3. What is the purpose of IPv6 First Hop Security (FHS)?
A. To prevent IP spoofing attacks
B. To prevent router advertisement (RA) flooding attacks
C. To prevent neighbor discovery (ND) spoofing attacks
D. To prevent rogue DHCP server attacks
Answer: C. To prevent neighbor discovery (ND) spoofing attacks
Explanation: IPv6 First Hop Security (FHS) is a set of security features used to protect the neighbor discovery (ND) protocol from spoofing attacks, such as rogue router advertisements (RAs) and fake neighbor solicitations (NSs).
4. What is the purpose of logging in network security?
A. To monitor network performance
B. To store network configuration backups
C. To track user activity
D. To detect security threats
Answer: D. To detect security threats
Explanation: Logging is an important tool in network security used to detect security threats, such as network intrusions, malware infections, and unauthorized access attempts.
5. What is the purpose of AAA in network security?
A. To secure the data plane
B. To secure the management plane
C. To secure the control plane
D. To provide centralized authentication, authorization, and accounting services
Answer: D. To provide centralized authentication, authorization, and accounting services
Explanation: AAA (Authentication, Authorization, and Accounting) is a security framework used to provide centralized authentication, authorization, and accounting services for network devices and users. It is commonly used to secure the management plane of a network.
Infrastructure Services sample questions
1. Which protocol is commonly used for device management through a command-line interface?
a. HTTP
b. SSH
c. SMTP
d. DNS
Answer: b. SSH
Explanation: SSH (Secure Shell) is a protocol used for secure remote access to devices, including routers and switches. It provides a secure, encrypted connection to the device's command-line interface, allowing for secure device management.
2. What is the primary function of SNMP (Simple Network Management Protocol)?
a. To provide secure remote access to devices
b. To monitor and manage network devices and applications
c. To encrypt network traffic
d. To provide Quality of Service (QoS) for network traffic
Answer: b. To monitor and manage network devices and applications
Explanation: SNMP is a protocol used for monitoring and managing network devices, including routers, switches, and servers. It allows network administrators to monitor device performance, track network utilization, and receive alerts for issues that require attention.
3. Which network service is used for dynamic allocation of IP addresses to client devices?
a. DNS
b. DHCP
c. SMTP
d. FTP
Answer: b. DHCP
Explanation: DHCP (Dynamic Host Configuration Protocol) is a network service used for dynamic allocation of IP addresses to client devices. It allows devices to automatically obtain an IP address, subnet mask, default gateway, and DNS server information.
4. What is the purpose of IP SLA (IP Service Level Agreement)?
a. To monitor network performance and troubleshoot connectivity issues
b. To secure remote access to devices
c. To provide Quality of Service (QoS) for network traffic
d. To allocate IP addresses to client devices
Answer: a. To monitor network performance and troubleshoot connectivity issues
Explanation: IP SLA (IP Service Level Agreement) is a tool used to monitor network performance and troubleshoot connectivity issues. It allows network administrators to measure network performance metrics such as delay, jitter, and packet loss, and to identify potential network issues.
5. What is NetFlow used for in a network?
a. To secure remote access to devices
b. To monitor and manage network devices and applications
c. To allocate IP addresses to client devices
d. To monitor network traffic and collect data for analysis
Answer: d. To monitor network traffic and collect data for analysis
Explanation: NetFlow is a protocol used to monitor network traffic and collect data for analysis. It allows network administrators to identify and analyze network traffic patterns, track network utilization, and detect potential security threats.