Network+ 8th Edition Chapter 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal?

1030.0.0/19

Subnetting a Class C network with a subnet mask of 255.255.255.240 will create 16 subnets on the network. How many hosts per subnet can be created?

14

What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0

172.16.32.108/24

7. How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?

a. 4 bytes

5. Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?

a. router-on-a-stick

21. What is the maximum number of host IP addresses that can exist in a Class B network?

d. 65,534

13. What command will set the native VLAN on a Juniper switch port?

d. set native-vlan-id

What area of a network can provide less stringent security so a web server is more accessible from the open Internet

DMZ

Which IEEE standard determines how VLANs work on a network?

802.1q

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

the fourth one

Which VLAN on a switch manages untagged frames

the native Vlan

What do well-chosen subnets accomplish?

network documentation is easier to manage

On which networking device do you configure VLANs?

switch or manages switch

You have decided to create 256 subnets on your Class B network. What subnet mask will you use to accomplish this?

255.255.255.0

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

How many subnets can a /48 site prefix support?

65,536 subnets

A subnet of 255.255.248.0 can be represented by what CIDR notation?

/21

How many bits of a Class A IP address are used for host information?

24 bits

16. With VTP, where is the VLAN database stored?

b. On the switch that is known as the stack master.

All that is needed to provide communication between two VLANs is a DHCP relay agent.

false

On a Cisco switch, what would the security association identifier be for VLAN 13?

100013

A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the interface?

A trunk port

What is NOT one of the ways in which networks are commonly segmented?

by device manufacturer

24. A subnet of 255.255.248.0 can be represented by what CIDR notation?

c. /21

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?

DHCP relay agent

which VLAN is designed to suport administrative access to networking devices

Management VLAN

which IP addressing technique subnets a subnet to create subnets of various sizes

VLSM

6. You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal?

a. 10.3.0.0/19

17. Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?

a. 172.16.0.0

18. How many /64 subnets can be created within a /56 prefix?

a. 256

Since each port on a switch is essentially its own collision domain, what results when switch ports from different switches are grouped together?

all of these are correct

25. A network with 10 bits remaining for the host portion will have how many usable host addresses?

b. 1022

12. An IP address of 192.168.18.73/28 has what network ID?

b. 192.168.18.64

20. What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

b. 802.1Q

4. Which of the following suggestions can help prevent VLAN hopping attacks on a network?

b. Disable auto trunking and move native VLANs to unused VLANs.

22. If the EUI-64 standard is used, what part of an IPv6 address is affected?

b. The last four blocks of the address.

14. In an IPv6 address, what do the first four blocks or 64 bits of the address represent?

b. The site prefix or global routing prefix.

2. When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?

b. VLAN 1001

9. You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch?

b. show vlan

3. On a Cisco switch, what would the security association identifier be for VLAN 13?

c. 100013

15. By default, when using classful addressing, how many bits exist in the host portion of a Class A address?

c. 24

8. When an 802.1Q tag is added to an Ethernet frame, where is it placed?

c. It is inserted between the source address and the Ethernet type field.

11. Subtracting an interesting octet value from 256 yields what number?

c. magic number

In ____ addressing, the network information portion of an IPv4 address is limited to the first 8 bits in a Class A address.

classful

10. When using IPv6, what would a /64 network likely be assigned to?

d. A smaller organization or business.

19. Which of the following statements regarding IPv6 subnetting is NOT accurate?

d. The largest IPv6 subnet capable of being created is a /64.

23. On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+?

d. ip helper-address

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

eight

An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?

either Vlan hopping or double tagging

In classful addressing, the Class B IPv4 address network ID is located in the ____.

first 16 bits

Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.

reserved

In an IPv6 address, the first 64 bits of the address are known as what?

routing prefix

Which of the following is not a good reason to segment a network?

to increase the number of networking devices in a network

Subnet masks are NOT used in IPv6 addressing.

true

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

trunk

1. An interface that manages traffic from multiple VLANs is known by what term?

trunk port

An interface that manages traffic from multiple VLANs is known by what term?

trunk port

What switching technique allows you to funnel traffic belonging to more than one VLAN through a single switch interface?

trunking

When using classful IPv4 addressing, a network ID always ends with an octet of ____.

0

The result from ANDing 11001111 with 10010001 is ____.

10000001

Switches can create ____ by grouping a number of ports into a broadcast domain.

VLANs

Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of the first default gateway that will accept and interpret your transmission?

10.35.88.1

On a network with an IP address of 140.133.28.72 (or 10001100.10000101.00011100.01001000) and a subnet mask of 255.248.0.0 (or 11111111.11111000.00000000.00000000), what is the network ID?

140.128.0.0 (or 10001100 10000000 00000000 0000000)

If you subdivide your Class B network into 256 subnets, what is the maximum number of hosts you can assign to any single subnet?

254

What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet?

255.255.224.0

Convert the following subnet mask into its dotted-decimal equivalent: 11111111 11111111 11111000 00000000.

255.255.248.0

Which formulas can be used to calculate the magic number? Choose two.

256- the interesting octet, 2^h

What is the formula for determining the number of possible hosts on a network?

2^h - 2 = Z

A network with 6 bits remaining for the host portion will have how many usable host addresses?

62

How many IPv4 addresses are available on a Class B network that does NOT use subnetting?

65,534


Set pelajaran terkait

Chem 107 Final Butler missing quiz 1&2 and exam 1

View Set

Texas Real Estate Finance - Chp 10 - Defaults and Foreclosures

View Set

七上历史chapter4 section 4 the new kingdom and kush

View Set

PERT: Program Evaluation Review Technique

View Set

Prioritization, Delegation, Assignment- Chapter 13, Chapter16, Chapter 12, Chapter 14

View Set