Ch 8 Flashcards

1
Q

Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets.

A

MIL Ltd. can create up to 65,536 Subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet’s network ID is 192.168.50.119, what is the targeted subnet’s broadcast address?

A

192.168.50.118

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a valid IP address for a network ID of 191.254.0.0 using 11 bits for subnetting?

A

191.254.1.29

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario?

A

Community VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?

A

Incorrect Port Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following can be used to provide administrative access to a switch?

A

Management VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

A

255.254.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?

A

62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario?

A

Departmental Boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many bits are used in a network with a subnet of 255.0.0.0?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection?

A

Untagged Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:FE2B:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address?

A

AA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?

A

Switchport Trunk Native VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization?

A

Default VLAN

is a preconfigured VLAN on a switch that cannot be renamed or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use?

A

255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The part which identifies the network in an IPv4 address is known as _____.

A

The Network ID

17
Q

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

A

VLSM (Variable Length Subnet Mask)

is a subnetting method that allows subnets to be further subdivided into smaller groupings until each subnet is about the same size as the needed IP address space.

18
Q

Analyze which of the following can be used to establish a static VLAN assignment for a device.

A

Assigning a VLAN based on the switch port of the device is connected to.

19
Q

Which of the following carries user-generated traffic, such as email, web browsing, or database updates?

A

Data VLAN

20
Q

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____.

A

Classless Addressing

21
Q

Analyze which of the following is true about a default VLAN.

a. Ports in default VLAN can be reassigned to other VLANs.
b. To protect a network from unauthorized traffic, a default VLAN should be changed to an unused VLAN.
c. A default VLAN can be used to carry user-generated traffic, such as email, web browsing, or database updates.
d. A default VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency.

A

Ports in default VLAN can be reassigned to other VLANs.

22
Q

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

A

The default VLAN should not be used.

Default VLAN is a preconfigured VLAN on a switch that cannot be renamed or deleted.

23
Q

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

A

14

24
Q

Bilmain Manufactures has recruited you as a network administrator to handle the organization’s network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?

A

255.0.0.0

25
Q

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries’ departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation?

A

Incorrect VLAN Assignment

26
Q

In the formula 2 n = Y, what does n represent?

A

It is the number of bits that must be switched from the host address to the network ID.

27
Q

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?

A

Stack Master

28
Q

Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

A

Static VLAN Assignment

29
Q

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization’s nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

A

Four Bits

30
Q

What is the term used to identify the first four blocks that normally help to identify a network?

A

Site Prefix

is the first four blocks or 64 bits of an IPv6 address that normally identify the network. Also called Global Routing Prefix.

31
Q

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?

A

SAID (Security Association Identifier)

indicates to other connectivity devices which VLAN a transmission belongs to.

32
Q

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

A

255.255.255.224

33
Q

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select?

A

255.255.240.0

34
Q

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario?

A

Switch Spoofing

35
Q

Phillips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?

A

Geographic Locations

36
Q

The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario?

A

Trunking

37
Q

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224.

A

30

38
Q

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____.

A

A Router-on-a-Stick

39
Q

Which of the following VLANs receives all untagged frames from untagged ports?

A

Native VLAN