Deck 10: Network Segmentation and Virtualization

Full screen (f)
exit full mode
Question
What type of VLAN automatically receives all untagged frames?

A)Default VLAN
B)Native VLAN
C)Mirrored VLAN
D)Untagged VLAN
Use Space or
up arrow
down arrow
to flip the card.
Question
With VTP,the VLAN database is stored on a switch known as which option below?

A)root bridge
B)stack master
C)trunk root
D)vlan server
Question
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

A)802.1c
B)802.1Q
C)802.1V
D)802.1d
Question
Which network type allows a vNIC to access a network directly using the host machine's NIC?

A)bridged mode
B)NAT mode
C)host only mode
D)direct mode
Question
A network with the subnet mask 255.255.255.0 would have what CIDR block?

A)/20
B)/24
C)/28
D)/32
Question
Only Class B and Class C networks can be subnetted.
Question
In an IPv6 address,the first 64 bits of the address are known as what?

A)host prefix
B)equipment ID
C)routing prefix
D)prefix mask
Question
Network segmentation decreases both performance and security on a network.
Question
Because Layer 2 switches use MAC addresses for communication,and each port is assigned a MAC address,VLANs are considered a Layer 2 solution for segmenting a network.
Question
Telnet and SSH are known as what type of management system?

A)out-of-band
B)in-band
C)side-band
D)external-band
Question
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
Question
The first iteration of STP was defined in what IEEE standard below?

A)802.3d
B)802.1d
C)802.11s
D)802.1c
Question
Which of the following is not a valid reason for using virtualization?

A)increase performance
B)save money by purchasing few machines
C)simplify backups and recovery
D)efficient use of resources
Question
How can VLAN hopping attacks be prevented on a network?

A)Install an additional switch to isolate traffic.
B)Disable auto trunking and move native VLANs to unused VLANs.
C)Install a router to process the untagged traffic on the VLAN.
D)Use MAC address filtering.
Question
The Spanning Tree Protocol stipulates that on any bridge,only one root port,which is the bridge's port that is closest to the root bridge,can forward frames toward the root bridge.
Question
A single switch can manage traffic belonging to several VLANs on a single interface,by configuring which option on the interface?

A)A router
B)A trunk port
C)An access port
D)A VLAN port
Question
In order to allow communication between VLANs for exchange of data,what must be used?

A)a firewall
B)a switch
C)a router
D)a root bridge
Question
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24,192.168.1.0/24,192.168.2.0/24,192.168.3.0/24?

A)255.255.255.0
B)255.255.252.0
C)255.255.255.128
D)255.255.240.0
Question
STP selects the root bridge based on which parameter?

A)port number
B)bridge ID (BID)
C)bridge version number (BVN)
D)software revision code
Question
A network with 6 bits remaining for the host portion will have how many usable hosts?

A)254
B)126
C)62
D)30
Question
What protocol is used to provide a common language between virtualized service applications and a network's physical devices?

A)VRRP
B)OpenFlow
C)CommonStack
D)OpenArch
Question
Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group? (Choose two.)

A)VRRP
B)GBRP
C)HSRP
D)CARP
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A standardthat assigns a virtual IP address to a group of routers.Atfirst,messages routed to the virtual IP address are handledby the master router.If the master router fails,backup routersstand in line to take over responsibility for the virtual IPaddress.
Question
A _________________ occurs when an attacker generates transmissions that appear,to the switch,to belong to a protected VLAN.
Question
In ______________,a vNIC relies on the host machine to act as a NAT device.
Question
Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?

A)vID
B)SAID
C)security association identifier
D)VMAC
Question
A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a _________________.
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The virtualization ofnetwork services in which a network controller managesthese services instead of the services being directly managedby the hardware devices involved.
Question
The Shortest Path Bridging protocol is defined in what IEEE standard?

A)802.1d
B)802.1aq
C)802.1Q
D)802.1s
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A software configuration that can be used todisable STP on specific ports,such as the port leading to thenetwork's demarc.It prevents access to networklinks that should not be considered when plotting STP pathsin a network.
Question
What two standards below have been developed to replace the Spanning Tree Protocol?

A)TRILL
B)SPB
C)VSRP
D)HSRP
Question
A CIDR block of /26 is equivalent to what subnet mask below?

A)255.255.192.0
B)255.255.254.0
C)255.255.255.192
D)255.255.0.0
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A server that exists as a virtual machine,createdand managed by virtualization software on a host,orphysical,computer.
Question
The management option that can provide on-site infrastructure access when the network is downor completeremote access in cases of connectivity failures on the network,such as via a cellularsignal,is known as?

A)in-band management
B)out-of-band management
C)open management
D)side channel management
Question
Which virtual network type allows VMs to communicate with each other on the same host,but disallows communication with other nodes on the network?

A)host-only mode
B)bridged mode
C)NAT mode
D)restricted mode
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An attack in which the attacker generatestransmissions that appear,to the switch,to belong to aprotected VLAN.
Question
To eliminate the possibility of traffic loops on switches and bridges,the ________________ is used.
Question
A switch is typically preconfigured with one _______________ that includes all its ports.
Question
What two items make up a Bridge ID?

A)2 byte priority field
B)MAC address
C)relevant port number
D)software version
Question
Which two standards below represent newer versions of STP?

A)802.1d
B)802.1f
C)802.1w
D)802.1s
Question
Provide three reasons why a network administrator might separate traffic.
Question
How is centralized management of wireless networks made possible?
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch used for an end node.Devices connected to access ports are unaware of VLANinformation.
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
Cisco's proprietarystandard,similar to VRRP,that assigns a virtual IP address toa group of routers.At first,messages routed to the virtual IPaddress are handled by the active router.If the active routerfails,standby routers stand in line to take over responsibilityfor the virtual IP address.
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
In CIDR notation,the forward slash plus thenumber of bits used for the network ID.For example,theCIDR block for 199.34.89.0/22 is /22.
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch capable of managingtraffic from multiple VLANs.A trunk is a link configuredbetween two switches' trunk ports.
Question
What is the difference between a default VLAN and a native VLAN?
Question
What are some reasons to use VLANs?
Question
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An untagged VLAN on a switch that will automaticallyreceive all untagged frames.Options for nativeVLANs vary according to the switch manufacturer andmodel.
Question
How does STP work?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Network Segmentation and Virtualization
1
What type of VLAN automatically receives all untagged frames?

A)Default VLAN
B)Native VLAN
C)Mirrored VLAN
D)Untagged VLAN
B
2
With VTP,the VLAN database is stored on a switch known as which option below?

A)root bridge
B)stack master
C)trunk root
D)vlan server
B
3
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

A)802.1c
B)802.1Q
C)802.1V
D)802.1d
B
4
Which network type allows a vNIC to access a network directly using the host machine's NIC?

A)bridged mode
B)NAT mode
C)host only mode
D)direct mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A network with the subnet mask 255.255.255.0 would have what CIDR block?

A)/20
B)/24
C)/28
D)/32
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Only Class B and Class C networks can be subnetted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
In an IPv6 address,the first 64 bits of the address are known as what?

A)host prefix
B)equipment ID
C)routing prefix
D)prefix mask
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Network segmentation decreases both performance and security on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Because Layer 2 switches use MAC addresses for communication,and each port is assigned a MAC address,VLANs are considered a Layer 2 solution for segmenting a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Telnet and SSH are known as what type of management system?

A)out-of-band
B)in-band
C)side-band
D)external-band
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The first iteration of STP was defined in what IEEE standard below?

A)802.3d
B)802.1d
C)802.11s
D)802.1c
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not a valid reason for using virtualization?

A)increase performance
B)save money by purchasing few machines
C)simplify backups and recovery
D)efficient use of resources
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
How can VLAN hopping attacks be prevented on a network?

A)Install an additional switch to isolate traffic.
B)Disable auto trunking and move native VLANs to unused VLANs.
C)Install a router to process the untagged traffic on the VLAN.
D)Use MAC address filtering.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The Spanning Tree Protocol stipulates that on any bridge,only one root port,which is the bridge's port that is closest to the root bridge,can forward frames toward the root bridge.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A single switch can manage traffic belonging to several VLANs on a single interface,by configuring which option on the interface?

A)A router
B)A trunk port
C)An access port
D)A VLAN port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
In order to allow communication between VLANs for exchange of data,what must be used?

A)a firewall
B)a switch
C)a router
D)a root bridge
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24,192.168.1.0/24,192.168.2.0/24,192.168.3.0/24?

A)255.255.255.0
B)255.255.252.0
C)255.255.255.128
D)255.255.240.0
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
STP selects the root bridge based on which parameter?

A)port number
B)bridge ID (BID)
C)bridge version number (BVN)
D)software revision code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A network with 6 bits remaining for the host portion will have how many usable hosts?

A)254
B)126
C)62
D)30
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What protocol is used to provide a common language between virtualized service applications and a network's physical devices?

A)VRRP
B)OpenFlow
C)CommonStack
D)OpenArch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following describes a router protocol that is used to assign a virtual IP address to a group of routers so that the routers function as a group? (Choose two.)

A)VRRP
B)GBRP
C)HSRP
D)CARP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A standardthat assigns a virtual IP address to a group of routers.Atfirst,messages routed to the virtual IP address are handledby the master router.If the master router fails,backup routersstand in line to take over responsibility for the virtual IPaddress.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A _________________ occurs when an attacker generates transmissions that appear,to the switch,to belong to a protected VLAN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
In ______________,a vNIC relies on the host machine to act as a NAT device.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which two properties indicate to other connectivity devices which VLAN a transmission belongs to?

A)vID
B)SAID
C)security association identifier
D)VMAC
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a _________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The virtualization ofnetwork services in which a network controller managesthese services instead of the services being directly managedby the hardware devices involved.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The Shortest Path Bridging protocol is defined in what IEEE standard?

A)802.1d
B)802.1aq
C)802.1Q
D)802.1s
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A software configuration that can be used todisable STP on specific ports,such as the port leading to thenetwork's demarc.It prevents access to networklinks that should not be considered when plotting STP pathsin a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What two standards below have been developed to replace the Spanning Tree Protocol?

A)TRILL
B)SPB
C)VSRP
D)HSRP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A CIDR block of /26 is equivalent to what subnet mask below?

A)255.255.192.0
B)255.255.254.0
C)255.255.255.192
D)255.255.0.0
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
A server that exists as a virtual machine,createdand managed by virtualization software on a host,orphysical,computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The management option that can provide on-site infrastructure access when the network is downor completeremote access in cases of connectivity failures on the network,such as via a cellularsignal,is known as?

A)in-band management
B)out-of-band management
C)open management
D)side channel management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which virtual network type allows VMs to communicate with each other on the same host,but disallows communication with other nodes on the network?

A)host-only mode
B)bridged mode
C)NAT mode
D)restricted mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An attack in which the attacker generatestransmissions that appear,to the switch,to belong to aprotected VLAN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
To eliminate the possibility of traffic loops on switches and bridges,the ________________ is used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A switch is typically preconfigured with one _______________ that includes all its ports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What two items make up a Bridge ID?

A)2 byte priority field
B)MAC address
C)relevant port number
D)software version
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which two standards below represent newer versions of STP?

A)802.1d
B)802.1f
C)802.1w
D)802.1s
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Provide three reasons why a network administrator might separate traffic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How is centralized management of wireless networks made possible?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch used for an end node.Devices connected to access ports are unaware of VLANinformation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
Cisco's proprietarystandard,similar to VRRP,that assigns a virtual IP address toa group of routers.At first,messages routed to the virtual IPaddress are handled by the active router.If the active routerfails,standby routers stand in line to take over responsibilityfor the virtual IP address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
In CIDR notation,the forward slash plus thenumber of bits used for the network ID.For example,theCIDR block for 199.34.89.0/22 is /22.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
The interface on a switch capable of managingtraffic from multiple VLANs.A trunk is a link configuredbetween two switches' trunk ports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the difference between a default VLAN and a native VLAN?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are some reasons to use VLANs?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Matching
Match each correct item with the statement below.
a.access port
b.BPDU filter
c.CIDR block
d.HSRP (Hot Standby Routing Protocol)
e.native VLAN
f.software defined networking (SDN)
g.trunk port
h.virtual server
i.VLAN hopping attack
j.VRRP (Virtual Router Redundancy Protocol)
An untagged VLAN on a switch that will automaticallyreceive all untagged frames.Options for nativeVLANs vary according to the switch manufacturer andmodel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
How does STP work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.