SSH (Secure Shell) is primarily used for what purpose in network security?
- File Transfer
- Remote Access
- Email Security
- Web Browsing
SSH (Secure Shell) is primarily used for secure remote access to network devices, providing a secure channel for command-line access.
The _________ is a key component in SNMP, storing data about the managed objects within a device.
- MIB (Management Information Base)
- OID (Object Identifier)
- RMON (Remote Monitoring)
- ARP (Address Resolution Protocol)
The MIB (Management Information Base) is a key component in SNMP, storing data about the managed objects within a device.
A company is experiencing slow data transfers over its WAN. To address this, what WAN optimization technique would be most effective?
- Compression
- Caching
- Quality of Service (QoS)
- Traffic Shaping
Compression is a WAN optimization technique that reduces the size of data transferred over the network, improving data transfer speeds.
Syslog messages are categorized into different levels, where a level of 0 represents _______.
- Emergency
- Debugging
- Critical
- Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.
What is the effect of placing an ACL close to the source of traffic in a network?
- Causes network congestion
- Decreases network performance
- Has no impact on network traffic
- Increases network security
Placing an ACL close to the source of traffic increases network security by filtering unwanted traffic before it enters the network.
What is the primary purpose of SNMP (Simple Network Management Protocol) in network management?
- Network Monitoring
- Device Configuration
- File Sharing
- Web Browsing
SNMP is primarily used for network monitoring, allowing devices to be managed and monitored remotely.
In QoS, ________ is a method used to measure and control the rate of traffic sent to the network.
- Policing
- Shaping
- Dropping
- Queuing
Policing in QoS is a method used to measure and control the rate of traffic sent to the network.
How does a stateful firewall differ from a stateless firewall in terms of traffic filtering?
- Stateless firewall filters traffic based on source and destination information
- Stateless firewall examines the state of active connections
- Stateful firewall filters traffic based on source and destination information
- Stateful firewall does not keep track of the state of connections
A stateful firewall filters traffic based on the state of active connections, considering the context of the traffic.
QoS policies applied to a network affect which of the following: Bandwidth allocation, Delay, Jitter, or All of these?
- Bandwidth allocation
- Delay
- Jitter
- All of these
QoS policies applied to a network can affect all of these factors: Bandwidth allocation, Delay, and Jitter.
What type of WAN connection uses a private network to securely connect remote sites over the internet?
- VPN (Virtual Private Network)
- MPLS
- ISDN (Integrated Services Digital Network)
- DSL
A VPN (Virtual Private Network) uses a private network to securely connect remote sites over the internet.