Deck 10: Network Segmentation and Virtualization
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 10: Network Segmentation and Virtualization
1
What type of VLAN automatically receives all untagged frames?
A)Default VLAN
B)Native VLAN
C)Mirrored VLAN
D)Untagged VLAN
A)Default VLAN
B)Native VLAN
C)Mirrored VLAN
D)Untagged VLAN
B
2
With VTP,the VLAN database is stored on a switch known as which option below?
A)root bridge
B)stack master
C)trunk root
D)vlan server
A)root bridge
B)stack master
C)trunk root
D)vlan server
B
3
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
A)802.1c
B)802.1Q
C)802.1V
D)802.1d
A)802.1c
B)802.1Q
C)802.1V
D)802.1d
B
4
Which network type allows a vNIC to access a network directly using the host machine's NIC?
A)bridged mode
B)NAT mode
C)host only mode
D)direct mode
A)bridged mode
B)NAT mode
C)host only mode
D)direct mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A network with the subnet mask 255.255.255.0 would have what CIDR block?
A)/20
B)/24
C)/28
D)/32
A)/20
B)/24
C)/28
D)/32
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Only Class B and Class C networks can be subnetted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In an IPv6 address,the first 64 bits of the address are known as what?
A)host prefix
B)equipment ID
C)routing prefix
D)prefix mask
A)host prefix
B)equipment ID
C)routing prefix
D)prefix mask
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Network segmentation decreases both performance and security on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Because Layer 2 switches use MAC addresses for communication,and each port is assigned a MAC address,VLANs are considered a Layer 2 solution for segmenting a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Telnet and SSH are known as what type of management system?
A)out-of-band
B)in-band
C)side-band
D)external-band
A)out-of-band
B)in-band
C)side-band
D)external-band
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The first iteration of STP was defined in what IEEE standard below?
A)802.3d
B)802.1d
C)802.11s
D)802.1c
A)802.3d
B)802.1d
C)802.11s
D)802.1c
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not a valid reason for using virtualization?
A)increase performance
B)save money by purchasing few machines
C)simplify backups and recovery
D)efficient use of resources
A)increase performance
B)save money by purchasing few machines
C)simplify backups and recovery
D)efficient use of resources
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
How can VLAN hopping attacks be prevented on a network?
A)Install an additional switch to isolate traffic.
B)Disable auto trunking and move native VLANs to unused VLANs.
C)Install a router to process the untagged traffic on the VLAN.
D)Use MAC address filtering.
A)Install an additional switch to isolate traffic.
B)Disable auto trunking and move native VLANs to unused VLANs.
C)Install a router to process the untagged traffic on the VLAN.
D)Use MAC address filtering.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The Spanning Tree Protocol stipulates that on any bridge,only one root port,which is the bridge's port that is closest to the root bridge,can forward frames toward the root bridge.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A single switch can manage traffic belonging to several VLANs on a single interface,by configuring which option on the interface?
A)A router
B)A trunk port
C)An access port
D)A VLAN port
A)A router
B)A trunk port
C)An access port
D)A VLAN port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
In order to allow communication between VLANs for exchange of data,what must be used?
A)a firewall
B)a switch
C)a router
D)a root bridge
A)a firewall
B)a switch
C)a router
D)a root bridge
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24,192.168.1.0/24,192.168.2.0/24,192.168.3.0/24?
A)255.255.255.0
B)255.255.252.0
C)255.255.255.128
D)255.255.240.0
A)255.255.255.0
B)255.255.252.0
C)255.255.255.128
D)255.255.240.0
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
STP selects the root bridge based on which parameter?
A)port number
B)bridge ID (BID)
C)bridge version number (BVN)
D)software revision code
A)port number
B)bridge ID (BID)
C)bridge version number (BVN)
D)software revision code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A network with 6 bits remaining for the host portion will have how many usable hosts?
A)254
B)126
C)62
D)30
A)254
B)126
C)62
D)30
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
A)VRRP
B)OpenFlow
C)CommonStack
D)OpenArch
A)VRRP
B)OpenFlow
C)CommonStack
D)OpenArch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group? (Choose two.)
A)VRRP
B)GBRP
C)HSRP
D)CARP
A)VRRP
B)GBRP
C)HSRP
D)CARP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A standardthat assigns a virtual IP address to a group of routers.Atfirst,messages routed to the virtual IP address are handledby the master router.If the master router fails,backup routersstand in line to take over responsibility for the virtual IPaddress.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A standardthat assigns a virtual IP address to a group of routers.Atfirst,messages routed to the virtual IP address are handledby the master router.If the master router fails,backup routersstand in line to take over responsibility for the virtual IPaddress.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A _________________ occurs when an attacker generates transmissions that appear,to the switch,to belong to a protected VLAN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
In ______________,a vNIC relies on the host machine to act as a NAT device.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?
A)vID
B)SAID
C)security association identifier
D)VMAC
A)vID
B)SAID
C)security association identifier
D)VMAC
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a _________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The virtualization ofnetwork services in which a network controller managesthese services instead of the services being directly managedby the hardware devices involved.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The virtualization ofnetwork services in which a network controller managesthese services instead of the services being directly managedby the hardware devices involved.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The Shortest Path Bridging protocol is defined in what IEEE standard?
A)802.1d
B)802.1aq
C)802.1Q
D)802.1s
A)802.1d
B)802.1aq
C)802.1Q
D)802.1s
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A software configuration that can be used todisable STP on specific ports,such as the port leading to thenetwork's demarc.It prevents access to networklinks that should not be considered when plotting STP pathsin a network.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A software configuration that can be used todisable STP on specific ports,such as the port leading to thenetwork's demarc.It prevents access to networklinks that should not be considered when plotting STP pathsin a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What two standards below have been developed to replace the Spanning Tree Protocol?
A)TRILL
B)SPB
C)VSRP
D)HSRP
A)TRILL
B)SPB
C)VSRP
D)HSRP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A CIDR block of /26 is equivalent to what subnet mask below?
A)255.255.192.0
B)255.255.254.0
C)255.255.255.192
D)255.255.0.0
A)255.255.192.0
B)255.255.254.0
C)255.255.255.192
D)255.255.0.0
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A server that exists as a virtual machine,createdand managed by virtualization software on a host,orphysical,computer.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A server that exists as a virtual machine,createdand managed by virtualization software on a host,orphysical,computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The management option that can provide on-site infrastructure access when the network is downor completeremote access in cases of connectivity failures on the network,such as via a cellularsignal,is known as?
A)in-band management
B)out-of-band management
C)open management
D)side channel management
A)in-band management
B)out-of-band management
C)open management
D)side channel management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which virtual network type allows VMs to communicate with each other on the same host,but disallows communication with other nodes on the network?
A)host-only mode
B)bridged mode
C)NAT mode
D)restricted mode
A)host-only mode
B)bridged mode
C)NAT mode
D)restricted mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An attack in which the attacker generatestransmissions that appear,to the switch,to belong to aprotected VLAN.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An attack in which the attacker generatestransmissions that appear,to the switch,to belong to aprotected VLAN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
To eliminate the possibility of traffic loops on switches and bridges,the ________________ is used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A switch is typically preconfigured with one _______________ that includes all its ports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What two items make up a Bridge ID?
A)2 byte priority field
B)MAC address
C)relevant port number
D)software version
A)2 byte priority field
B)MAC address
C)relevant port number
D)software version
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which two standards below represent newer versions of STP?
A)802.1d
B)802.1f
C)802.1w
D)802.1s
A)802.1d
B)802.1f
C)802.1w
D)802.1s
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Provide three reasons why a network administrator might separate traffic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How is centralized management of wireless networks made possible?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch used for an end node.Devices connected to access ports are unaware of VLANinformation.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch used for an end node.Devices connected to access ports are unaware of VLANinformation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
Cisco's proprietarystandard,similar to VRRP,that assigns a virtual IP address toa group of routers.At first,messages routed to the virtual IPaddress are handled by the active router.If the active routerfails,standby routers stand in line to take over responsibilityfor the virtual IP address.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
Cisco's proprietarystandard,similar to VRRP,that assigns a virtual IP address toa group of routers.At first,messages routed to the virtual IPaddress are handled by the active router.If the active routerfails,standby routers stand in line to take over responsibilityfor the virtual IP address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
In CIDR notation,the forward slash plus thenumber of bits used for the network ID.For example,theCIDR block for 199.34.89.0/22 is /22.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
In CIDR notation,the forward slash plus thenumber of bits used for the network ID.For example,theCIDR block for 199.34.89.0/22 is /22.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch capable of managingtraffic from multiple VLANs.A trunk is a link configuredbetween two switches' trunk ports.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch capable of managingtraffic from multiple VLANs.A trunk is a link configuredbetween two switches' trunk ports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the difference between a default VLAN and a native VLAN?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are some reasons to use VLANs?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An untagged VLAN on a switch that will automaticallyreceive all untagged frames.Options for nativeVLANs vary according to the switch manufacturer andmodel.
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An untagged VLAN on a switch that will automaticallyreceive all untagged frames.Options for nativeVLANs vary according to the switch manufacturer andmodel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
How does STP work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck