A network administrator is implementing a new policy to enhance device security. They need a protocol that encrypts both authentication and session data. Which protocol should they use?

  • SSL/TLS
  • SNMP
  • SSH
  • DHCP
SSH (Secure Shell) is a protocol that encrypts both authentication and session data, providing enhanced device security.

_________ is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

  • Dynamic NAT
  • NAT Overload
  • PAT (Port Address Translation)
  • Static NAT
PAT (Port Address Translation) is used to allow multiple devices on a private network to be mapped to a single public IP address but with different port numbers.

In a complex network, what is the primary challenge when implementing VLSM?

  • Incompatibility with DHCP
  • Increased routing table complexity
  • Lack of support from network devices
  • Limited number of available IP addresses
In complex networks, the primary challenge when implementing VLSM is increased routing table complexity, as it requires routers to maintain information about subnets of varying sizes.

A network administrator discovers that unauthorized devices are connecting to the network. Which Layer 2 security feature should be implemented to control access based on MAC addresses?

  • DHCP Snooping
  • MAC Spoofing
  • Port Security
  • VLANs
Port Security is a Layer 2 security feature that controls access based on MAC addresses, helping prevent unauthorized devices from connecting to the network.

What is the effect of placing an ACL close to the source of traffic in a network?

  • Causes network congestion
  • Decreases network performance
  • Has no impact on network traffic
  • Increases network security
Placing an ACL close to the source of traffic increases network security by filtering unwanted traffic before it enters the network.

What is the primary purpose of SNMP (Simple Network Management Protocol) in network management?

  • Network Monitoring
  • Device Configuration
  • File Sharing
  • Web Browsing
SNMP is primarily used for network monitoring, allowing devices to be managed and monitored remotely.

In QoS, ________ is a method used to measure and control the rate of traffic sent to the network.

  • Policing
  • Shaping
  • Dropping
  • Queuing
Policing in QoS is a method used to measure and control the rate of traffic sent to the network.

How does a stateful firewall differ from a stateless firewall in terms of traffic filtering?

  • Stateless firewall filters traffic based on source and destination information
  • Stateless firewall examines the state of active connections
  • Stateful firewall filters traffic based on source and destination information
  • Stateful firewall does not keep track of the state of connections
A stateful firewall filters traffic based on the state of active connections, considering the context of the traffic.

QoS policies applied to a network affect which of the following: Bandwidth allocation, Delay, Jitter, or All of these?

  • Bandwidth allocation
  • Delay
  • Jitter
  • All of these
QoS policies applied to a network can affect all of these factors: Bandwidth allocation, Delay, and Jitter.

What type of WAN connection uses a private network to securely connect remote sites over the internet?

  • VPN (Virtual Private Network)
  • MPLS
  • ISDN (Integrated Services Digital Network)
  • DSL
A VPN (Virtual Private Network) uses a private network to securely connect remote sites over the internet.