Chapter 5 Network Design Elements Review Flashcards

1
Q

Which of the following statements best describes a static NAT?

A. Static NAT uses a one-to-one mapping
B. Static NAT uses a many-to many mapping
C. Static NAT uses a one-to-many mapping
D. Static NAT uses a many-to-one mapping

A

A. Static NAT uses a one-to-one mapping

Static network address translation normally uses a one-to-one mapping with dealing with IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You receive complaints about network connectivity being disrupted. You suspect that a user connected both ends of a network cable to different ports on a switch. What can be done to prevent this?

A. Loop protection
B. DMZ
C. VLAN segregation
D. Port forwarding

A

A. Loop protection (STP- Spanning Tree Protocol)

Loop protection should be enabled on the switch to prevent the looping that can occur when a person connects both ends of a network cable to the same switch. VLAN segregation is a way of preventing ARP poisoning. Port forwarding refers to logical ports associated with protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following cloud computing services offers easy to configure operating systems?

A. SaaS
B. IaaS
C. PaaS
D. VM

A

C. PaaS

Platform as a Service is a cloud computing service that offers many software solutions, including easy to configure operating systems and on demand computing.
Software as a Service (SaaS) is used to to offer solutions such as webmail
Infrastructure as a Service (IaaS) is used for networking and storage. VM stands for virtual machine, which is something PaaS also offers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your network uses the subnet mask 255.255.255.224. Which of the following IPv4 addresses are able to communicate with each other? (Select the two best answers.)

A.  10.36.36.126
B.  10.36.36.158
C.  10.36.36.166
D.  10.36.36.184
E.  10.36.36.224
A

C. 10.36.36.166
D. 10.36.36.184 would be able to communicate with each other because they are on the same subnet (known as subnet ID 5).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your boss (the IT director) want to move several internally developed software applications to an alternate environment, supported by a third-party, in an effort to reduce the footprint of the server room. Which of the following is the IT director proposing?

A. PaaS
B. IaaS
C. SaaS
D. Community cloud

A

B. IaaS

A cloud based service, IaaS is often used to house servers (within virtual machines) that store developed applications. It differs from PaaS in that it is the servers, and already developed applications, that are bing moved from the server room to the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In your organization’s network you have VOIP phones and PCs connected to the same switch. Which of the following is the best way to logically separate these devices types while still allowing traffic between then via an ACL?

A. Install a firewall and connect it to the switch
B. Create and define two subnets, configure each device and use a dedicated IP address , and then connect the whole network to a router.
C. Install a firewall and connect it to a dedicated switch for each type of device
D. Create two VLANs on the switch connect to a router.

A

D. Create two VLANs on the switch connect to a router.

Creating two VLANs on the switch, one for the VoIP phones and the other for the PCs and make sure that the switch is connect to the router. Configure access control lists (ACL) as necessary on the router to allow or disallow connectivity and traffic between the two VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your organization uses VoIP. Which of the following should be performed to increase the availability of IP telephony by prioritizing traffic?

A. NAT
B. QoS
C. NAC
D. Subnetting

A

B. QoS

Quality of Service should be configured on the router to prioritize traffic, promoting IP telephony traffic to be more available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have been tasked with segmenting internal traffic between layer 2 devices on the LAN. Which of the following network design elements would most likely be used?

A. VLAN
B. DMZ
C. NAT
D. Routing

A

A. VLAN

Virtual LAN would allow you to segment internal traffic within layer 2 of the OSI Model, by using either a protocol-based scheme or a port-based scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly