CH 7 + 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which subnet mask is used for a class B network?

11111111 11111111 00000000 00000000

How many subnets can the subnet mask 255.255.255.240 create?

16

Which layers of the OSI model play a part in network segmentation? Choose from the list below. 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer 2. Data-Link Layer 1. Physical Layer

3, 2, 1

One way to consider availability is by measuring a system's or network's uptime, which is the duration or percentage of time that it functions normally between failures. What is the system downtime per year if the uptime is 99.99%?

52 minutes, 35 seconds

To which standard does Link Aggregation Control Protocol (LACP) now belong?

802.1ax

A key factor in maintaining the availability of network resources is fault tolerance. What is fault tolerance? Choose all that apply.

A&B

How do VLAN clients receive the appropriate IP address assignments from the subnet's range of addresses portioned to each VLAN?

A&B

Howard was speaking with his IT manager when the subject arose regarding VLANs. The company was about to add at least two VLANs due to expansion. Howard, who is new to VLANs, asked his IT manager which type of VLANs pose the greatest security risk. Which VLANs did the IT manager pick? Choose all that apply.

A&B

What is the first layer of defense to prevent a MAC flooding attack? Choose all that apply.

A&B

What is the purpose of a content delivery network (CDN)? Choose all that apply.

A&B

What type of data storage systems do small networks rely on? Choose all that apply.

A&B

Clustering is the process of grouping similar resources together. What resources can be clustered? Choose all that apply.

All the above

Emie is the owner of an e-commerce company that is experiencing rapid growth. Her company has recently launched a website that is managed by racks of servers. These servers are responsible for a variety of tasks, including taking orders, processing payments, issuing refunds, and updating the website's content on a daily basis. When a client types in the website URL, they are directed to the website. From the client's perspective, it appears that the website is powered by a single server. However, in reality, there are multiple servers working together to ensure that the website functions smoothly. How does this process happen? Choose all that apply.

All the above

How is subnetting in IPv6 simpler than subnetting in IPv4, and how does it differ from IPv4? Choose all that apply.

All the above

In a storage area network (SAN), storage drives are located in one or more separate devices, possibly even in a different rack or a different room. The network connections between servers and SAN devices must support extremely high data throughput. To maximize throughput, SAN storage relies on specific networking technologies. What are these technologies? Choose all that apply.

All the above

What are some advantages of virtualization? Choose all that apply.

All the above

What are some ways to mitigate VLAN hopping and enhance network segmentation? Choose all that apply.

All the above

What status listed below indicates that a switch port is down? Choose all that apply.

All the above

When calculating subnets either manually or by using subnet tables, the following types of information will be needed. Some of this information is initially known, while some of it must be determined: If the number of subnets and the number of host addresses per subnet is known, what else must be determined? Choose all that apply.

All the above

A key factor in maintaining the availability of network resources is fault tolerance. What is fault tolerance? Choose all that apply.

B&C

Segmentation is crucial for cloud network security, and it can be achieved through subnet configuration. What are the different types of subnets? Choose all that apply.

B&C

The Internet is referred to by more than one zone name. What are those names? Choose all that apply.

B&C

Variable Length Subnet Mask (VLSM) is an efficient way to define IP address spaces on a network. However, in reality, it is not a good idea to configure subnets so tightly. Why is it not recommended to configure subnets so tightly? Choose all that apply.

B&C

What is the most popular protocol for exchanging VLAN information over trunks?

Cisco's VTP (VLAN Trunk Protocol)

Daniel's company just switched over to AWS services EC2 cloud instance. He needs to work remotely, on a host server in their private subnet, but there is a NAT gateway set up within the company's EC2 cloud. How can Daniel work remotely while having the NAT gateway in place?

Create a bastion host/jump box, in the public subnet.

SANs use the same IP technologies as standard IT networks.

False

Virtualization is an actual, or logical, version of something rather than the physical version.

False

In which service mode are hardware resources provided virtually, including network infrastructure devices such as routing, switching, and DNS services?

IaaS (Infrastructure as a Service)

This logical appliance provides filtered and protected access from resources in the private subnet to services on the Internet. However, Internet-based resources are not able to initiate contact with the private subnet or access the protected resources directly. What is this logical appliance called?

NAT gateway

During software development, developers often need to access multiple platforms, which include the operating system, the runtime libraries or modules provided by the OS to applications, as well as the hardware on which the OS runs. Which service model would be the better option?

PaaS (Platform as a Service)

A benefit of cloud hosted resources is that a company can put those resources anywhere in the world in regions that are closest to the point of use.

True

Edge computing runs compute resources in physical locations closer to the user, and often, this data and compute caching happen on edge devices rather than on traditional servers.

True

Minor faults, such as a malfunctioning network interface card (NIC) on a router, can result in network outages.

True

Orchestration is the automation of tasks to work together in a complex and lengthy workflow.

True

What protocol does virtual extensible LAN (VXLAN) use to function at OSI layer 4?

UDP (User Datagram Protocol)

What needs to be configured on a network to allow routers, firewalls, or layer 3 switches to forward UDP traffic across broadcast domains and enable centralization of key network services?

UDP forwarding

Hackers sometimes take advantage of the way VLANs are tagged to implement an attack. The attacker generates transmissions that, to the switch, appear to belong to a protected VLAN, then cross VLANs to access sensitive data or inject harmful software. What is this attack called?

VLAN hopping

In this configuration error, a group of nodes was added to a VLAN, but the rest have been cut off from the network. What type of configuration error is this?

VLAN isolation

Cloud architecture provides different service model functions that can be customized to fit a client's needs, such as monitoring, storage, applications, and virtual desktops. What is that as a Service function called?

XaaS (Anything as a Service)

What does the term HA (high availability) refer to?

a system that functions reliably nearly all the time

What is the word used to describe the ability to quickly adapt to market demands according to increased or decreased feature use within a system?

agility

Software-defined networking (SDN) enables automatic network configuration based on changing conditions and application requirements. What is this capability called?

application aware networking

While a developer writes changes to the code, the changes can be uploaded into the branch that the developer is working on. What is the process of uploading these changes called?

commit

What cloud services can be shared between multiple organizations, but are not available to the public?

community cloud

Which type of VLAN carries user-generated traffic, such as email, web browsing, or database updates?

data

Which type of VLAN is typically preconfigured on a switch and initially includes all the switch's ports?

default

What is the term used to describe when something does not work as promised or as planned?

failure

Jessie was a system administrator at a large company's Network Operations Center (NOC). Occasionally, employees company-wide would complain about the slow Internet service or that it was temporarily unavailable. As the complaints were widespread and the issue wasn't localized, Jessie investigated the problem at the NOC level. They determined that a router was causing the issue. From a fault tolerance perspective, what would this issue be considered?

fault

What do the last four blocks (64 bits) identify in an IPv6 address?

host interface

In the world of networking, what does the term "availability" mean?

how consistently and reliably a resource can be accessed by authorized personnel

What is the software that creates and manages a virtual machine (VM) and allocates the use of hardware resources for the host and any of its guest VMs?

hypervisor

A VLAN configuration error can occur for various reasons, such as connecting a device to the wrong switch port or misconfiguring the client authentication process, resulting in the allocation of a VLAN to a device before the authentication process is complete. What type of configuration error is this?

incorrect VLAN assignment

A computer is connected to a switch port and then to a server on another switch port, but the computer is not connecting properly to the server. What could the error be?

incorrect port mode

When traffic moves between two VLANs, it must pass through a router. What is the term for this process?

inter-VLAN routing

On which OSI layer does VLAN traffic traverse?

layer 2

Hazel wants a switch to enhance her firewall's capabilities. The switch should provide advanced filtering and security functions. What type of switch matches those specifications?

layer 4 switch

In what type of situation is the round-robin rule algorithm used?

load balancing

Which device can be configured via a command-line interface or web-based management GUI (graphical user interface), and can sometimes be configured in groups?

managed switch

Jason's company has purchased a new building and will be relocating part of the marketing and engineering teams to it. Jason wants to ensure that the departments will have access to the same resources as those in the original building. How should Jason set up the office network in the new building?

managed switches with VLANs

What is the term for a resource requiring detailed zoning and object-level security?

micro-segmentation

If one storage device within a storage area network (SAN) suffers a fault, data is automatically retrieved from elsewhere in the SAN. If one connection in a SAN suffers a failure, another connection is in place to handle network traffic. What is this technique called?

multipathing

Sandy has an internal /24 network. Their address starts at 192.198.120.0 and ends at 192.198.120.255. In order, what do the numbers 0 and 255 stand for?

network address (Network ID) and broadcast address

Enlarged headers are necessary to support VXLANs, as they require a much larger message on the network than the standard 1500-byte message defined by the MTU (maximum transmission unit). How do networks manage these larger messages?

networks supporting VXLANs must be configured with a larger MTU

A large e-commerce company had a server go down. It was an important server that processes orders. The company has load balancing in place and clustered its servers together. What happened when that server when down?

no major impact

Operational Technology (OT) specialists often focus on different priorities than Information Technology (IT) specialists, as they involve varying levels of certain types of risks. How are OT risks defined?

physical systems' vulnerabilities in response to interruptions caused by a breach

George is planning a new network and is going to put all his servers in one rack and keep the broadcast traffic to a minimum. What is the best way for George to accomplish this goal?

put servers into one network segment

What is the command for disabling a port on a Cisco switch?

shutdown

Software-defined networking (SDN) is a centralized approach to networking that removes most of the decision-making power from network devices. At what level is this responsibility handled?

software level

What type of pipeline specifically supports the continuous development of an application through the many iterations of improvements?

software pipeline

When traffic from three VLANs reach a router, the router sees three logical LANs connected to a single router port. What is each of these logical interfaces on one physical interface called?

subinterface

Which type of VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency?

voice


संबंधित स्टडी सेट्स

INDUSTRIAL-ORGANIZATIONAL PSYCHOLOGY

View Set

Cisco 161-160 V2 final exam Set 1

View Set

population health exam 1, in depth

View Set

Anatomy Chapter 10 Muscle and Tissue Organization

View Set

Lesson 4 - Creating the Work Breakdown Structure

View Set

NCLEX Cardiovascular, Hematologic and Lymphatic

View Set

NURS 303 - Pharmacology 1, 3, 4, 5, 6

View Set

Flame test lab and Part 1 notes chem

View Set