Chapter 8 - Subnets and VLANs
If the EUI-64 standard is used, what part of an IPv6 address is affected? a. The first four blocks of the address. b. The last four blocks of the address. c. The middle four blocks of the address. d. All blocks of the address are affected.
The last four blocks of the address.
In an IPv6 address, what do the first four blocks or 64 bits of the address represent? a. The usable host portion of the network. b. The site prefix or global routing prefix. c. The broadcast domain for the configured host ID. d. The MAC address of the router assigning the host ID.
The site prefix or global routing prefix.
When dealing with a Cisco switch, what is NOT one of the pre-established VLANs? a. VLAN 1 b. VLAN 1001 c. VLAN 1003 d. VLAN 1005
VLAN 1001
On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+? a. ip create helper server b. ip new helper c. set ip helper address d. ip helper-address
ip helper-address
Subtracting an interesting octet value from 256 yields what number? a. network ID b. subnet ID c. magic number d. host ID
magic number
Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs? a. router-on-a-stick b. branched router c. router overloading d. router-on-a-branch
router-on-a-stick
What command will set the native VLAN on a Juniper switch port? a. switchport trunk native vlan b. switchport set native vlan c. config native vlan d. set native-vlan-id
set native-vlan-id
You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch? a. get vlans b. show vlan c. list switch-vlans d. show vlandb
show vlan
Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host? a. 172.16.0.0 b. 172.16.1.0 c. 172.16.2.0 d. 172.0.0.0
172.16.0.0
An IP address of 192.168.18.73/28 has what network ID? a. 192.168.16.0 b. 192.168.18.64 c. 192.168.18.32 d. 192.168.18.0
192.168.18.64
By default, when using classful addressing, how many bits exist in the host portion of a Class A address? a. 8 b. 16 c. 24 d. 32
24
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet? a. 255.255.248.0 b. 255.255.224.0 c. 255.255.192.0 d. 255.255.128.0
255.255.224.0
A network with a CIDR notation of /26 would have what subnet mask? a. 255.255.255.0 b. 255.255.255.192 c. 255.255.255.224 d. 255.255.255.240
255.255.255.192
How many /64 subnets can be created within a /56 prefix? a. 256 b. 512 c. 1024 d. 2048
256
How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs? a. 4 bytes b. 8 bytes c. 12 bytes d. 20 bytes
4 bytes
What is the maximum number of host IP addresses that can exist in a Class B network? a. 1022 b. 8190 c. 32,766 d. 65,534
65,534
How many subnets can a /48 site prefix support? a. 256 subnets b. 16384 subnets c. 65,536 subnets d. 131,072 subnets
65,536 subnets
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information? a. 802.1c b. 802.1Q c. 802.1V d. 802.1d
802.1Q
Which of the following suggestions can help prevent VLAN hopping attacks on a network? a. Install an additional switch to isolate traffic. b. Disable auto trunking and move native VLANs to unused VLANs. c. Install a router to process the untagged traffic on the VLAN. d. Use MAC address filtering.
Disable auto trunking and move native VLANs to unused VLANs.
When an 802.1Q tag is added to an Ethernet frame, where is it placed? a. It is inserted between the preamble and the destination address. b. It is inserted between the destination and the source addresses. c. It is inserted between the source address and the Ethernet type field. d. It is appended to the end of the frame.
It is inserted between the source address and the Ethernet type field.
Which of the following statements regarding IPv6 subnetting is NOT accurate? a. IPv6 addressing uses no classes, and is therefore classless. b. IPv6 does not use subnet masks. c. A single IPv6 subnet is capable of supplying 18,446,744,073,709,551,616 IPv6 addresses. d. The largest IPv6 subnet capable of being created is a /64.
The largest IPv6 subnet capable of being created is a /64.
A subnet of 255.255.248.0 can be represented by what CIDR notation? a. /18 b. /20 c. /21 d. /29
/21
You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal? a. 10.3.0.0/19 b. 172.20.50.0/23 c. 192.168.0.0/20 d. 10.90.0.0/22
10.3.0.0/19
On a Cisco switch, what would the security association identifier be for VLAN 13? a. 1013 b. 5013 c. 100013 d. 1000130
100013
A network with 10 bits remaining for the host portion will have how many usable host addresses? a. 510 b. 1022 c. 2046 d. 4192
1022
When using IPv6, what would a /64 network likely be assigned to? a. A regional Internet registry. b. A large Internet service provider. c. A very large organization. d. A smaller organization or business.
A smaller organization or business.
What does the VLAN Trunk Protocol (VTP) do? a. It shares trunking information amongst switches that participate. b. It shares VLAN database information amongst switches that participate. c. It is the protocol used by a trunk port for establishing a trunk with another switch. d. It is the protocol that defines how VLAN tagging is accomplished in an Ethernet network.
It shares VLAN database information amongst switches that participate.
With VTP, where is the VLAN database stored? a. On the router responsible for maintaining the VTP database. b. On the switch that is known as the stack master. c. On the switch that is configured as the trunk root. d. On the designated VLAN server for the network.
On the switch that is known as the stack master.
An interface that manages traffic from multiple VLANs is known by what term? a. access port b. aggregation port c. trunk port d. egress port
aggregation port
What is NOT one of the ways in which networks are commonly segmented? a. by geographic location b. by departmental boundaries c. by device types d. by device manufacturer
by device manufacturer