Network+ Guide to Networks Seventh Edition Chapter 10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are four advantages to using virtualization on a network?

1. Efficient use of resources 2. Cost and energy savings 3. Fault and threat isolation 4. Simple backups, recovery, and replication

Suppose you have leased two Class C licenses, 115.100.10.0 and 115.100.11.0. You want to use all these Class C IP addresses in one supernet. What is the CIDR notation for this supernet? What is its supernet mask?

115.100.10.0/23 255.255.254.0

Suppose your company has leased one Class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?

120.10.10.0/25 255.255.255.128

What is network ID with CIDR notation for the IP address 172.16.32.108 with the subnet mask 255.255.255.0?

172.16.32.108/24

How many bits of a Class A IP address are used for host information?

24 bits

What is the formula for determining the number of possible hosts on a network?

2^ h - 2 = Z

Why is a BPDU filter needed at the demarc point?

A BPDU filter can be used to disable STP on specific ports. For example, you might use a BPDU filter on the demarc, where ISP's service connects with a business's network, to prevent the ISP's WAN topology from mixing with the corporate network's topology for the purpose of plotting STP paths.

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need?

DHCP relay agent

With which network connection type does the VM obtain IP addressing information from it's host?

NAT mode

Which VLAN on a switch manages untagged frames?

Native VLANs

Subnetting operates at Layer ____ while VLANs function at Layer ____

Subnetting = Layer 3 VLANs = Layer 2

Which of the following is NOT a good reason to subnet a network?

To reduce the number of routing table entries by combining several entries.

Which port on a switch manages traffic for multiple VLANs?

Trunk Port

How does a vNIC get a MAC address?

Upon creation, each vNIC is automatically assigned a MAC address

An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?

VLAN hopping attack

Which protocol assigns a virtual IP to a group of routers?

VRRP

What is the software that allows you to define VM's and manage resource allocation and sharing among them?

Virtual Machine Manager (more commonly known as hypervisor)

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

Virtual switch

Telnet and SSH are called _________ systems because they use the existing network and its protocols to interface with the switch.

in-band management

Only one _________ exists on a network using STP.

root bridge


Ensembles d'études connexes

Lecture 5: More 2x2 Factorial Design

View Set

CA51021 Module 3: The Federal Reserve System, Monetary Policy, and Interest Rates

View Set

Marketing Chapter 11 (Pricing Strategies)

View Set

Ms. McDaniel's 4th period English study guide

View Set

Unit 2: Types and Characteristics of Fixed-Income (debt) Securities

View Set

Ch. 19 PrepU: Hematologic Function (Pellico, 1st Ed)

View Set