Chapter 8: Subnets And VLANs

11 September 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
How many bits of a Class A IP address are used for host information?
answer
24 bits
question
What is the formula for determining the number of possible hosts on a network?
answer
2^h - 2 =Z
question
Which of the following is not a good reason to segment a network?
answer
To increase the number of networking devices on a network
question
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
answer
Eight
question
What do well-chosen subnets accomplish?
answer
Network documentation is easier to manage
question
Which formulas can be used to calculate the magic number? (Choose two). (a.) 256 - the interesting octet (b.) 2^h - 2 (c.) 2^n (d.) 2^h
answer
a. 256 - the interesting octet d. 2^h
question
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
answer
The fourth one
question
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?
answer
DHCP relay agent
question
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
answer
Trunk
question
Which IEEE standard determines how VLANs work on a network?
answer
802.1Q
question
What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?
answer
172.16.32.108/24
question
Suppose your company has leased one Class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?
answer
120.10.10.0/25 255.255.255.128
question
Subnetting operates at Layer __________ while VLANs function at Layer _________.
answer
Layer 3, Layer 2
question
Which VLAN on a switch manages untagged frames?
answer
Native VLAN
question
An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?
answer
VLAN hopping
question
What area of a network can provide less stringent security so a web server is more accessible from the open Internet?
answer
DMZ (Demilitarized zone)
question
On which networking device do you configure VLANs?
answer
Managed switches
question
Which IP addressing technique subnets a subnet to create subnets of various sizes?
answer
VLSM (Variable Length Subnet Mask )
question
Which VLAN is designed to support administrative access to networking devices?
answer
Management VLAN
question
Which Cisco command lists configured VLANs on a switch?
answer
show VLAN