________ was a popular choice for digital telecommunication networks before being overshadowed by newer technologies.
- ISDN (Integrated Services Digital Network)
- ATM (Asynchronous Transfer Mode)
- Frame Relay
- X.25
ISDN (Integrated Services Digital Network) was a popular choice for digital telecommunication networks before being overshadowed by newer technologies like broadband and fiber optics.
Which type of network link is necessary to transport multiple VLANs across network devices?
- Access Link
- Ethernet Link
- Point-to-Point Link
- Trunk Link
A trunk link is necessary to transport multiple VLANs across network devices, allowing for the passage of tagged VLAN traffic.
In troubleshooting a network that frequently loses connection, what systematic approach should be used to pinpoint the exact cause?
- Check for interference in wireless networks
- Implement QoS for better connectivity
- Conduct a packet capture analysis
- Update network device firmware
To pinpoint the exact cause of frequent connection losses, a systematic approach involves conducting a packet capture analysis to examine network traffic and identify potential issues.
What is the primary benefit of switch stacking in a network environment?
- Better Performance
- Enhanced Redundancy
- Improved Security
- Increased Scalability
The primary benefit of switch stacking is increased scalability, allowing multiple switches to be interconnected and managed as a single logical unit.
The _______ mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.
- Blocking
- Forwarding
- Listening
- Root Guard
The blocking mechanism in STP prevents the formation of loops by temporarily disabling redundant paths.
In WAN optimization, what is the main purpose of implementing compression techniques?
- Reduce data transfer time
- Increase data integrity
- Improve network security
- Minimize latency
The main purpose of implementing compression techniques in WAN optimization is to reduce data transfer time by compressing the data before transmission.
When designing a network monitoring system, an administrator decides to use a protocol that supports both polling and unsolicited updates from network devices. Which protocol should they use?
- SNMP
- Syslog
- NetFlow
- ICMP
SNMP (Simple Network Management Protocol) supports both polling (active requests for information) and unsolicited updates (traps) from network devices, making it suitable for a comprehensive network monitoring system.
Which legacy WAN technology was historically used for connecting distant networks but is now largely replaced by more modern technologies?
- ISDN (Integrated Services Digital Network)
- Frame Relay
- DSL
- Satellite
Frame Relay, a legacy WAN technology, was historically used for connecting distant networks but is now largely replaced by more modern technologies.
How does VLSM contribute to more efficient use of IP address space?
- It allocates larger address blocks
- It allows subnetting of subnets
- It reduces the need for NAT
- It uses IPv6 exclusively
VLSM (Variable Length Subnet Masking) allows subnetting of subnets, enabling more efficient utilization of IP address space by assigning different-sized subnets based on network requirements.
________ is a key protocol in IPv6 that replaces ARP used in IPv4 for resolving IP addresses to MAC addresses.
- Neighbor Discovery Protocol (NDP)
- Internet Group Management Protocol (IGMPv6)
- Reverse Address Resolution Protocol (RARP)
- Border Gateway Protocol (BGP)
Neighbor Discovery Protocol (NDP) is a key protocol in IPv6 that replaces ARP used in IPv4 for resolving IP addresses to MAC addresses.