Network+ Ch 10 - Network Segmentation And Virtualization

9 September 2022
4.7 (114 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
answer
OpenFlow
question
STP selects the root bridge based on which parameter?
answer
bridge ID (BID)
question
Which network type allows a vNIC to access a network directly using the host machine's NIC?
answer
bridged mode
question
Which two standards below represent newer versions of STP?
answer
802.1s 802.1w
question
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.
answer
True
question
What two items make up a Bridge ID?
answer
2 byte priority field MAC address
question
In order to allow communication between VLANs for exchange of data, what must be used?
answer
a router
question
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the interface?
answer
A trunk port
question
With VTP, the VLAN database is stored on a switch known as which option below?
answer
stack master
question
What two standards below have been developed to replace the Spanning Tree Protocol?
answer
SPB TRILL
question
Telnet and SSH are known as what type of management system?
answer
in-band
question
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
answer
802.1Q
question
Only Class B and Class C networks can be subnetted.
answer
False
question
The first iteration of STP was defined in what IEEE standard below?
answer
802.1d
question
In an IPv6 address, the first 64 bits of the address are known as what?
answer
routing prefix
question
A CIDR block of /26 is equivalent to what subnet mask below?
answer
255.255.255.192
question
Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network?
answer
host-only mode
question
A network with the subnet mask 255.255.255.0 would have what CIDR block?
answer
/24
question
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24?
answer
255.255.252.0
question
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge.
answer
True
question
What type of VLAN automatically receives all untagged frames?
answer
Native VLAN
question
Network segmentation decreases both performance and security on a network.
answer
False
question
A network with 6 bits remaining for the host portion will have how many usable hosts?
answer
62
question
Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?
answer
security association identifier SAID
question
The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?
answer
out-of-band management
question
How can VLAN hopping attacks be prevented on a network?
answer
Disable auto trunking and move native VLANs to unused VLANs.
question
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
answer
True
question
The Shortest Path Bridging protocol is defined in what IEEE standard?
answer
802.1aq
question
Which of the following is not a valid reason for using virtualization?
answer
increase performance
question
Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group? (Choose two.)
answer
HSRP VRRP