The _______ topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors.

  • Hybrid
  • Mesh
  • Ring
  • Star
The Mesh topology is preferred in networks where reconfiguration, scalability, and fault tolerance are critical factors. Mesh networks provide high fault tolerance and scalability due to multiple connections.

In a network with high mobility and frequent device changes, what DHCP feature should be emphasized to manage network addresses effectively?

  • DHCP Reservation
  • DHCP Relay Agent
  • DHCP Lease Time
  • DHCP Option 82
A shorter DHCP lease time should be emphasized in a network with high mobility and frequent device changes to manage network addresses effectively.

Automating network security tasks is often done using ________, which help in identifying and mitigating security threats.

  • Intrusion Detection Systems
  • Firewalls
  • VPNs
  • Access Control Lists
Automating network security tasks is often done using Intrusion Detection Systems, which help in identifying and mitigating security threats.

Which feature in Layer 2 security helps prevent DHCP starvation attacks?

  • DHCP Snooping
  • MAC Filtering
  • Port Security
  • VLANs
DHCP Snooping is a Layer 2 security feature that helps prevent DHCP starvation attacks by inspecting and filtering DHCP messages.

What OSI layer is equivalent to the combination of the Session, Presentation, and Application layers in the TCP/IP model?

  • Application Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
The Application Layer in the OSI model is equivalent to the combination of the Session, Presentation, and Application layers in the TCP/IP model.

GRE tunnels are primarily used for which of the following purposes in a network?

  • Encryption
  • Compression
  • Tunneling
  • Authentication
GRE tunnels are primarily used for tunneling purposes in a network, allowing the encapsulation of a wide variety of network layer protocols.

The process of _________ involves a firewall analyzing the content of packets to prevent various types of cyber attacks.

  • Deep Packet Inspection
  • Intrusion Detection
  • Stateful Inspection
  • Packet Filtering
The process of Deep Packet Inspection involves a firewall analyzing the content of packets to prevent various types of cyber attacks.

How does GLBP differ from HSRP in terms of gateway load balancing?

  • GLBP allows for load balancing across multiple gateways, while HSRP supports only active/standby mode.
  • HSRP provides better gateway load balancing than GLBP.
  • GLBP and HSRP offer the same load balancing capabilities.
  • GLBP is a Cisco proprietary protocol, while HSRP is an open standard.
GLBP differs from HSRP by allowing load balancing across multiple gateways, providing enhanced gateway load balancing capabilities.

In DHCP, the _________ period is the time interval that a DHCP client waits before renewing or rebinding its IP address.

  • Lease
  • Renewal
  • Allocation
  • Rebinding
In DHCP, the Renewal period is the time interval that a DHCP client waits before renewing or rebinding its IP address with the DHCP server.

OSPF uses ________ as its algorithm for computing the shortest path through the network.

  • Bellman-Ford algorithm
  • Dijkstra's algorithm
  • Floyd-Warshall algorithm
  • Johnson's algorithm
OSPF uses Dijkstra's algorithm for computing the shortest path through the network.