Segmentation

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following techniques does not break up a large broadcast domain into smaller broadcast domains?

Adding more layer 2 switches to a network

At what OSI layer do VLANs function?

Data link layer

Which VLAN on a switch cannot be renamed or deleted?

Default VLAN

What area of a network can provide less stringent security so a web server is more accessible from the open Internet?

Demilitarized zone

Which assignment technique requires a RADIUS server?

Dynamic VLAN assignment

On which networking device do you configure VLANs?

Managed switches

Which VLAN type would be the best fit for a company's web servers that need to be accessible from the Internet but should not be able to communicate with each other?

Management VLAN

Which VLAN on a switch manages untagged frames?

Native VLAN

What do well-chosen subnets accomplish?

Network documentation is easier to manage.

Which of the following is not a benefit of subnetting?

Routers more easily manage IP address spaces that overlap.

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

The fourth one

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

Suppose you have a small network with one router, one switch, and a few computers that are grouped into three VLANs. Which of the following statements is false?

Traffic between computers on the same VLAN must go through the router.

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Trunk

An attacker configures a VLAN frame with two tages instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?

VLAN hopping

Which IP addressing technique subnets a subnet to create subnets of various sizes?

Variable Length Subnet Mask

Which Cisco command lists configured VLANS on a switch?

show vlans

Subnetting operates at the ____________________ layer while VLANs function at the ____________________ layer.

network, data link

Suppose your company has leased one class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?

120.10.10.128/28 and 255.255.255.128

What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mas is 255.255.255.0

172.16.32.0/24

What is the network ID of the IP address 192.168.72.149/16?

192.168.0.0

Suppose you're calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.42.128, what is the targeted subnet's broadcast address?

192.168.42.127

How many bits of a class A IP address are used for host information?

24 bits

What is the binary number 1111 1111 in decimal?

255

Which formulas can be used to calculate the magic number? Choose two.

256 - the interesting octet 2^h

What is the formula for determining the number of possible hosts on a network?

2^h - 2 = Z

What is the minimum number of bits that should be borrowed to create 14 subnets?

4 bits

If a server has a subnet mask of 255.255.255.224, how many bits in its IP address identify the host?

5 bits

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?

8 bits

Which IEEE standard determines how VLANs work on a network?

802.1Q


संबंधित स्टडी सेट्स

Chapter 4: Trigonometric Functions

View Set

CIS221 Deploying & Managing Windows

View Set

The Comparative Method and Linguistic Reconstruction

View Set

Gatsby Quotes "Identify who is being described"

View Set

PrepU Questions Pediatric Exam #2

View Set