Comprehensive Final Exam (Qns & Ans)
2025
Multiple Choice (MCQ)
Which of the following protocols provides the foundation for
secure key exchange mechanisms in VPN tunnels?
A. OSPF
B. IPsec
C. RIP
D. SNMP
ANS: B
Rationale: IPsec is specifically designed for secure
communication, and supports key exchange for VPNs.
©2025
,In a modern data center, which switching technique is best suited
for minimizing latency in high-frequency trading systems?
A. Store-and-forward
B. Cut-through
C. Fragment-free
D. Fixed switching
ANS: B
Rationale: Cut-through switching forwards packets as soon as the
destination address is read, reducing latency.
Which MPLS component is responsible for assigning a label to a
packet?
A. Label Switch Router (LSR)
B. Label Edge Router (LER)
C. Label Distribution Protocol (LDP)
D. Interior Gateway Protocol (IGP)
ANS: B
Rationale: LERs handle label imposition and removal at the edges
of an MPLS domain.
©2025
,Which IPv6 transition mechanism allows IPv6 packets to be
transmitted over an IPv4 network without configuring explicit
tunnels?
A. NAT64
B. ISATAP
C. 6to4
D. Teredo
ANS: C
Rationale: 6to4 automatically encapsulates IPv6 traffic within
IPv4 without explicit tunnels.
In SDN (Software Defined Networking), which plane is
responsible for network topology discovery and path
computation?
A. Data plane
B. Control plane
C. Management plane
D. Application plane
ANS: B
Rationale: The control plane handles network intelligence like
topology and routing decisions.
©2025
, Which wireless security protocol is vulnerable to attacks due to
predictable initialization vectors and should be avoided in
enterprise networks?
A. WPA2
B. WPA3
C. WEP
D. EAP-TLS
ANS: C
Rationale: WEP uses weak IVs, making it susceptible to attacks.
A BGP route reflector is primarily used to:
A. Eliminate the need for iBGP sessions between all routers
B. Improve OSPF route calculation
C. Aggregate IPv6 prefixes
D. Secure exterior BGP sessions
ANS: A
Rationale: Route reflectors reduce the full-mesh requirement of
iBGP.
Which type of Denial of Service (DoS) attack makes use of
vulnerabilities in TCP’s three-way handshake to exhaust server
resources?
©2025