- web.groovymark@gmail.com
- November 17, 2024
Question 01
Which OSI model layer is responsible for the segment protocol data unit?
a) Network
b) Transport
c) Application
d) Data link
Correct Answer: b) Transport
Explanation: The transport layer of the OSI model is responsible for segmenting and reassembling data for efficient communication between networked systems. It ensures reliable data transfer and provides error-checking mechanisms.
Question 02
Which protocol in the software-defined networking (SDN) framework is responsible for defining the communication between the controller and a network device?
a) OpenFlow
b) Telnet
c) Point-to-point
d) Address resolution
Correct Answer: a) OpenFlow
Explanation: OpenFlow is the primary protocol in SDN that defines how controllers communicate with forwarding devices like routers and switches. It allows the SDN controller to manage flow tables, control traffic, and interact with the data plane.
Question 03
Which network automation tool is open source?
a) BlueCat Gateway
b) Chef
c) Ansible
d) Puppet Enterprise
Correct Answer: c) Ansible
Explanation: Ansible is an open-source automation tool that simplifies configuration management, application deployment, and task automation without the need for agents. It is widely adopted for network automation tasks.
Question 04
What is a benefit of using network automation?
a) Backing up and restoring data
b) Using infrastructure as code to maintain a reliable state
c) Dynamic allocation of IP addresses
d) Boosting storage
Correct Answer: b) Using infrastructure as code to maintain a reliable state
Explanation: Network automation allows infrastructure to be treated as code, ensuring that configurations remain consistent and easily manageable. This leads to more reliable network operations and reduces the chances of configuration drift.
Question 05
Which service introduces flexibility, dynamism, and automation into the management of network objects?
a) Open source for network functions virtualization (NFV)
b) OpenStack
c) Network functions virtualization (NFV)
d) Software-defined networking (SDN)
Correct Answer: d) Software-defined networking (SDN)
Explanation: SDN introduces flexibility, dynamism, and automation by decoupling the control plane from the data plane. This allows for centralized management of network resources and real-time configuration of network traffic.
Question 06
Which OpenStack unit provides authentication?
a) Cinder
b) Nova
c) Keystone
d) Neutron
Correct Answer: c) Keystone
Explanation: Keystone is the OpenStack module responsible for providing authentication services. It manages identity services and handles authorization across the OpenStack environment.
Question 07
Which interface in SDN allows the controller to communicate, interact, and manage forwarding elements?
a) Westbound
b) Flow ID
c) Southbound
d) Eastbound
Correct Answer: c) Southbound
Explanation: The southbound interface in SDN enables the controller to communicate with forwarding devices, such as switches and routers, and manage the flow of data between them.
Question 08
Which OpenFlow SDN controller has a multi-threaded, cross-platform, and modular emphasis?
a) FlowVisor
b) OpenDaylight (ODL) Project
c) Floodlight
d) Beacon
Correct Answer: d) Beacon
Explanation: Beacon is a Java-based, multi-threaded SDN controller designed to be modular and cross-platform, making it a popular choice for SDN research and development.
Question 09
Which port number is used as the destination of a server by Dynamic Host Configuration Protocol (DHCP)?
a) 23
b) 53
c) 67
d) 68
Correct Answer: c) 67
Explanation: DHCP uses port 67 as the destination port on the server side to receive requests from clients for IP address assignment.
Question 10
Which IPv6 address identifies each network interface?
a) Multicast
b) Broadcast
c) Anycast
d) Unicast
Correct Answer: c) Anycast
Explanation: In IPv6, anycast addresses are used to route data to the nearest network interface in a group of interfaces that share the same anycast address.
Question 11
Which network virtualization (NV) approach refers to a logical local area network (LAN) based on physical LANs?
a) Virtual private networks (VPN)
b) Virtual private LAN services (VPLS)
c) Virtual LANs (VLANs)
d) Wide area network (WAN)
Correct Answer: c) Virtual LANs (VLANs)
Explanation: VLANs are a type of network virtualization that allows multiple logical LANs to coexist on the same physical network infrastructure, improving network management and security.
Question 12
Which network virtualization benefit involves using virtual networks to create slices to reserve networking resources?
a) Debugging and intrusion detection
b) Resource optimization
c) Mobility
d) Testing/quality assurance
Correct Answer: a) Debugging and intrusion detection
Explanation: Virtual networks enable debugging and intrusion detection by creating network slices that reserve specific resources for monitoring and analysis, improving security and troubleshooting.
Question 13
Which layer 2 virtual networking device is responsible for controlling data frames to connected devices?
a) Router
b) Hub
c) Bridge
d) Switch
Correct Answer: d) Switch
Explanation: A switch is a layer 2 device responsible for controlling data frames and forwarding them to the correct destination within the local network based on MAC addresses.
Question 14
Which virtual networking protocol is used to support VPNs and does not provide encryption?
a) Layer 2 Tunneling Protocol (L2TP)
b) Point-to-Point Protocol (PPP)
c) Internet Key Exchange version 2 (IKEv2)
d) Secure Socket Layer (SSL)
Correct Answer: a) Layer 2 Tunneling Protocol (L2TP)
Explanation: L2TP is used to create virtual private networks (VPNs) but does not provide encryption on its own, relying on protocols like IPsec for encryption and confidentiality.
Question 15
What is the AAA mechanism responsible for granting user privileges to network resources?
a) Authorization
b) Authentication
c) Accounting
d) Availability
Correct Answer: a) Authorization
Explanation: Authorization is the process of granting users permission to access network resources based on their identity and credentials, as verified through authentication.
Question 16
Which authentication type validates a user based on what the person knows?
a) Retinal scans
b) Swipe card
c) Password
d) Unique tokens
Correct Answer: c) Password
Explanation: Passwords are a common authentication method based on what the user knows, such as a secret phrase or combination, to validate their identity.
Question 17
Which phase of an attack involves the attacker gathering information about the target?
a) Escalating privileges
b) Exploiting the system
c) Clearing tracks
d) Reconnaissance
Correct Answer: d) Reconnaissance
Explanation: The reconnaissance phase is when an attacker collects information about the target system or network before launching an attack.
Question 18
Which term refers to a weakness or gap in a security system that can be exploited by an attacker?
a) Threat
b) Vulnerability
c) Attack
d) Risk
Correct Answer: b) Vulnerability
Explanation: A vulnerability is a weakness or flaw in a system that can be exploited by an attacker to cause harm or gain unauthorized access.
Question 19
Which cyber kill chain term implies actual detonation of the attack?
a) Exploitation
b) Command and control
c) Installation
d) Delivery
Correct Answer: a) Exploitation
Explanation: Exploitation refers to the phase where the attacker uses a vulnerability to execute the attack, causing the intended damage or unauthorized access.
Question 20
Which defensive in-depth mechanism watches activities on systems and networks to determine attacks and repair the damages?
a) Preventive solutions
b) Detection and response
c) Survivability and recovery
d) Reconnaissance
Correct Answer: b) Detection and response
Explanation: Detection and response mechanisms monitor system activities to detect attacks in progress and initiate response actions to repair damage and mitigate threats.