How does GLBP differ from HSRP in terms of gateway load balancing?

  • GLBP allows for load balancing across multiple gateways, while HSRP supports only active/standby mode.
  • HSRP provides better gateway load balancing than GLBP.
  • GLBP and HSRP offer the same load balancing capabilities.
  • GLBP is a Cisco proprietary protocol, while HSRP is an open standard.
GLBP differs from HSRP by allowing load balancing across multiple gateways, providing enhanced gateway load balancing capabilities.

In DHCP, the _________ period is the time interval that a DHCP client waits before renewing or rebinding its IP address.

  • Lease
  • Renewal
  • Allocation
  • Rebinding
In DHCP, the Renewal period is the time interval that a DHCP client waits before renewing or rebinding its IP address with the DHCP server.

OSPF uses ________ as its algorithm for computing the shortest path through the network.

  • Bellman-Ford algorithm
  • Dijkstra's algorithm
  • Floyd-Warshall algorithm
  • Johnson's algorithm
OSPF uses Dijkstra's algorithm for computing the shortest path through the network.

In QoS, what does the term 'classification' refer to?

  • Identifying and categorizing network traffic
  • Adjusting the speed of data transmission
  • Managing network congestion
  • Allocating IP addresses
In Quality of Service (QoS), 'classification' involves identifying and categorizing network traffic based on specific criteria to prioritize or treat it differently.

How does an extended ACL differ from a standard ACL in terms of its capabilities?

  • Allows or denies traffic based on the protocol used
  • Applies only to routers
  • Filters traffic based on source and destination IP address, as well as protocols and ports
  • Filters traffic based on source or destination IP address only
An extended ACL differs from a standard ACL by filtering traffic based on source and destination IP address, as well as protocols and ports.

In a scenario where a company needs to transmit multicast traffic over an IP network that does not support it natively, which tunneling technique would be most appropriate?

  • L2TP
  • MPLS
  • GRE
  • PPTP
To transmit multicast traffic over an IP network that does not support it natively, GRE (Generic Routing Encapsulation) tunneling is often the most appropriate technique.

In advanced network designs, why is careful planning required when implementing route redistribution?

  • Efficient bandwidth utilization
  • Minimized administrative overhead
  • Prevention of routing loops
  • Simplicity in troubleshooting
Careful planning is required during route redistribution to prevent routing loops, ensuring network stability and reliability.

What is a major advantage of using automated configuration management tools like Ansible or Puppet in network device management?

  • Efficient Scalability
  • Enhanced Security
  • Simplified Management
  • Improved Performance
Automated configuration management tools, such as Ansible or Puppet, offer a major advantage in network device management by providing simplified management, streamlining configuration tasks across a network.

A _______ is a network device that is used to connect devices on a computer network by using packet switching to receive, process, and forward data to the destination device.

  • Hub
  • Repeater
  • Router
  • Switch
A switch is a network device that connects devices on a computer network using packet switching to receive, process, and forward data to the destination device.

How does SSH differ from SSL in terms of its primary usage in network security?

  • SSH is used for secure remote access and command execution, while SSL is used for securing data transmitted between applications.
  • SSL is used for secure remote access, and SSH is used for securing data transmitted between web servers and clients.
  • Both SSH and SSL serve the same primary purpose in network security.
  • SSH is specifically designed for securing email communication, while SSL is used for securing file transfers.
SSH is primarily used for secure remote access and command execution, distinguishing it from SSL, which secures data transmitted between applications.