Network+ Chapter 10
In _________, a vNIC accesses a physical network using the host machine's NIC.
Bridged Mode
NIC and vNIC use what layer?
Data Link Layer
How can VLAN hopping attacks be prevented on a network?
Disable auto trunking and move native VLANs to unused VLANs.
The first iteration of STP was defined in what IEEE standard below?
802.1d
Which two standards below represent newer versions of STP?
802.1w 802.1s
A network with the subnet mask 255.255.255.0 would have what CIDR block?
/24
How many bits in IPv6?
128
What two items make up a Bridge ID?
2 byte priority field MAC address
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24?
255.255.252.0
A network with 6 bits remaining for the host portion will have how many usable hosts?
62
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
802.1Q
The Shortest Path Bridging protocol is defined in what IEEE standard?
802.1aq
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the interface?
A trunk port
Select all the reasons a network administrator might separate traffic.
Enhance Security Simplify Trouble Shooting Improve Performance
Network segmentation decreases both performance and security on a network.
False
Only Class B and Class C networks can be subnetted.
False
Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group? (Choose two.)
HSRP VRRP
What type of VLAN automatically receives all untagged frames?
Native VLAN
Another name for network ID:
Network Prefix
Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?
SAID security association identifier
What two standards below have been developed to replace the Spanning Tree Protocol?
SPB TRILL
Which mask moves the network prefix to the left?
Supernet
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.
True
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge
True
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
True
In order to allow communication between VLANs for exchange of data, what must be used?
a router
STP selects the root bridge based on which parameter?
bridge ID (BID)
Which network type allows a vNIC to access a network directly using the host machine's NIC?
bridged mode
Another name for supernetting is:
classless routing
Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network?
host-only mode
Telnet and SSH are known as what type of management system?
in-band
Which of the following is not a valid reason for using virtualization?
increase performance
The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?
out-of-band management
In an IPv6 address, the first 64 bits of the address are known as what?
routing prefix
"With VTP, the VLAN database is stored on a switch known as which option below?"
stack master