D415 - SDN
1. Which OSI model layer is responsible for the segment protocol data unit?
Network
Transport
Application
Data link: Transport
2. Which protocol in the software-defined networking (SDN) framework
is responsible for defining the communication between the controller
and a network device?
OpenFlow
Telnet
Point-to-point
Address resolution: OpenFlow
3. Which network automation tool is open source?
BlueCat
gateway Chef
Ansible
Puppet Enterprise: Ansible
4. What is a benefit of using network automation?
Backing up and restoring data
Using infrastructure as code to maintain a reliable state
Dynamic allocation of IP addresses
Boosting storage: Using infrastructure as code to maintain a reliable state
5. Which service introduces flexibility, dynamism, and automation into
the management of network objects?
Open source for network functions virtualization (NFV)
OpenStack
Network functions virtualization (NFV)
Software-defined networking (SDN): Software-defined networking (SDN)
6. Which OpenStack unit provides authentication?
Cinder
Nova
Keystone
Neutron: Keystone
1/
22
,D415 - SDN
7. Which interface in SDN allows the controller to communicate, interact,
and manage forwarding elements?
Westbound
Flow ID
Southbound
Eastbound: Southbound
8. Which OpenFlow SDN controller has a multi-threaded, cross-platform,
and modular emphasis?
FlowVisor
OpenDaylight (ODL) Project
Floodlight
Beacon: Beacon
9. Which port number is used as the destination of a server by Dynamic
Host Configuration Protocol?
23
53
67
68: 67
10. Which IPv6 address identifies each network interface?
Multicast
Broadcast
Anycast
Unicast: Anycast
11. Which network virtualization (NV) approach refers to a logical local
area network (LAN) based on physical LANs?
Virtual private networks (VPN)
Virtual private LAN services (VPLS)
Virtual LANs (VLANs)
Wide area network (WAN): Virtual LANs (VLANs)
12. Which network virtualization benefit involves using virtual networks
to create slices to reserve networking resources?
Debugging and intrusion detection
Resource optimization
2/
22
,D415 - SDN
Mobility
Testing/quality assurance: Debugging and intrusion detection
13. Which layer 2 virtual networking device is responsible for controlling
data frames to connected devices?
Router
Hub
Bridge
Switch: Switch
14. Which virtual networking protocol is used to support VPNs and does
not provide encryption?
Layer 2 Tunneling Protocol
(L2TP) Point-to-Point Protocol
(PPP)
Internet Key Exchange version 2 (IKEv2)
Secure Socket Layer (SSL): Layer 2 Tunneling Protocol (L2TP)
15. What is the AAA mechanism responsible for granting user privileges
to network resources?
Authorization
Authentication
Accounting
Availability: Authorization
16. Which authentication type validates a user based on what the
person knows?
Retinal scans
Swipe card
Password
Unique tokens: Password
17. Which phase of an attack involves the attacker gathering information
about the target?
Escalating privileges
Exploiting the system
Clearing tracks
Reconnaissance: Reconnaissance
18. Which term refers to a weakness or gap in a security system that can
be exploited by an attacker?
3/
22
1. Which OSI model layer is responsible for the segment protocol data unit?
Network
Transport
Application
Data link: Transport
2. Which protocol in the software-defined networking (SDN) framework
is responsible for defining the communication between the controller
and a network device?
OpenFlow
Telnet
Point-to-point
Address resolution: OpenFlow
3. Which network automation tool is open source?
BlueCat
gateway Chef
Ansible
Puppet Enterprise: Ansible
4. What is a benefit of using network automation?
Backing up and restoring data
Using infrastructure as code to maintain a reliable state
Dynamic allocation of IP addresses
Boosting storage: Using infrastructure as code to maintain a reliable state
5. Which service introduces flexibility, dynamism, and automation into
the management of network objects?
Open source for network functions virtualization (NFV)
OpenStack
Network functions virtualization (NFV)
Software-defined networking (SDN): Software-defined networking (SDN)
6. Which OpenStack unit provides authentication?
Cinder
Nova
Keystone
Neutron: Keystone
1/
22
,D415 - SDN
7. Which interface in SDN allows the controller to communicate, interact,
and manage forwarding elements?
Westbound
Flow ID
Southbound
Eastbound: Southbound
8. Which OpenFlow SDN controller has a multi-threaded, cross-platform,
and modular emphasis?
FlowVisor
OpenDaylight (ODL) Project
Floodlight
Beacon: Beacon
9. Which port number is used as the destination of a server by Dynamic
Host Configuration Protocol?
23
53
67
68: 67
10. Which IPv6 address identifies each network interface?
Multicast
Broadcast
Anycast
Unicast: Anycast
11. Which network virtualization (NV) approach refers to a logical local
area network (LAN) based on physical LANs?
Virtual private networks (VPN)
Virtual private LAN services (VPLS)
Virtual LANs (VLANs)
Wide area network (WAN): Virtual LANs (VLANs)
12. Which network virtualization benefit involves using virtual networks
to create slices to reserve networking resources?
Debugging and intrusion detection
Resource optimization
2/
22
,D415 - SDN
Mobility
Testing/quality assurance: Debugging and intrusion detection
13. Which layer 2 virtual networking device is responsible for controlling
data frames to connected devices?
Router
Hub
Bridge
Switch: Switch
14. Which virtual networking protocol is used to support VPNs and does
not provide encryption?
Layer 2 Tunneling Protocol
(L2TP) Point-to-Point Protocol
(PPP)
Internet Key Exchange version 2 (IKEv2)
Secure Socket Layer (SSL): Layer 2 Tunneling Protocol (L2TP)
15. What is the AAA mechanism responsible for granting user privileges
to network resources?
Authorization
Authentication
Accounting
Availability: Authorization
16. Which authentication type validates a user based on what the
person knows?
Retinal scans
Swipe card
Password
Unique tokens: Password
17. Which phase of an attack involves the attacker gathering information
about the target?
Escalating privileges
Exploiting the system
Clearing tracks
Reconnaissance: Reconnaissance
18. Which term refers to a weakness or gap in a security system that can
be exploited by an attacker?
3/
22