Chapter 10 - Subnet Details - Sheet1 Flashcards
Mask of /25
128 Mask
Bits on / Bits off for /25
1 on, 7 off (10000000)
Block size for /25
Block size of 128
How many subnets and hosts for /25
2 subnets, each with 126 hosts
Mask of /26
192 Mask
Bits on / Bits off for /26
2 on, 6 off (11000000)
Block size for /26
Block size of 64
How many subnets and hosts for /26
4 subnets, each with 62 hosts
Mask of /27
224 Mask
Bits on / Bits off for /27
3 on, 5 off (11100000)
Block size for /27
Block size of 32
How many subnets and hosts for /27
8 subnets, each with 30 hosts
Mask of /28
240 Mask
Bits on / Bits off for /28
4 bits on and 4 bits off
Block size for /28
Block size of 16
How many subnets and hosts for /28
16 Subnets, each with 14 hosts
Mask of /29
248 mask
Bits on / Bits off for /29
5 bits on and 3 bits off (11111000)
Block size for /29
Block size of 8
How many subnets and hosts for /29
32 subnets, each with 6 hosts
Mask of /30
252 mask
Bits on / Bits off for /30
6 bits on and 2 bits off
Block size for /30
block size of 4
How many subnets and hosts for /30
64 subnets, each with 2 hosts
Network segmentation decreases both performance and security on a network.
(A) True
(B) False
Answer : (B)
Only Class B and Class C networks can be subnetted. (A) True
(B) False
Answer : (B)
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
(A) True
(B) False
Answer : (A)
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.
(A) True
(B) False
Answer : (A)
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge’s port that is closest to the root bridge, can forward frames toward the root bridge.
(A) True
(B) False
Answer : (A)
A network with the subnet mask 255.255.255.0 would have what CIDR block? (A) /20 (B) /24 (C) /28 (D) /32
Answer : (B)
A network with 6 bits remaining for the host portion will have how many usable host addresses? (A) 254 (B) 126 (C) 62 (D) 30
Answer : (C)
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the interface? (A) A router (B) A trunk port (C) An access port (D) A VLAN port
Answer : (B)
What type of VLAN automatically receives all untagged frames? (A) Default VLAN (B) Native VLAN (C) Mirrored VLAN (D) Untagged VLAN
Answer : (B)
How can VLAN hopping attacks be prevented on a network?
(A) Install an additional switch to isolate traffic.
(B) Disable auto trunking and move native VLANs to unused VLANs.
(C) Install a router to process the untagged traffic on the VLAN.
(D) Use MAC address filtering.
Answer : (B)
The first iteration of STP was defined in what IEEE standard below? (A) 802.3d (B) 802.1d (C) 802.11s (D) 802.1c
Answer : (B)
STP selects the root bridge based on which parameter? (A) port number (B) bridge ID (BID) (C) bridge version number (BVN) (D) software revision code
Answer : (B)
Telnet and SSH are known as what type of management system? (A) out-of-band (B) in-band C) side-band (D) external-band
Answer : (B)
With VTP, the VLAN database is stored on a switch known as which option below? (A) root bridge (B) stack master (C) trunk root (D) vlan server
Answer : (B)
In order to allow communication between VLANs for exchange of data, what must be used? (A) a firewall (B) a switch (C) a router (D) a root bridge
Answer : (C)