Networking + 8
John has requested Jane to set up a home router so that he and his family can access the Internet. Analyze what is the subnet mask that Jane should set. 255.255.0.0 255.0.0.0 255.255.255.0 255.255.255.255
255.255.255.0
Calculate the total number of subnets in the network ID 192.168.1.0 255.255.255.224. 32 16 8 4
8 255 . 255 . 255 . 224 11111111.11111111.11111111.11100000 2^3 = 8 2^n = y ( n = # of bits borrowed ) ( y = subnets result )
You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into six subnets to correspond to the organization's six different floors. How many bits will you borrow from the host portion of the ID address in this scenario? Four Five Three Two
Three
Suppose you're calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.42.128, what is the targeted subnet's broadcast address? a. 192.168.42.255 b. 192.168.42.96 c. 192.168.42.0 d. 192.168.42.127
d. 192.168.42.127
The network administrator has tasked you, a network engineer, with providing him the number of IP addresses that will be available for hosts on the network when a network device has a mask of /28. Which of the following do you think will be available in such a scenario? 14 32 16 15
14 16 - 2 = 14 (2 is the network addr and the broadcast ad)
You are working as a network engineer, and you have to use VLAN tagging to appear in Ethernet frames, which will later be used in the switches in handling such frames. Which of the following IEEE standards will you adhere to in this scenario? 802.3 802.1Q 802.1X 802.11
802.1Q
Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario? Device types VLAN groups Geographic locations Departmental boundaries
Departmental boundaries
Which of the following manages a refrigeration system or a gas pipeline? Native VLAN ICS Router-on-a-stick Trunking
ICS
As a network administrator at Mineball Gaming Corporation, you want to change the default VLAN to a different type as there are security threats involved with them. Which of the following types will you not apply in this scenario as it will almost serve the same purpose as a default VLAN? Isolated VLAN Management VLAN Community VLAN Voice VLAN
Management VLAN
What is the binary number 1111 1111 in decimal? a. 255 b. 8 c. 100 d. 192
a. 255
What is the minimum number of bits that should be borrowed to create 14 subnets? a. 4 bits b. 2 bits c. 8 bits d. 16 bits
a. 4 bits
Which of the following techniques does not break up a large broadcast domain into smaller broadcast domains? a. Adding more layer 2 switches to a network b. Adding more VLANs to a network c. Adding more routers to a network
a. Adding more layer 2 switches to a network Adding more switches to a network expands the broadcast domain. You can use physical devices like routers to create separate LANs and, therefore, separate broadcast domains. At layer 2, you can create virtual LANs to break up the broadcast domain.
At what OSI layer do VLANs function? a. Data link layer b. Network layer c. Physical layer d. Transport layer
a. Data link layer By sorting traffic based on data link layer information, VLANs create two or more broadcast domains from a single broadcast domain, which is also a layer 2 construct.
Which of the following is not a good reason to segment a network? a. To increase the number of networking devices on a network b. To narrow down the location of problems on a network c. To limit access to broadcast domains d. To reduce the demand on bandwidth
a. To increase the number of networking devices on a network
Which formulas can be used to calculate the magic number? Choose two. a. 2n b. 2h c. 256 - the interesting octet d. 2h - 2
b. 2h c. 256 - the interesting octet
Which IEEE standard determines how VLANs work on a network? a. 802.3af b. 802.1Q c. 802.1X d. 802.11
b. 802.1Q
Which assignment technique requires a RADIUS server? a. Static VLAN assignment b. Dynamic VLAN assignment c. Dynamic IP address assignment d. Static IP address assignment
b. Dynamic VLAN assignment
What do well-chosen subnets accomplish? a. Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. b. Network documentation is easier to manage. c. IP address spaces overlap for easier management. d. Problems affect the entire network, making them more difficult to pin down.
b. Network documentation is easier to manage.
Which port mode on a switch enables that port to manage traffic for multiple VLANs? a. Community b. Trunk c. Access d. Private
b. Trunk
How many bits of a class A IP address are used for host information? a. 8 bits b. 16 bits c. 24 bits d. 32 bits
c. 24 bits
What is the formula for determining the number of possible hosts on a network? a. 2n - 2 = Y b. 2n = Y c. 2h - 2 = Z d. 2h = Z
c. 2h - 2 = Z
If a server has a subnet mask of 255.255.255.224, how many bits in its IP address identify the host? a. 27 bits b. 8 bits c. 5 bits d. 30 bits
c. 5 bits
What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? a. 0 bits b. 9 bits c. 8 bits d. 10 bits
c. 8 bits
Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The eighth one b. The third one c. The fourth one d. The first one
c. The fourth one
Suppose you have a small network with one router, one switch, and a few computers that are grouped into three VLANs. Which of the following statements is false? a. Traffic from any computer to another network must go through the router. b. Traffic between computers on different VLANs must go through the router. c. Traffic between computers on the same VLAN must go through the router.
c. Traffic between computers on the same VLAN must go through the router.
What is the network ID of the IP address 192.168.72.149/16? a. 0.0.72.149 b. 0.0.0.149 c. 192.168.72.0 d. 192.168.0.0
d. 192.168.0.0
Which VLAN on a switch cannot be renamed or deleted? a. Native VLAN b. Data VLAN c. Management VLAN d. Default VLAN
d. Default VLAN A default VLAN is typically preconfigured on a switch, initially includes all the switch's ports, and cannot be renamed or deleted
Which of the following is not a benefit of subnetting? a. Available IP address space is managed more efficiently. b. Network documentation is easier to manage. c. Problems are easier to locate and resolve. d. Routers more easily manage IP address spaces that overlap.
d. Routers more easily manage IP address spaces that overlap It's not true that routers more easily manage IP address spaces that overlap—If IP address ranges connected to a router's own interfaces overlap, the router will not be able to route messages accurately between the LANs
In the formula 2h - 2 = Z, what does h represent? h equals the number of bits remaining in the host portion. h equals the number of bits that must be switched from the host address to the network ID. h equals the number of hosts available in each subnet. h equals the number of subnets that result.
h equals the number of bits remaining in the host portion.
network segments that are more accessible to the internet are know by what new term? DIZ screened subnet enhanced subnet none of these
screened subnet
You want to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch? set port-mode trunk set native-vlan-id switchport trunk native vlan ip dhcp snooping
switchport trunk native vlan