Network + Ch 10 review

Ace your homework & exams now with Quizwiz!

A software configuration that can be used to disable STP on specific ports.

BPDU

In CIDR notation, the forward slash plus the number of bits used for the network ID.

CIDR block

How can VLAN hopping attacks be prevented on a network?

Disable auto trucking and move native VLANs to unused VLANs

What two standards below have been developed to replace the Spanning Tree Protocol?

TRILL, SPB

In ________, a NIC relies on the host machine to act as a NAT device.

NAT mode

With VTP, the VLAN database is stored on a switch known as which option below?

stack master

The first iteration of STP was defined in what IEEE standard below?

802.1d

Which two standards below represent newer versions of STP?

802.1w, 802.1s

A network with the subnet mask 255.255.255.0 would have what CIDR block?

/24

What two items make up a Bridge ID?

2 byte priority field, MAC address

What supernet mask, below would allow an organization to cover the following networks with one routing entry.

255.255.255.0

A CIDR block of /26 is equivalent to what subnet mask below?

255.255.255.192

A network with 6 bits remaining for the host portion will have how many usable hosts?

62

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

802.1Q

The Shortest Path Bridging protocol is defined in what IEEE standard?

802.1aq

A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the router?

A trunk port

A centrally manged DHCP server can provide DHCP to multiple VLANs by configuring a _______.

DHCP relay agent

Network segmentation decreases both performance and security on a network?

False

Only Class B and Class C networks can be subnetted

False

Cisco's proprietary standard, similar to VRRP, that assigns a virtual IP address to a group of routers.

HSRP (Hot Standby Routing Protocol)

What type of VLAN automatically receives all untagged frames?

Native VLAN

What protocol is used to provide a common language between virtualization service applications and a network's physical devices?

OpenFlow

To eliminate the possibility of traffic loops on switches and bridges, the ___________ is used.

STP

Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?

Security Association Identifier, SAID

Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a LAyer 2 solution for segmenting a network.

True

The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge.

True

The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.

True

A ____________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLANS.

VLAN hopping attack

An attack in which the attacker generates transmission that appear, to the switch, to belong to a protected VLAN.

VLAN hopping attack

A standard that assigns a virtual IP address to a group of routers.

VRRP

Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group?

VRRP, HSRP

A server that exists as a virtual machine, created and managed by visualization software on a host, or physical, computer.

Virtual server

In order to allow communication between VLANs for exchange of data, what must be used?

a router

The interface on a switch used for an end mode. Device connected to access ports are unaware of VLAN information.

access port

STP selects the root bridge based on which parameter?

bridge ID (BID)

Which network type allows a vNIC to access a network directly using the host machine's NIC?

bridged mode

A switch is typically reconfigured with one ___________ that includes all its ports.

default VLAN

Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network?

host-only mode

Telnet and SSH are known as what type of management below?

in-band

Which of the following is not a valid reason for using virtualization?

increase performance

An tagged VLAN one a switch that will automatically receive all untagged frames.

native VLAN

The management option that can provide on-site infrastructure access when the network is down or complete remote access in case of connectivity failures on the network, such as via a cellular signal, is known as?

out-of-band management

In a IPv6 address, the first 64 bits of the address are known as what?

routing prefix

The visualization of network services in which a network controller manages these services instead of the services being directly managed by the hardware devices involved.

software defined networking (SDN)

The interface on a switch capable of managing traffic from multiple VLANS.

trunk port


Related study sets

CPCU 530 Ch. 3 Special Characteristics of Insurance

View Set

Effects of WWI and WWII on the status and role of women

View Set

MGMT 3000 Exam 2 - Chapter 9 Slides Review

View Set