Network Plus Chapter 10

9 September 2022
4.7 (114 reviews)
40 test answers

Unlock all answers in this set

Unlock answers (36)
question
False
answer
Network segmentation decreases both performance and security on a network.
question
False
answer
Only Class B and Class C networks can be subnetted.‚Äč
question
True
answer
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
question
True
answer
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.‚Äč
question
True
answer
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge.‚Äč
question
/24
answer
A network with the subnet mask 255.255.255.0 would have what CIDR block?‚Äč
question
62
answer
A network with 6 bits remaining for the host portion will have how many usable hosts?‚Äč
question
A trunk port
answer
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring the interface as what option below?‚Äč
question
Native VLAN
answer
What type of VLAN automatically receives all untagged frames?‚Äč
question
Disable auto trunking and move native VLANs to unused VLANs.
answer
How can VLAN hopping attacks be prevented on a network?‚Äč
question
‚Äč802.1d
answer
The first iteration of STP was defined in what IEEE standard below?‚Äč
question
‚Äčbridge ID (BID)
answer
STP selects the root bridge based on what option below?‚Äč
question
‚Äčin-band
answer
Telnet and SSH are known as what type of management system?‚Äč
question
stack master
answer
With VTP, the VLAN database is stored on a switch known as which option below?‚Äč
question
a router
answer
In order to allow communication between VLANs for exchange of data, what must be used?‚Äč
question
‚Äč802.1Q
answer
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?‚Äč
question
increase performance
answer
Which of the following is not a valid reason for using virtualization?‚Äč
question
‚Äč255.255.252.0
answer
‚ÄčWhich supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24?
question
‚Äčrouting prefix
answer
In an IPv6 address, the first 64 bits of the address are known as what?‚Äč
question
‚Äčbridged mode
answer
‚ÄčWhich network type allows a vNIC to access a network directly using the host machine's NIC?
question
‚ÄčOpenFlow
answer
‚ÄčWhat protocol is used to provide a common language between virtualized service applications and a network's physical devices?
question
‚Äč802.1aq
answer
The Shortest Path Bridging protocol is defined in what IEEE standard?‚Äč
question
‚Äčout-of-band management
answer
The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?
question
‚Äč255.255.255.192
answer
‚ÄčA CIDR block of /26 is equivalent to what subnet mask below?
question
host-only mode‚Äč
answer
‚ÄčWhich virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network?
question
NAT mode
answer
In ______________, a vNIC relies on the host machine to act as a NAT device.‚Äč
question
DHCP relay agent
answer
A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a _________________.‚Äč
question
default VLAN
answer
A switch is typically preconfigured with one _______________ that includes all its ports.
question
VLAN hopping attack
answer
A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.‚Äč
question
Spanning Tree Protocol (STP)
answer
To eliminate the possibility of traffic loops on switches and bridges, the ________________ is used.
question
‚ÄčThe interface on a switch used for an end node. Devices connected to access ports are unaware of VLAN information.
answer
access port
question
‚ÄčA software configuration that can be used to disable STP on specific ports, such as the port leading to the network's demarc. It prevents access to network links that should not be considered when plotting STP paths in a network.
answer
BPDU filter‚Äč
question
‚ÄčIn CIDR notation, the forward slash plus the number of bits used for the network ID. For example, the CIDR block for 199.34.89.0/22 is /22.
answer
CIDR block
question
Cisco's proprietary standard, similar to VRRP, that assigns a virtual IP address to a group of routers. At first, messages routed to the virtual IP address are handled by the active router. If the active router fails, standby routers stand in line to take over responsibility for the virtual IP address.
answer
HSRP (Hot Standby Routing Protocol)‚Äč0
question
‚ÄčA VLAN on a switch that will automatically receive all untagged frames. Options for native VLANs vary according to the switch manufacturer and model.
answer
‚Äčnative VLAN
question
‚ÄčThe virtualization of network services in which a network controller manages these services instead of the services being directly managed by the hardware devices involved.
answer
software defined networking (SDN)
question
‚ÄčThe interface on a switch capable of managing traffic from multiple VLANs. A trunk is a link configured between two switches' trunk ports.
answer
‚Äčtrunk port
question
‚ÄčA server that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.
answer
virtual server‚Äč
question
‚ÄčAn attack in which the attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.
answer
‚ÄčVLAN hopping attack
question
‚ÄčA standard that assigns a virtual IP address to a group of routers. At first, messages routed to the virtual IP address are handled by the master router. If the master router fails, backup routers stand in line to take over responsibility for the virtual IP address.
answer
VRRP (Virtual Router Redundancy Protocol)