NETWORKING CERTIFICATION SCRIPT
2026 QUESTIONS WITH SOLUTIONS
GRADED A+
◍ physical network.
Answer: Visible and physically presented to connect physical computers.
◍ OpenStack Use Case.
Answer: OpenStack is often used by cloud service providers, enterprises,
and organizations to build and manage their cloud infrastructure.
◍ Network Level MTD.
Answer: Requires a change in the network parameters, such as network con
fi guration, network connection obfuscation and Routing Randomization.
◍ Network Functions Virtualization (NFV).
Answer: Moved network functions from stand-alone appliances to software
running on any server, reducing the time-to-market for products.
◍ SDLC Implementation Phase.
Answer: Inspection and acceptanceSystem integrationSecurity
certificationSecurity accreditation
◍ Perimeter network.
Answer: A network added between a protected network and an external
network in order to provide an additional layer of security. A perimeter
network is sometimes called a DMZ.
◍ Replication.
Answer: To create multiple instances of the resource
,◍ UDP port number 68.
Answer: Destination port of a DHCP client
◍ Open vSwitch (OVS).
Answer: A multi-layer software switch licensed under the open source
Apache 2 license.
◍ East / Westbound interfaces.
Answer: Are meant for communication between groups or federations of
controllers.
◍ Penetration testing.
Answer: Attempts to identify insecure business processes, insecure system
settings, or other weaknesses.
◍ Northbound Interface (NBI).
Answer: Enables applications in the application layer to program the
controllers by making abstract data models and other functionalities
available to them.
◍ NFV Components.
Answer: Virtual Network Functions (VNFs)Network Functions
Virtualization Infrastructure (NFVI)NFV Management and Orchestration
(NFV-MANO)
◍ The target of attacks.
Answer: The objective of attackers to try to compromise.
◍ Southbound API.
Answer: Points towards the network devices and infrastructure. It's the
interface used by the controller to communicate and manage the underlying
network devices.
◍ NIST 800-53.
Answer: NIST standard for information security controls.
◍ Dynamic Host Configuration Protocol (DHCP).
Answer: A network management protocol used to dynamically assign an
, Internet Protocol (IP) address to any device, or node, on a network so they
can communicate using IP.
◍ SDLC Operations and Maintenance Phase.
Answer: Configuration management and controlContinuous monitoring
◍ Security mechanism - Controller-Switch Trust.
Answer: A trust establishment mechanism between the controller and switch
is important to deal with cases of fake flows being inserted by malicious
switches.
◍ Clustering.
Answer: Adds a layer of defense against the controller being a single point
of failure by having one or more controllers in an active / standby scenario.
◍ SDN Controllers.
Answer: The brains of the SDN operation that lies between the data plane
devices on one end, and high level applications on the other. Takes the
responsibility of establishing every flow in the network by installing flow
entries on switch devices.
◍ Isolation.
Answer: To separate the uses which clients make of the underlying
resources
◍ MTD - Shuffling.
Answer: Involves rearrangement of resources at various layers. Some
examples include migration of VM from one physical server to another,
application migration, instruction set randomization (ISR), etc.
◍ Heat.
Answer: OpenStack module that helps expedite orchestration of applications
across multiple compute instances by using templates.
◍ VNFI (VNF Infrastructure).
Answer: Physical resources (compute, storage, etc.) hosting VNFs.
◍ SDLC Disposition Phase.