Network+ Chapter 10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In _________, a vNIC accesses a physical network using the host machine's NIC.

Bridged Mode

NIC and vNIC use what layer?

Data Link Layer

How can VLAN hopping attacks be prevented on a network?

Disable auto trunking and move native VLANs to unused VLANs.

The first iteration of STP was defined in what IEEE standard below?

802.1d

Which two standards below represent newer versions of STP?

802.1w 802.1s

A network with the subnet mask 255.255.255.0 would have what CIDR block?

/24

How many bits in IPv6?

128

What two items make up a Bridge ID?

2 byte priority field MAC address

Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24?

255.255.252.0

A network with 6 bits remaining for the host portion will have how many usable hosts?

62

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

802.1Q

The Shortest Path Bridging protocol is defined in what IEEE standard?

802.1aq

A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the interface?

A trunk port

Select all the reasons a network administrator might separate traffic.

Enhance Security Simplify Trouble Shooting Improve Performance

Network segmentation decreases both performance and security on a network.

False

Only Class B and Class C networks can be subnetted.

False

Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group? (Choose two.)

HSRP VRRP

What type of VLAN automatically receives all untagged frames?

Native VLAN

Another name for network ID:

Network Prefix

Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?

SAID security association identifier

What two standards below have been developed to replace the Spanning Tree Protocol?

SPB TRILL

Which mask moves the network prefix to the left?

Supernet

Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.

True

The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge

True

The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.

True

In order to allow communication between VLANs for exchange of data, what must be used?

a router

STP selects the root bridge based on which parameter?

bridge ID (BID)

Which network type allows a vNIC to access a network directly using the host machine's NIC?

bridged mode

Another name for supernetting is:

classless routing

Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network?

host-only mode

Telnet and SSH are known as what type of management system?

in-band

Which of the following is not a valid reason for using virtualization?

increase performance

The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?

out-of-band management

In an IPv6 address, the first 64 bits of the address are known as what?

routing prefix

"With VTP, the VLAN database is stored on a switch known as which option below?"

stack master


Ensembles d'études connexes

Developmental Psychology: Chapter 12

View Set

Food Handler Training - Riverside, CA Final Exam

View Set

Exam #1 Quiz Questions and Answers

View Set

EMT - Chapter 37 - Transport Operations

View Set

urinary questions and short answer

View Set