Chapter 10 - Subnet Details - Sheet1 Flashcards

1
Q

Mask of /25

A

128 Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bits on / Bits off for /25

A

1 on, 7 off (10000000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Block size for /25

A

Block size of 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many subnets and hosts for /25

A

2 subnets, each with 126 hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mask of /26

A

192 Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bits on / Bits off for /26

A

2 on, 6 off (11000000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block size for /26

A

Block size of 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many subnets and hosts for /26

A

4 subnets, each with 62 hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mask of /27

A

224 Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bits on / Bits off for /27

A

3 on, 5 off (11100000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block size for /27

A

Block size of 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many subnets and hosts for /27

A

8 subnets, each with 30 hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mask of /28

A

240 Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bits on / Bits off for /28

A

4 bits on and 4 bits off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Block size for /28

A

Block size of 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many subnets and hosts for /28

A

16 Subnets, each with 14 hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mask of /29

A

248 mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bits on / Bits off for /29

A

5 bits on and 3 bits off (11111000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Block size for /29

A

Block size of 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How many subnets and hosts for /29

A

32 subnets, each with 6 hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mask of /30

A

252 mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Bits on / Bits off for /30

A

6 bits on and 2 bits off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Block size for /30

A

block size of 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many subnets and hosts for /30

A

64 subnets, each with 2 hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Network segmentation decreases both performance and security on a network. (A) True (B) False
Answer : (B)
26
Only Class B and Class C networks can be subnetted.​ (A) True (B) False
Answer : (B)
27
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system. (A) True (B) False
Answer : (A)
28
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.​ (A) True (B) False
Answer : (A)
29
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge.​ (A) True (B) False
Answer : (A)
30
``` A network with the subnet mask 255.255.255.0 would have what CIDR block?​ (A) ​/20 (B) ​/24 (C) ​/28 (D) ​/32 ```
Answer : (B)
31
``` A network with 6 bits remaining for the host portion will have how many usable host addresses?​ (A) ​254 (B) ​126 (C) ​62 (D) ​30 ```
Answer : (C)
32
``` A single switch can manage traffic belonging to several VLANs on a single interface, by configuring which option on the interface?​ (A) ​A router (B) A trunk port (C) An access port (D) A VLAN port ```
Answer : (B)
33
``` What type of VLAN automatically receives all untagged frames?​ (A) ​Default VLAN (B) Native VLAN (C) ​Mirrored VLAN (D) ​Untagged VLAN ```
Answer : (B)
34
How can VLAN hopping attacks be prevented on a network?​ (A) ​Install an additional switch to isolate traffic. (B) ​Disable auto trunking and move native VLANs to unused VLANs. (C) ​Install a router to process the untagged traffic on the VLAN. (D) ​Use MAC address filtering.
Answer : (B)
35
``` The first iteration of STP was defined in what IEEE standard below?​ (A) ​802.3d (B) ​802.1d (C) ​802.11s (D) ​802.1c ```
Answer : (B)
36
``` STP selects the root bridge based on which parameter?​ (A) ​port number (B) ​bridge ID (BID) (C) ​bridge version number (BVN) (D) ​software revision code ```
Answer : (B)
37
``` Telnet and SSH are known as what type of management system?​ (A) ​out-of-band (B) ​in-band C) ​side-band (D) ​external-band ```
Answer : (B)
38
``` With VTP, the VLAN database is stored on a switch known as which option below?​ (A) ​root bridge (B) ​stack master (C) ​trunk root (D) ​vlan server ```
Answer : (B)
39
``` In order to allow communication between VLANs for exchange of data, what must be used?​ (A) ​a firewall (B) ​a switch (C) ​a router (D) ​a root bridge ```
Answer : (C)
40
``` What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?​ (A) ​802.1c (B) ​802.1Q (C) ​802.1V (D) ​802.1d ```
Answer : (B)
41
Which of the following is not a valid reason for using virtualization?​ (A) increase performance (B) ​save money by purchasing few machines (C) ​simplify backups and recovery (D) ​efficient use of resources
Answer : (A)
42
``` ​Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24? (A) ​255.255.255.0 (B) ​255.255.252.0 (C) ​255.255.255.128 (D) ​255.255.240.0 ```
Answer : (B)
43
``` In an IPv6 address, the first 64 bits of the address are known as what?​ (A) ​host prefix (B) ​equipment ID (C) ​routing prefix (D) ​prefix mask ```
Answer : (C)
44
``` ​Which network type allows a vNIC to access a network directly using the host machine's NIC? (A) ​bridged mode (B) ​NAT mode (C) ​host only mode (D) ​direct mode ```
Answer : (A)
45
``` ​What protocol is used to provide a common language between virtualized service applications and a network's physical devices? (A) ​VRRP (B) ​OpenFlow (C) ​CommonStack (D) ​OpenArch ```
Answer : (B)
46
``` The Shortest Path Bridging protocol is defined in what IEEE standard?​ (A) ​802.1d (B) ​802.1aq (C) ​802.1Q (D) ​802.1s ```
Answer : (B)
47
``` The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as? (A) ​in-band management (B) ​out-of-band management (C) ​open management (D) ​side channel management ```
Answer : (B)
48
``` A CIDR block of /26 is equivalent to what subnet mask below? (A) ​255.255.192.0 (B) ​255.255.254.0 (C) ​255.255.255.192 (D) ​255.255.0.0 ```
Answer : (C)
49
``` ​Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network? (A) host-only mode​ (B) ​bridged mode (C) ​NAT mode (D) ​restricted mode ```
Answer : (A)
50
In ______________, a vNIC relies on the host machine to act as a NAT device.
​Answer : NAT mode
51
A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a _________________.​
Answer : DHCP relay agent
52
A switch is typically preconfigured with one _______________ that includes all its ports.
Answer : default VLAN
53
A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.​
Answer : VLAN hopping attack
54
To eliminate the possibility of traffic loops on switches and bridges, the ________________ is used.
Answer : Spanning Tree Protocol (STP)
55
True or False: A network administrator might separate traffic in order to enhance security.
Answer: True
56
CIDR notation takes the network ID or a host’s IP address and follows it with a _____, followed by the number of bits used for the network ID. a. \ b. ! c. / d. *
Answer: C
57
With _____, you can combine contiguous networks that all use the same CIDR block.
Answer: supernetting
58
True or False: Subnet masks are only used in IPv4 classful addressing.
Answer: False
59
True or False: There are no IPv6 equivalents to IPv4’s Class A, Class B, or Class C networks.
Answer: True
60
True or False: Virtualization is the emulation of a computer, operating system environment, or application on a physical system.
Answer: True
61
A _____ is a logically defined device that operates at the Data Link layer to pass frames between the nodes.
Answer: virtual switch
62
True or False: VMs that must be available at a specific address, such as mail servers or Web servers, should be assigned host-only network connections.
Answer: False
63
In _____ networking mode, VMs on one host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host. a. host-only b. bridged c. NAT d. network-only
Answer: A
64
Which IEEE standard specifies how VLAN information appears in frames and how switches interpret that information? a. 802.16 b. 802.1Q c. 802.11ac d. 802.3
Answer: B
65
``` How many bits of a Class A IP address are used for host information? A. 8 bits B. 16 bits C. 24 bits D. 32 bits ```
Answer: C. 24 bits
66
``` What is the formula for determining the number of possible hosts on a network? A. 2n = Y B. 2n – 2 = Y C. 2h = Z D. 2h – 2 = Z ```
Answer: D. 2h – 2 = Z
67
Which of the following is not a good reason to subnet a network? A. To reduce the number of hosts on the same network B. To increase the number of unique networks available C. To reduce the number of routing table entries by combining several entries D. To segment a network
Answer: C. To reduce the number of routing table entries by combining several entries
68
``` What is the software that allows you to define VMs and manage resource allocation and sharing among them? A. Host B. Guest C. Switch D. Hypervisor ```
Answer: D. Hypervisor
69
``` What virtual, logically defined device operates at the Data Link layer to pass frames between nodes? A. Virtual bridge B. Virtual firewall C. Virtual switch D. Virtual router ```
Answer: C. Virtual switch
70
``` With which network connection type does the VM obtain IP addressing information from its host? A. Bridged mode B. Managed mode C. NAT mode D. Host-only mode ```
Answer: C. NAT mode
71
``` Which protocol assigns a virtual IP to a group of routers? A. VTP B. VRRP C. SDN D. STP ```
Answer: B. VRRP
72
While designing your network’s VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need? A. DHCP server B. Hypervisor C. DHCP relay agent D. Subnet mask
Answer: C. DHCP relay agent
73
``` Which port on a switch manages traffic for multiple VLANs? A. Access port B. Console port C. Serial port D. Trunk port ```
Answer: D. Trunk port
74
Telnet and SSH are called __________________ systems because they use the existing network and its protocols to interface with the switch. A. Virtual terminal B. Management console C. In-band management D. Switch port security
Answer: C. In-band management
75
What is the network ID with CIDR notation for the IP address 172.16.32.108 with the subnet mask 255.255.255.0?
Answer: 172.16.32.0/24
76
Suppose you have leased two Class C licenses, 115.100.10.0 and 115.100.11.0. You want to use all these Class C IP addresses in one supernet. What is the CIDR notation for this supernet? What is its supernet mask?
Answer: 115.100.10.0/23, 255.255.254.0
77
Suppose your company has leased one Class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?
Answer: 120.10.10.0/25, 255.255.255.128
78
What are four advantages to using virtualization on a network?
Answer: Efficient use of resources Cost and energy savings Fault and threat isolation Simple backups, recovery, and replication
79
ow does a vNIC get a MAC address?
Answer: Upon creation, each vNIC is automatically assigned a MAC address
80
ubnetting operates at Layer ___ while VLANs function at Layer ___.
Answer: 3; 2
81
Which VLAN on a switch manages untagged frames?
Answer: Native VLAN
82
An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?
Answer: VLAN hopping Answer: The ISP’s STP-related topology information shouldn’t be mixed with a corporate network’s STP-related topology information.
83
Why is a BPDU filter needed at the demarc point?
Answer: The ISP’s STP-related topology information shouldn’t be mixed with a corporate network’s STP-related topology information.
84
Only one ___________________ exists on a network using STP.
Answer: root bridge
85
What Boolean function is used to derive the network address by combining the IP address with the subnet mask? a. NAND b. AND c. OR d. NOT
b. AND
86
Why are WORKSTATION1 and WORKSTATION2 no longer able to communicate? a. They have different IP addresses. b. They are on different networks. c. TCP/IP was uninstalled on WORKSTATION2. d. The ping command can be used only once.
b. They are on different networks.
87
Which of the following is not an advantage of subnetting? a. Enhanced network security b. More hosts per network c. Improved network performance d. Simplified network troubleshooting
b. More hosts per network
88
How is subnetting accomplished? a. By changing the subnet mask on the host computers b. By changing the IP address on the host computers c. By installing the subnet protocol d. By installing a router running DHCP
a. By changing the subnet mask on the host computers
89
What is the default subnet mask for a Class C network? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255
c. 255.255.255.0
90
What is the purpose of the default gateway? a. To assign IP addresses to clients as soon as they log on to the network b. To ensure that no two nodes on the same subnet have identical TCP/IP addresses c. To accept and relay packets from nodes on one network destined for nodes on another network d. To advertise the best, current routing paths between networks from one router to another
c. To accept and relay packets from nodes on one network destined for nodes on another network
91
Which of the following is most likely to act as a default gateway? a. Modem b. Hub c. Switch d. Router
d. Router
92
What type of information would the netstat –r command yield when typed at the command prompt of a networked client? a. A list of all routers to which that client might connect b. A list of the client’s NIC adapter IP addresses c. The client’s routing table d. The client’s TCP/IP settings
c. The client’s routing table
93
What is the default subnet mask for a Class B network in the IP version 4 addressing scheme? a. 255.255.0.0 b. 255.255.255.0 c. 255.255.255.255 d. 0.0.0.0
a. 255.255.0.0
94
Which of the following utilities can show the route a packet traverses between its source node and destination node on a network? a. Ping b. Nbtstat c. Netstat d. Tracert
d. Tracert
95
A virtual network adapter operates at which layer of the OSI model? a. Data Link b. Transport c. Session d. Network
a. Data Link
96
In ______ mode the virtualization software acts as a DHCP server. a. NAT b. Host-only c. Server-only d. Bridged
a. NAT
97
The physical machine running the virtualization software is called a _____. a. Host b. Client c. Hypervisor d. Guest
a. Host
98
The most widely used virtualization software in use today is made by ______. a. Microsoft b. Oracle c. Citrix d. VMware
d. VMware