Network + Ch 10 review
A software configuration that can be used to disable STP on specific ports.
BPDU
In CIDR notation, the forward slash plus the number of bits used for the network ID.
CIDR block
How can VLAN hopping attacks be prevented on a network?
Disable auto trucking and move native VLANs to unused VLANs
What two standards below have been developed to replace the Spanning Tree Protocol?
TRILL, SPB
In ________, a NIC relies on the host machine to act as a NAT device.
NAT mode
With VTP, the VLAN database is stored on a switch known as which option below?
stack master
The first iteration of STP was defined in what IEEE standard below?
802.1d
Which two standards below represent newer versions of STP?
802.1w, 802.1s
A network with the subnet mask 255.255.255.0 would have what CIDR block?
/24
What two items make up a Bridge ID?
2 byte priority field, MAC address
What supernet mask, below would allow an organization to cover the following networks with one routing entry.
255.255.255.0
A CIDR block of /26 is equivalent to what subnet mask below?
255.255.255.192
A network with 6 bits remaining for the host portion will have how many usable hosts?
62
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
802.1Q
The Shortest Path Bridging protocol is defined in what IEEE standard?
802.1aq
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the router?
A trunk port
A centrally manged DHCP server can provide DHCP to multiple VLANs by configuring a _______.
DHCP relay agent
Network segmentation decreases both performance and security on a network?
False
Only Class B and Class C networks can be subnetted
False
Cisco's proprietary standard, similar to VRRP, that assigns a virtual IP address to a group of routers.
HSRP (Hot Standby Routing Protocol)
What type of VLAN automatically receives all untagged frames?
Native VLAN
What protocol is used to provide a common language between virtualization service applications and a network's physical devices?
OpenFlow
To eliminate the possibility of traffic loops on switches and bridges, the ___________ is used.
STP
Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?
Security Association Identifier, SAID
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a LAyer 2 solution for segmenting a network.
True
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge.
True
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
True
A ____________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLANS.
VLAN hopping attack
An attack in which the attacker generates transmission that appear, to the switch, to belong to a protected VLAN.
VLAN hopping attack
A standard that assigns a virtual IP address to a group of routers.
VRRP
Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group?
VRRP, HSRP
A server that exists as a virtual machine, created and managed by visualization software on a host, or physical, computer.
Virtual server
In order to allow communication between VLANs for exchange of data, what must be used?
a router
The interface on a switch used for an end mode. Device connected to access ports are unaware of VLAN information.
access port
STP selects the root bridge based on which parameter?
bridge ID (BID)
Which network type allows a vNIC to access a network directly using the host machine's NIC?
bridged mode
A switch is typically reconfigured with one ___________ that includes all its ports.
default VLAN
Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network?
host-only mode
Telnet and SSH are known as what type of management below?
in-band
Which of the following is not a valid reason for using virtualization?
increase performance
An tagged VLAN one a switch that will automatically receive all untagged frames.
native VLAN
The management option that can provide on-site infrastructure access when the network is down or complete remote access in case of connectivity failures on the network, such as via a cellular signal, is known as?
out-of-band management
In a IPv6 address, the first 64 bits of the address are known as what?
routing prefix
The visualization of network services in which a network controller manages these services instead of the services being directly managed by the hardware devices involved.
software defined networking (SDN)
The interface on a switch capable of managing traffic from multiple VLANS.
trunk port