IST 220 50-97

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following are advantages of virtualization?

Efficient use of resources Cost and energy savings Single backups, recovery and replication

802.11 is the IEEE standard that specifies how VLAN information appears in frames and how sitches interpret that information.

False

A collector is a computer that is monitored by a sylog-compatible application and issues event information.

False

A managed switch has minimal configuration and no IP address assigned to it.

False

A trunk is a combination of multiple network interfaces to act as one logic interface, NIC teaming is an example of this.

False

Redundancy is not intended to eliminate single points of failure.

False

TCP is a connectionless protocol and UDP is a connection oriented protocol.

False

With supernetting you can combine non-contiguous networks that all use the same CIDR block into one supernet

False

You can only have VLANs on an Unmanaged switch.

False

Which of the following could you use to determine how you could logically define segment in your network.

Geographic Locations Departmental Technology

What federal organization sets strict standards to protect the privacy of patient records?

HIPAA

Which of the following is not true about subnetting:

Increases usable host addresses per subnet

What is an example of a baseline measurement?

Network backbone Utilization Number of users logged in per day Number of protocols running on the network

SNMPv1 is the most secure version of the protocol

false

Which is the slash notation for the subnet mask 255.255.128.0

/17

What is the CIDR notation for a network with the subnet mask of 255.255.255.192?

/26

Your boss asks you to create a 7 subnets for a small remote office building using the network 192.168.20.0. What is the most efficient subnet mask should you use to make sure you have enough subnets to meet the requirements of your boss?

/27

What is the wild card mask for a /30?

0.0.0.3

Enter the wildcard mask for the given Subnets.

0.0.127.255

With ANDing when you are combining a bit value of 1 plus another bit value of 1 results in a -----.

1

Which of the following would be valid IP(s) on the network of 10.64.32.32./27

10.64.32.32 10.64.32.60

You have a subnetmask of 11111111 111111111 11111111 10000000 how many useable IP can you create with this?

126

You have a subnetmask of 11111111 111111111 11111111 10000000 how many subnet(s) can you create with this?

2

What is the most efficient subnet if you need 64 usable hosts on a subnet?

255.255.255.128

---------------- Provides additional ways of arranging network and host information in an IP address.

CIDR

What is the subnet mask of a network with a CIDR notation of /27?

255.255.255.224

What is the maximum number of valid subent(s) one will have from the network 192.168.1.35/26. Assume this is a class C.

4

A VLAN can include ports from more than one switch

True

A subnet mask is used so devices can determine which part of an IP address is network ID and which part is the host ID.

True

A trunk is a single physical connection between switches through which many logical VLANs can transmit and receive data.

True

Caching is the local-storage of frequently needed files that would otherwise be obtained externally.

True

Ethernet networks and the internet are the most common example of packet-switched networks

True

Number of hosts, subnets available after subnetting depend on host information bits borrowed.

True

One of the main reasons to use a system that monitors and manages network traffic is to assess the network's status on an ongoing basis

True

One way to consider availability is by measuring a system or network's uptime.

True

TCP is preferred over UDP for real-time services, such as telephone conversations and video conferences.

True

To allow different VLANs to exchange data you need to connect VLANs with a router or layer 3 switch

True

To users, a VM appears no different from a physical computer.

True

Traffic shaping involves manipulating characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network.

True


Set pelajaran terkait

Origin: How Life Began Worksheet

View Set

AP Psych Units 12 & 13 - Abnormal & Treatment Approaches

View Set

PS251 Personality Exam 1 (Shim 2016)

View Set

Week 3 Homework Multiple Choice Question and Answers (Psychology)

View Set

Health- Lesson 3 "Practicing Healthful Behaviors"

View Set

"Practice" exam #4 emailed by Dr.Dugi

View Set

Anatomy of the Female Pelvis CH 16

View Set

Chapter 2 & 3: Project Conception & Delivery

View Set