ITN 101 Module 08 - Segmentation

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?

255.0.0.0

Which of the following carries user-generated traffic, such as email, web browsing, or database updates?

Data VLAN

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization?

Default VLAN - A default VLAN cannot be renamed or deleted; however, ports in the default VLAN can be reassigned to other VLANs.

Identify the current name of a DMZ (demilitarized zone).

Screened subnet - Can provide an area of the network with less stringent security policies that allow traffic from website visitors, while other portions of the network cannot be accessed from the Internet.

Which of the following can be used to provide administrative access to a switch?

Management VLAN

Which of the following VLANs receives all untagged frames from untagged ports?

Native VLAN

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

14

Which of the following is a valid IP address for a network ID of 191.254.0.0 using 11 bits for subnetting?

191.254.1.29 - After calculations, the IP address 191.254.1.29 can be used as the host ID for 191.254.0.0 using 11 bits for subnetting.

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address?

192.168.50.118 - The broadcast address is always 1 below the network ID for the next subnet. Therefore,192.168.50.(119 - 1) yields 192.168.50.118.

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

255.254.0.0 - The total number of subnets required is 100; hence, 27= 128 will give us the maximum number of hosts. Counting the value of bits borrowed will add up to 254, so 255.254.0.0 is the subnet mask that should be chosen in this scenario.

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select?

255.255.240.0 - The slash notation /20 represents a subnet mask with 20 1s. This would translate to 11111111.11111111.11110000.0000, which in turn would convert to 255.255.240.0.

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

255.255.255.224

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use?

255.255.255.240 - This subnet will have 8 subnets with 30 hosts and hence will be ideal in this scenario.

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224.

30 - Using the formula 2h - 2 = Z, in this problem, the total number of hosts is 30.

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?

62 - A /26 mask is the same as 255.255.255.192, essentially leaving 6 host bits. This implies that there are 6 host bits, which means there are 64 possible IP addresses. However, one address represents the subnet number, and one address represents the broadcast address. Thus, 62 addresses can be assigned to network hosts.

How many bits are used in a network with a subnet of 255.0.0.0?

8

Analyze which of the following is true about a default VLAN. A. Ports in default VLAN can be reassigned to other VLANs. B. To protect a network from unauthorized traffic, a default VLAN should be changed to an unused VLAN. C. A default VLAN can be used to carry user-generated traffic, such as email, web browsing, or database updates. D. A default VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency.

A. Ports in default VLAN can be reassigned to other VLANs. - A default VLAN cannot be renamed or deleted; however, ports in the default VLAN can be reassigned to other VLANs.

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:FE2B:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address?

AA - The fourth hexadecimal block in the site prefix can be altered to create subnets within a site.

Analyze which of the following can be used to establish a static VLAN assignment for a device.

Assigning a VLAN based on the switch port the device is connected to. - Devices can be assigned to a VLAN based on the switch port the device is connected to. This is called a static VLAN assignment.

What is the term used to identify the first four blocks that normally help to identify a network?

Site prefix - The first four blocks or 64 bits normally identify the network and serve as the network prefix, also called the site prefix.

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____.

Classless addressing - Subnetting, which alters the rules of classful IPv4 addressing, is known as classless addressing.

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario?

Community VLAN - Hosts within the same community VLAN can communicate with each other but not with hosts in other secondary VLANs.

In the formula 2n = Y, what does n represent? A. It equals the number of hosts available in each subnet. B. It is the number of subnets that result. C. It equals the number of bits remaining in the host portion. D. It is the number of bits that must be switched from the host address to the network ID.

D. It is the number of bits that must be switched from the host address to the network ID.

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario?

Departmental boundaries - Will include the Accounting, Human Resources, and Sales departments.

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

Four bits - By applying the 2n = Y formula to calculate the number of bits required to divide a network into nine subnets, four bits will be sufficient.

Phillips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?

Geographic locations - Will include the floors of a building connected by a LAN (local area network), or the buildings connected by a WAN (wide area network).

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation?

Incorrect VLAN assignment - This can happen due to a variety of situations, including plugging a device into the wrong switch port or misconfigurations of the client authentication process in which a VLAN is assigned to a device before the authentication process is complete.

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?

Incorrect port mode - Switch ports connected to endpoints, such as workstations and servers, should nearly always use access mode. Switch ports connected to other network devices should be configured in trunk mode only if that connection must support multiple VLANs.

Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets.

MIL Ltd. can create up to 65,536 subnets. - An organization with a /48 site prefix can use all 16 bits to create up to 65,536 subnets.

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?

SAID - Each VLAN is assigned a different SAID (security association identifier), which indicates to other connectivity devices which VLAN a transmission belongs to.

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?

Stack master - VTP (VLAN Trunk Protocol) allows changes to a VLAN database on one switch, called the stack master, to be communicated to all other switches in the network.

Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

Static VLAN assignment - Devices can be assigned to a VLAN based on the switch port the device is connected to. This is called a static VLAN assignment.

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario?

Switch spoofing - An attacker connects to a switch and then makes the connection look to the switch as if it's a trunk line. The switch might auto-configure its port into trunk mode when it detects trunk mode on the other end of the connection. A hacker can then feed their own VLAN traffic into that port and access VLANs throughout the network.

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

The default VLAN should not be used - Reduces the risk of VLAN hopping

The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario?

Trunking

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection?

Untagged frames - A native LAN receives all untagged frames from untagged ports. Hence, it is not required during VoIP VLAN connections.

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

VLSM (Variable Length Subnet Mask) - Allows subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space.

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____.

a router-on-a-stick

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?

switchport trunk native vlan - The command switchport trunk native vlancan be used to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end.

The part which identifies the network in an IPv4 address is known as _____.

the network ID


Set pelajaran terkait

1 Autodesk REVIT Architecture Interface

View Set

Principles of Government Part 1 review

View Set

SCSM-450_Ch11_Managing Capacity and Demand

View Set