Exam 10: Network Segmentation and Virtualization

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group?

(Multiple Choice)
4.9/5
(32)

The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.

(True/False)
4.8/5
(41)

Matching Match each correct item with the statement below. -In CIDR notation,the forward slash plus thenumber of bits used for the network ID.For example,theCIDR block for 199.34.89.0/22 is /22.

(Multiple Choice)
4.8/5
(38)

A single switch can manage traffic belonging to several VLANs on a single interface,by configuring which option on the interface?

(Multiple Choice)
4.9/5
(43)

Matching Match each correct item with the statement below. -A server that exists as a virtual machine,createdand managed by virtualization software on a host,orphysical,computer.

(Multiple Choice)
4.9/5
(44)

Matching Match each correct item with the statement below. -The virtualization ofnetwork services in which a network controller managesthese services instead of the services being directly managedby the hardware devices involved.

(Multiple Choice)
4.7/5
(31)

In ______________,a vNIC relies on the host machine to act as a NAT device.

(Short Answer)
4.9/5
(33)

Because Layer 2 switches use MAC addresses for communication,and each port is assigned a MAC address,VLANs are considered a Layer 2 solution for segmenting a network.

(True/False)
4.8/5
(28)

Matching Match each correct item with the statement below. -An untagged VLAN on a switch that will automaticallyreceive all untagged frames.Options for nativeVLANs vary according to the switch manufacturer andmodel.

(Multiple Choice)
4.9/5
(26)

STP selects the root bridge based on which parameter?

(Multiple Choice)
4.8/5
(34)

The Shortest Path Bridging protocol is defined in what IEEE standard?

(Multiple Choice)
4.9/5
(30)

Matching Match each correct item with the statement below. -A software configuration that can be used todisable STP on specific ports,such as the port leading to thenetwork's demarc.It prevents access to networklinks that should not be considered when plotting STP pathsin a network.

(Multiple Choice)
4.9/5
(38)

Which virtual network type allows VMs to communicate with each other on the same host,but disallows communication with other nodes on the network?

(Multiple Choice)
4.8/5
(26)

Matching Match each correct item with the statement below. -Cisco's proprietarystandard,similar to VRRP,that assigns a virtual IP address toa group of routers.At first,messages routed to the virtual IPaddress are handled by the active router.If the active routerfails,standby routers stand in line to take over responsibilityfor the virtual IP address.

(Multiple Choice)
4.7/5
(30)

What two items make up a Bridge ID?

(Multiple Choice)
4.8/5
(43)

Which network type allows a vNIC to access a network directly using the host machine's NIC?

(Multiple Choice)
4.8/5
(33)

What are some reasons to use VLANs?

(Essay)
4.8/5
(41)

A network with the subnet mask 255.255.255.0 would have what CIDR block?

(Multiple Choice)
4.9/5
(32)

The management option that can provide on-site infrastructure access when the network is downor completeremote access in cases of connectivity failures on the network,such as via a cellularsignal,is known as?

(Multiple Choice)
4.8/5
(41)

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

(Multiple Choice)
5.0/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)