Networking + 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

John has requested Jane to set up a home router so that he and his family can access the Internet. Analyze what is the subnet mask that Jane should set. 255.255.0.0 255.0.0.0 255.255.255.0 255.255.255.255

255.255.255.0

Calculate the total number of subnets in the network ID 192.168.1.0 255.255.255.224. 32 16 8 4

8 255 . 255 . 255 . 224 11111111.11111111.11111111.11100000 2^3 = 8 2^n = y ( n = # of bits borrowed ) ( y = subnets result )

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into six subnets to correspond to the organization's six different floors. How many bits will you borrow from the host portion of the ID address in this scenario? Four Five Three Two

Three

Suppose you're calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.42.128, what is the targeted subnet's broadcast address? a. 192.168.42.255 b. 192.168.42.96 c. 192.168.42.0 d. 192.168.42.127

d. 192.168.42.127

The network administrator has tasked you, a network engineer, with providing him the number of IP addresses that will be available for hosts on the network when a network device has a mask of /28. Which of the following do you think will be available in such a scenario? 14 32 16 15

14 16 - 2 = 14 (2 is the network addr and the broadcast ad)

You are working as a network engineer, and you have to use VLAN tagging to appear in Ethernet frames, which will later be used in the switches in handling such frames. Which of the following IEEE standards will you adhere to in this scenario? 802.3 802.1Q 802.1X 802.11

802.1Q

Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario? Device types VLAN groups Geographic locations Departmental boundaries

Departmental boundaries

Which of the following manages a refrigeration system or a gas pipeline? Native VLAN ICS Router-on-a-stick Trunking

ICS

As a network administrator at Mineball Gaming Corporation, you want to change the default VLAN to a different type as there are security threats involved with them. Which of the following types will you not apply in this scenario as it will almost serve the same purpose as a default VLAN? Isolated VLAN Management VLAN Community VLAN Voice VLAN

Management VLAN

What is the binary number 1111 1111 in decimal? a. 255 b. 8 c. 100 d. 192

a. 255

What is the minimum number of bits that should be borrowed to create 14 subnets? a. 4 bits b. 2 bits c. 8 bits d. 16 bits

a. 4 bits

Which of the following techniques does not break up a large broadcast domain into smaller broadcast domains? a. Adding more layer 2 switches to a network b. Adding more VLANs to a network c. Adding more routers to a network

a. Adding more layer 2 switches to a network Adding more switches to a network expands the broadcast domain. You can use physical devices like routers to create separate LANs and, therefore, separate broadcast domains. At layer 2, you can create virtual LANs to break up the broadcast domain.

At what OSI layer do VLANs function? a. Data link layer b. Network layer c. Physical layer d. Transport layer

a. Data link layer By sorting traffic based on data link layer information, VLANs create two or more broadcast domains from a single broadcast domain, which is also a layer 2 construct.

Which of the following is not a good reason to segment a network? a. To increase the number of networking devices on a network b. To narrow down the location of problems on a network c. To limit access to broadcast domains d. To reduce the demand on bandwidth

a. To increase the number of networking devices on a network

Which formulas can be used to calculate the magic number? Choose two. a. 2n b. 2h c. 256 - the interesting octet d. 2h - 2

b. 2h c. 256 - the interesting octet

Which IEEE standard determines how VLANs work on a network? a. 802.3af b. 802.1Q c. 802.1X d. 802.11

b. 802.1Q

Which assignment technique requires a RADIUS server? a. Static VLAN assignment b. Dynamic VLAN assignment c. Dynamic IP address assignment d. Static IP address assignment

b. Dynamic VLAN assignment

What do well-chosen subnets accomplish? a. Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. b. Network documentation is easier to manage. c. IP address spaces overlap for easier management. d. Problems affect the entire network, making them more difficult to pin down.

b. Network documentation is easier to manage.

Which port mode on a switch enables that port to manage traffic for multiple VLANs? a. Community b. Trunk c. Access d. Private

b. Trunk

How many bits of a class A IP address are used for host information? a. 8 bits b. 16 bits c. 24 bits d. 32 bits

c. 24 bits

What is the formula for determining the number of possible hosts on a network? a. 2n - 2 = Y b. 2n = Y c. 2h - 2 = Z d. 2h = Z

c. 2h - 2 = Z

If a server has a subnet mask of 255.255.255.224, how many bits in its IP address identify the host? a. 27 bits b. 8 bits c. 5 bits d. 30 bits

c. 5 bits

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? a. 0 bits b. 9 bits c. 8 bits d. 10 bits

c. 8 bits

Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The eighth one b. The third one c. The fourth one d. The first one

c. The fourth one

Suppose you have a small network with one router, one switch, and a few computers that are grouped into three VLANs. Which of the following statements is false? a. Traffic from any computer to another network must go through the router. b. Traffic between computers on different VLANs must go through the router. c. Traffic between computers on the same VLAN must go through the router.

c. Traffic between computers on the same VLAN must go through the router.

What is the network ID of the IP address 192.168.72.149/16? a. 0.0.72.149 b. 0.0.0.149 c. 192.168.72.0 d. 192.168.0.0

d. 192.168.0.0

Which VLAN on a switch cannot be renamed or deleted? a. Native VLAN b. Data VLAN c. Management VLAN d. Default VLAN

d. Default VLAN A default VLAN is typically preconfigured on a switch, initially includes all the switch's ports, and cannot be renamed or deleted

Which of the following is not a benefit of subnetting? a. Available IP address space is managed more efficiently. b. Network documentation is easier to manage. c. Problems are easier to locate and resolve. d. Routers more easily manage IP address spaces that overlap.

d. Routers more easily manage IP address spaces that overlap It's not true that routers more easily manage IP address spaces that overlap—If IP address ranges connected to a router's own interfaces overlap, the router will not be able to route messages accurately between the LANs

In the formula 2h - 2 = Z, what does h represent? h equals the number of bits remaining in the host portion. h equals the number of bits that must be switched from the host address to the network ID. h equals the number of hosts available in each subnet. h equals the number of subnets that result.

h equals the number of bits remaining in the host portion.

network segments that are more accessible to the internet are know by what new term? DIZ screened subnet enhanced subnet none of these

screened subnet

You want to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch? set port-mode trunk set native-vlan-id switchport trunk native vlan ip dhcp snooping

switchport trunk native vlan


Set pelajaran terkait

Management Information Systems - 5 Analysis & Design of Systems

View Set

SPEECH Mid-Term Chapters 14 & 15

View Set

Chapter 6: Continuous Probability Distribution

View Set