________ is a common method where the functionality of each network component is verified in order, starting from the physical layer.
- Troubleshooting
- Ping Test
- Trace Route
- Layered Testing
Layered testing is a common method where the functionality of each network component is verified in order, starting from the physical layer.
_________ mode in Port Security allows dynamically learned MAC addresses to be retained even if the switch is restarted.
- Dynamic
- Secure
- Static
- Sticky
Sticky mode in Port Security allows dynamically learned MAC addresses to be retained even if the switch is restarted.
________ was a popular choice for digital telecommunication networks before being overshadowed by newer technologies.
- ISDN (Integrated Services Digital Network)
- ATM (Asynchronous Transfer Mode)
- Frame Relay
- X.25
ISDN (Integrated Services Digital Network) was a popular choice for digital telecommunication networks before being overshadowed by newer technologies like broadband and fiber optics.
Which type of network link is necessary to transport multiple VLANs across network devices?
- Access Link
- Ethernet Link
- Point-to-Point Link
- Trunk Link
A trunk link is necessary to transport multiple VLANs across network devices, allowing for the passage of tagged VLAN traffic.
In troubleshooting a network that frequently loses connection, what systematic approach should be used to pinpoint the exact cause?
- Check for interference in wireless networks
- Implement QoS for better connectivity
- Conduct a packet capture analysis
- Update network device firmware
To pinpoint the exact cause of frequent connection losses, a systematic approach involves conducting a packet capture analysis to examine network traffic and identify potential issues.
What is the primary benefit of switch stacking in a network environment?
- Better Performance
- Enhanced Redundancy
- Improved Security
- Increased Scalability
The primary benefit of switch stacking is increased scalability, allowing multiple switches to be interconnected and managed as a single logical unit.
The _______ mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.
- Blocking
- Forwarding
- Listening
- Root Guard
The blocking mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.
What is the role of YAML in network automation scripts?
- It defines network protocols for communication.
- It is used for configuring network devices directly.
- It is a scripting language for automation.
- It provides a human-readable data format for configuration files.
YAML in network automation scripts plays the role of providing a human-readable data format for configuration files, making it easier for users to understand and modify configurations.
_________ is a QoS technique that allows categorizing traffic into multiple classes based on priority.
- Traffic Policing
- Traffic Shaping
- Classification
- Marking
Classification is a QoS technique that allows categorizing traffic into multiple classes based on priority.
Which legacy WAN technology was historically used for connecting distant networks but is now largely replaced by more modern technologies?
- ISDN (Integrated Services Digital Network)
- Frame Relay
- DSL
- Satellite
Frame Relay, a legacy WAN technology, was historically used for connecting distant networks but is now largely replaced by more modern technologies.