What type of cabling is recommended for a network that requires a bandwidth of up to 10 Gbps over a distance of 100 meters?
- Coaxial
- Ethernet
- Fiber Optic
- Twisted Pair
Twisted pair cabling, especially Cat6 or Cat6a, is recommended for a network that requires a bandwidth of up to 10 Gbps over a distance of 100 meters.
VLAN ______ is typically reserved for management purposes on a network switch.
- 1
- 1001
- 4095
- 99
VLAN 99 is typically reserved for management purposes on a network switch.
The ________ model in cloud computing is best suited for businesses that require high levels of management control over applications and infrastructure.
- IaaS (Infrastructure as a Service)
- PaaS (Platform as a Service)
- SaaS (Software as a Service)
- XaaS (Everything as a Service)
The IaaS (Infrastructure as a Service) model is best suited for businesses needing high management control over applications and infrastructure.
In the OSI model, which layer is responsible for establishing, managing, and terminating connections between applications?
- Physical Layer
- Presentation Layer
- Session Layer
- Transport Layer
The Session Layer in the OSI model is responsible for establishing, managing, and terminating connections between applications.
The ________ platform is widely used for automating network operations and managing configurations across multiple systems.
- Ansible
- Puppet
- Chef
- SaltStack
Ansible is a widely used platform for automating network operations and managing configurations across multiple systems.
The ________ feature in IPSec helps in establishing and maintaining a secure communication channel.
- Tunnel Mode
- Dead Peer Detection
- Perfect Forward Secrecy (PFS)
- Security Association (SA)
The Perfect Forward Secrecy (PFS) feature in IPSec helps in establishing and maintaining a secure communication channel.
An IT manager wants to automate repetitive network management tasks to improve efficiency and accuracy. Which approach or tool should they consider integrating?
- Packet Sniffer
- CLI Scripting
- Ping
- Traceroute
CLI (Command Line Interface) scripting allows the automation of repetitive network management tasks, enhancing efficiency and accuracy by scripting command sequences.
In IPSec, what is the role of the IKE (Internet Key Exchange) protocol?
- IKE negotiates and establishes security associations (SAs) between devices.
- IKE encrypts user data for secure transmission.
- IKE authenticates users during the VPN connection setup.
- IKE is responsible for routing decisions in IPSec networks.
In IPSec, the IKE protocol negotiates and establishes security associations (SAs) between devices, ensuring secure communication.
________ is a QoS technique that prioritizes packets based on their sensitivity to delay.
- Traffic Shaping
- Packet Sniffing
- Traffic Policing
- Low Latency Queuing
Low Latency Queuing is a QoS technique that prioritizes packets based on their sensitivity to delay.
How do modern routers differ from traditional routers in terms of functionality and network management?
- Application Layer Gateway (ALG)
- Dynamic Routing Protocols
- Network Address Translation (NAT)
- Packet Filtering
Modern routers employ dynamic routing protocols, enhancing network management and adaptability compared to traditional routers.