traffic based on the state of active connections, considering the context of the traffic.

QoS policies applied to a network affect which of the following: Bandwidth allocation, Delay, Jitter, or All of these?

  • Bandwidth allocation
  • Delay
  • Jitter
  • All of these
QoS policies applied to a network can affect all of these factors: Bandwidth allocation, Delay, and Jitter.

What type of WAN connection uses a private network to securely connect remote sites over the internet?

  • VPN (Virtual Private Network)
  • MPLS
  • ISDN (Integrated Services Digital Network)
  • DSL
A VPN (Virtual Private Network) uses a private network to securely connect remote sites over the internet.

The _______ topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors.

  • Hybrid
  • Mesh
  • Ring
  • Star
The Mesh topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors. Mesh networks provide high fault tolerance and scalability due to multiple connections.

In a network with high mobility and frequent device changes, what DHCP feature should be emphasized to manage network addresses effectively?

  • DHCP Reservation
  • DHCP Relay Agent
  • DHCP Lease Time
  • DHCP Option 82
A shorter DHCP lease time should be emphasized in a network with high mobility and frequent device changes to manage network addresses effectively.

Automating network security tasks is often done using ________, which help in identifying and mitigating security threats.

  • Intrusion Detection Systems
  • Firewalls
  • VPNs
  • Access Control Lists
Automating network security tasks is often done using Intrusion Detection Systems, which help in identifying and mitigating security threats.