Data Communications - Chapter 8 Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

VLAN hopping

An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?

24 bits

How many bits of a Class A IP address are used for host information?

Managed switches

On which networking device do you configure VLANs?

Layer 3, Layer 2

Subnetting operates at Layer __________ while VLANs function at Layer _________.

120.10.10.0/25 255.255.255.128

Suppose your company has leased one Class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?

DMZ (Demilitarize Zone)

What area of a network can provide less stringent security so a web server is more accessible from the open Internet?

Network documentation is easier to manage

What do well-chosen subnets accomplish?

2h - 2 = Z

What is the formula for determining the number of possible hosts on a network?

Eight

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

172.16.32.108/24

What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?

show VLAN

Which Cisco command lists configured VLANs on a switch?

802.1Q

Which IEEE standard determines how VLANs work on a network?

VLSM (Variable Length Subnet Mask)

Which IP addressing technique subnets a subnet to create subnets of various sizes?

Management VLAN

Which VLAN is designed to support administrative access to networking devices?

Native VLAN

Which VLAN on a switch manages untagged frames?

256 - the interesting octet 2h

Which formulas can be used to calculate the magic number? Choose two.

The fourth one

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

To increase the number of networking devices on a network

Which of the following is not a good reason to segment a network?

trunk

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

DHCP relay agent

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?


Ensembles d'études connexes

3.11.1 Assignment: A Christmas Carol, Stave V

View Set

Chapter 2: The U.S. and Global Economies

View Set

IT Security: Defense against the digital dark arts. Week6: Creating a Company Culture for Security

View Set

ACE Personal Trainer - Practice Exam #2

View Set

NUR 209 Ch. 23 Asepsis (Fundamentals of Nursing)

View Set

Microbiology, Ch 26, Nester's 9th

View Set