SSH (Secure Shell) is primarily used for what purpose in network security?
- File Transfer
- Remote Access
- Email Security
- Web Browsing
SSH (Secure Shell) is primarily used for secure remote access to network devices, providing a secure channel for command-line access.
The _________ is a key component in SNMP, storing data about the managed objects within a device.
- MIB (Management Information Base)
- OID (Object Identifier)
- RMON (Remote Monitoring)
- ARP (Address Resolution Protocol)
The MIB (Management Information Base) is a key component in SNMP, storing data about the managed objects within a device.
A company is experiencing slow data transfers over its WAN. To address this, what WAN optimization technique would be most effective?
- Compression
- Caching
- Quality of Service (QoS)
- Traffic Shaping
Compression is a WAN optimization technique that reduces the size of data transferred over the network, improving data transfer speeds.
Syslog messages are categorized into different levels, where a level of 0 represents _______.
- Emergency
- Debugging
- Critical
- Alert
In syslog, a level of 0 represents Emergency, indicating the most severe and critical messages.
How does a stateful firewall differ from a stateless firewall in terms of traffic filtering?
- Stateless firewall filters traffic based on source and destination information
- Stateless firewall examines the state of active connections
- Stateful firewall filters traffic based on source and destination information
- Stateful firewall does not keep track of the state of connections
A stateful firewall filters traffic based on the state of active connections, considering the context of the traffic.
QoS policies applied to a network affect which of the following: Bandwidth allocation, Delay, Jitter, or All of these?
- Bandwidth allocation
- Delay
- Jitter
- All of these
QoS policies applied to a network can affect all of these factors: Bandwidth allocation, Delay, and Jitter.
What type of WAN connection uses a private network to securely connect remote sites over the internet?
- VPN (Virtual Private Network)
- MPLS
- ISDN (Integrated Services Digital Network)
- DSL
A VPN (Virtual Private Network) uses a private network to securely connect remote sites over the internet.
The _______ topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors.
- Hybrid
- Mesh
- Ring
- Star
The Mesh topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors. Mesh networks provide high fault tolerance and scalability due to multiple connections.
In a network with high mobility and frequent device changes, what DHCP feature should be emphasized to manage network addresses effectively?
- DHCP Reservation
- DHCP Relay Agent
- DHCP Lease Time
- DHCP Option 82
A shorter DHCP lease time should be emphasized in a network with high mobility and frequent device changes to manage network addresses effectively.
Automating network security tasks is often done using ________, which help in identifying and mitigating security threats.
- Intrusion Detection Systems
- Firewalls
- VPNs
- Access Control Lists
Automating network security tasks is often done using Intrusion Detection Systems, which help in identifying and mitigating security threats.