Networking Final Chapter 10
root bridge
Only one ____ exists on a network using STP.
VLAN hopping
An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to protected VLAN, which the attacker is not authorized to access. What kind of attack is this.
Hypervisor
What is the software that allows you to define VMs and manage resource allocation and sharing among them?
Virtual switch
What virtual, logically defined device operates at the Data Link Layer to pass frames between nodes?
The ISPs STP-related topology information shouldn't be mixed with a corporate network's STP-related topology information.
Why is a BPDU filter needed at the demarc point?
With which network connection type does the VM obtain IP addressing information from its host?NAT mode
With which network connection type does the VM obtain IP addressing information from its host?
Upon creation, each vNIC is automatically assigned a MAC address.
How does a vNIC get a MAC address?
24 bits
How many bits of a Class A IP address are used for host information?
Trunk port
Which port on a switch manages traffic for multiple VLANs?
VRRP
Which protocol assigns a virtual IP to a group of routers?
DHCP relay agent
While designing your network's VLAN topology, your team has decides to use a centrally managed DHCP server rathre than creating a separate DHCP server for each VLAN. What software will you need?
3;2
Subnetting operates at Layer ____ while VLANs function at Layer ___.
115.100.10.0/23; 255.255.254.0
Suppose you have leased one Class C licenses, 115.100.10.0 and 115.100.11.0. You want to use all these Class C IP addresses in one supernet. What is the CIDR notation for this supernet? What is its subnet mask?
120.10.10.0/25; 255.255.255.128
Suppose your company has leased one Class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. Whta is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?
in-band management
Telnet and SSH are called ____ systems because they use the existing network and its protocols to interface with the switch.
to reduce the number of routing table enteries by combining several entries
Which of the following is not a good reason to subnet a network?
Efficient use of resources Cost and energy savings Fault and threat isolation simple backups, recovery, and replication
What are four advantages to using virtualization on a network?
2h - 2 = Z
What is the formula for determining the number of possible hosts on a network?
172.16.32.0/24
What is the network ID with CIDR notation for the IP address 172.16.32.108 with the subnet mask 255.255.255.0?
Native VLAN
Which VLAN on a switch manages untagged frames?