Chapter 10 Flashcards
A network with the subnet mask 255.255.255.0 would have what CIDR block? A) /20 B) /24 C) /28 D) /32
B) /24
A network with 6 bits remaining for the host portion will have how many usable host addresses? A) 254 B) 126 C) 62 D) 30
C) 62
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the interface? A) A router B) A trunk port C) An access port D) A VLAN port
B) A trunk port
What type of VLAN automatically receives all untagged frames? A) Default VLAN B) Native VLAN C) Mirrored VLAN D) Untagged VLAN
B) Native VLAN
How can VLAN hopping attacks be prevented on a network?
A) Install an additional switch to isolate traffic
B) Disable auto trunking and move native VLANs to unused VLANs
C) Install a router to process the untagged traffic on the VLAN
D) Use MAC address filtering
B) Disable auto trunking and move native VLANs to unused VLANs
The first iteration of STP was defined in what IEEE standard below? A) 802.3d B) 802.1d C) 802.11s D) 802.1c
B) 802.1d
STP selects the root bridge based on which parameter? A) port number B) bridge ID (BID) C) bridge version number (BVN) D) software revision code
B) bridge ID (BID)
Telnet and SSH are known as what type of management system? A) out-of-band B) in-band C) side-band D) external-band
B) in-band
With VTP, the VLAN database is stored on a switch known as which option below? A) root bridge B) stack master C) trunk root D) vlan server
B) stack master
In order to allow communication between VLANs for exchange of data, what must be used? A) a firewall B) a switch C) a router D) a root bridge
C) a router
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information? A) 802.1c B) 802.1Q C) 802.1V D) 802.1d
B) 802.1Q
Which of the following is not a valid reason for using virtualization? A) increase performance B) save money by purchasing few machines C) simplify backups and recovery D) efficient use of resources
A) increase performance
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.2.0/24, 192.168.3.0/24? A) 255.255.255.0 B) 255.255.252.0 C) 255.255.255.128 D) 255.255.240.0
B) 255.255.252.0
In an IPv6 address, the first 64 bits of the address are known as what? A) host prefix B) equipment ID C) routing prefix D) prefix mask
C) routing prefix
Which network type allows a vNIC to access a network directly using the host machine's NIC? A) bridged mode B) NAT mode C) host only mode D) direct mode
A) bridged mode
What protocol is used to provide a common language between virtualized service applications and a network's physical devices? A) VRRP B) OpenFlow C) CommonStack D) OpenArch
B) OpenFlow
The Shortest Path Bridging protocol is defined in what IEEE standard? A) 802.1d B) 802.1aq C) 802.1Q D) 802.1s
B) 802.1aq
The management option that can provide on-site infrastructure access when the network is down or completer remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as? A) in-band management B) out-of-band management C) open management D) side channel management
B) out-of-band management
A CIDR block of /26 is equivalent to what subnet mask below? A) 255.255.192.0 B) 255.255.254.0 C) 255.255.255.192 D) 255.255.0.0
C) 255.255.255.192
Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network? A) host-only mode B) bridged mode C) NAT mode D) restricted mode
A) host-only mode
Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group? (choose two) A) VRRP B) GBRP C) HSRP D) CARP
A) VRRP
C) HSRP
Which two properties indicate to other connectivity devices which VLAN a transmission belongs to? A) vID B) SAID C) security association identifier D) VMAC
B) SAID
C) security association identifier
What two items make up a Bridge ID? A) 2 byte priority field B) MAC address C) relevant port number D) software version
A) 2 byte priority field
B) MAC address
Which two standards below represent newer versions of STP? A) 802.1d B) 802.1f C) 802.1w D) 802.1s
C) 802.1w
D) 802.1s
What two standards below have been developed to replace the Spanning Tree Protocol? A) TRILL B) SPB C) VSRP D) HSRP
A) TRILL
B) SPB