Exam 10: Network Segmentation and Virtualization
What two standards below have been developed to replace the Spanning Tree Protocol?
A,B
A network with 6 bits remaining for the host portion will have how many usable hosts?
C
Provide three reasons why a network administrator might separate traffic.
A network administrator might separate traffic to accomplishthe following:
Enhance security-Broadcast domains are limited to each network so there's less possibilityof hackers or malware reaching remote,protected networks in the enterprisedomain.Improve performance-Segmenting limits broadcast traffic by decreasing the size ofeach broadcast domain.The more efficient use of bandwidth results in better overallnetwork performance.Simplify troubleshooting-When troubleshooting,rather than examining the wholenetwork for errors or bottlenecks,the network administrator can narrow down theproblem area to a particular smaller network.For example,suppose a network is subdividedwith separate smaller networks for accounting,human resources,and IT.Oneday there's trouble transmitting data only to a certain group of users-those on theaccounting network.This fact gives the network administrator some significant insightinto the nature of the problem.
In an IPv6 address,the first 64 bits of the address are known as what?
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24,192.168.1.0/24,192.168.2.0/24,192.168.3.0/24?
What type of VLAN automatically receives all untagged frames?
With VTP,the VLAN database is stored on a switch known as which option below?
Matching
Match each correct item with the statement below.
-The interface on a switch used for an end node.Devices connected to access ports are unaware of VLANinformation.
A _________________ occurs when an attacker generates transmissions that appear,to the switch,to belong to a protected VLAN.
What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
To eliminate the possibility of traffic loops on switches and bridges,the ________________ is used.
A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a _________________.
A switch is typically preconfigured with one _______________ that includes all its ports.
Telnet and SSH are known as what type of management system?
Matching
Match each correct item with the statement below.
-A standardthat assigns a virtual IP address to a group of routers.Atfirst,messages routed to the virtual IP address are handledby the master router.If the master router fails,backup routersstand in line to take over responsibility for the virtual IPaddress.
Matching
Match each correct item with the statement below.
-The interface on a switch capable of managingtraffic from multiple VLANs.A trunk is a link configuredbetween two switches' trunk ports.
The Spanning Tree Protocol stipulates that on any bridge,only one root port,which is the bridge's port that is closest to the root bridge,can forward frames toward the root bridge.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)