1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
SANs use the same IP technologies as standard IT networks.
False
What needs to be configured on a network to allow routers, firewalls, or layer 3 switches to forward UDP traffic across broadcast domains and enable centralization of key network services?
UDP forwarding
When traffic moves between two VLANs, it must pass through a router. What is the term for this process?
inter-VLAN routing
This logical appliance provides filtered and protected access from resources in the private subnet to services on the Internet. However, Internet-based resources are not able to initiate contact with the private subnet or access the protected resources directly. What is this logical appliance called?
NAT gateway
In this configuration error, a group of nodes was added to a VLAN, but the rest have been cut off from the network. What type of configuration error is this?
VLAN isolation
A benefit of cloud hosted resources is that a company can put those resources anywhere in the world in regions that are closest to the point of use.
True
How many subnets can the subnet mask 255.255.255.240 create?
16
Which type of VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency?
voice
In a storage area network (SAN), storage drives are located in one or more separate devices, possibly even in a different rack or a different room. The network connections between servers and SAN devices must support extremely high data throughput. To maximize throughput, SAN storage relies on specific networking technologies. What are these technologies? Choose all that apply.
a. FC (Fibre Channel)
b. BNC Ethernet
c. FCoE (Fibre Channel over Ethernet)
d. iSCSI (Internet SCSI)
- FC (Fibre Channel)
- FCoE (Fibre Channel over Ethernet)
- iSCSI (Internet SCSI)
If one storage device within a storage area network (SAN) suffers a fault, data is automatically retrieved from elsewhere in the SAN. If one connection in a SAN suffers a failure, another connection is in place to handle network traffic. What is this technique called?
multipathing
What is the purpose of a content delivery network (CDN)? Choose all that apply.
- reduces latency
- delivers data closer to the user
When calculating subnets either manually or by using subnet tables, the following types of information will be needed. Some of this information is initially known, while some of it must be determined: If the number of subnets and the number of host addresses per subnet is known, what else must be determined? Choose all that apply.
network ID for each subnet
number of routers per subnet
broadcast address for each subnet
range of host addresses
- broadcast address for each subnet
- network ID for each subnet
- range of host addresses
Which type of VLAN is typically preconfigured on a switch and initially includes all the switch's ports?
default
What is the term for a resource requiring detailed zoning and object-level security?
micro-segmentation
Edge computing runs compute resources in physical locations closer to the user, and often, this data and compute caching happen on edge devices rather than on traditional servers.
True
What do the last four blocks (64 bits) identify in an IPv6 address?
host interface
Enlarged headers are necessary to support VXLANs, as they require a much larger message on the network than the standard 1500-byte message defined by the MTU (maximum transmission unit). How do networks manage these larger messages?
networks supporting VXLANs must be configured with a larger MTU
Which subnet mask is used for a class B network?
11111111 11111111 00000000 00000000
Which type of VLAN carries user-generated traffic, such as email, web browsing, or database updates?
data
Hackers sometimes take advantage of the way VLANs are tagged to implement an attack. The attacker generates transmissions that, to the switch, appear to belong to a protected VLAN, then cross VLANs to access sensitive data or inject harmful software. What is this attack called?
VLAN hopping
What are some ways to mitigate VLAN hopping and enhance network segmentation? Choose all that apply.
Configure all ports as trunk ports on switches that carry traffic from multiple VLANs.
Do not use the default VLAN.
Disable auto - trunking.
Change the native VLAN to an unused VLAN ID
Do not use the default VLAN.
Disable auto-trunking.
Change the native VLAN to an unused VLAN ID.
Which layers of the OSI model play a part in network segmentation? Choose from the list below.
7. Application Layer 6. Presentation Layer
5. Session Layer 4. Transport Layer
3. Network Layer 2. Data-Link Layer
1. Physical Layer
3, 2, 1
Variable Length Subnet Mask (VLSM) is an efficient way to define IP address spaces on a network. However, in reality, it is not a good idea to configure subnets so tightly. Why is it not recommended to configure subnets so tightly? Choose all that apply.
routers cannot function properly
network addresses may overlap
possible address pool exhaustion
little room for future growth
possible address pool exhaustion
little room for future growth
Segmentation is crucial for cloud network security, and it can be achieved through subnet configuration. What are the different types of subnets? Choose all that apply.
IG subnet
private subnet
NAT subnet
public subnet
private subnet
public subnet
What is the most popular protocol for exchanging VLAN information over trunks?
Cisco's VTP (VLAN Trunk Protocol)
Operational Technology (OT) specialists often focus on different priorities than Information Technology (IT) specialists, as they involve varying levels of certain types of risks. How are OT risks defined?
physical systems' vulnerabilities in response to interruptions caused by a breach
Jason's company has purchased a new building and will be relocating part of the marketing and engineering teams to it. Jason wants to ensure that the departments will have access to the same resources as those in the original building. How should Jason set up the office network in the new building?
managed switches with VLANs
Howard was speaking with his IT manager when the subject arose regarding VLANs. The company was about to add at least two VLANs due to expansion. Howard, who is new to VLANs, asked his IT manager which type of VLANs pose the greatest security risk. Which VLANs did the IT manager pick? Choose all that apply.
Data VLAN
Native VLAN
Voice VLAN
Management VLAN
- Management VLAN
- Native VLAN
Sandy has an internal /24 network. Their address starts at 192.198.120.0 and ends at 192.198.120.255. In order, what do the numbers 0 and 255 stand for?
network address (Network ID) and broadcast address
A VLAN configuration error can occur for various reasons, such as connecting a device to the wrong switch port or misconfiguring the client authentication process, resulting in the allocation of a VLAN to a device before the authentication process is complete. What type of configuration error is this?
incorrect VLAN assignment
Daniel's company just switched over to AWS services EC2 cloud instance. He needs to work remotely, on a host server in their private subnet, but there is a NAT gateway set up within the company's EC2 cloud. How can Daniel work remotely while having the NAT gateway in place?
Create a bastion host/jump box, in the public subnet.
What type of data storage systems do small networks rely on? Choose all that apply.
storage area network (SAN)
redundant array of inexpensive disks (RAID)
network attached storage (NAS)
common network file system (CIFS)
network attached storage (NAS) ONLY ONE THAT IS FOR SURE RIGHT
redundant array of inexpensive disks (RAID)
common network file system (CIFS)
A computer is connected to a switch port and then to a server on another switch port, but the computer is not connecting properly to the server. What could the error be?
incorrect port mode
George is planning a new network and is going to put all his servers in one rack and keep the broadcast traffic to a minimum. What is the best way for George to accomplish this goal?
put servers into one network segment
What protocol does virtual extensible LAN (VXLAN) use to function at OSI layer 4?
UDP (User Datagram Protocol)
On which OSI layer does VLAN traffic traverse?
layer 2
When traffic from three VLANs reach a router, the router sees three logical LANs connected to a single router port. What is each of these logical interfaces on one physical interface called?
subinterface
The Internet is referred to by more than one zone name. What are those names? Choose all that apply.
trusted zone
untrusted zone
demilitarized zone
public zone
untrusted zone
public zone
How do VLAN clients receive the appropriate IP address assignments from the subnet's range of addresses portioned to each VLAN?
a. Run a DHCP server for the entire network and have each
subinterface configured with its own subnetted range of IP addresses.
b. Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet.
c. Have the router provide DHCP services with each subinterface
and use a DHCP relay agent to help sort DHCP requests
by subnet.
d. Have the router provide DHCP services with each subinterface
configured with its own subnetted range of IP addresses
Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet
How is subnetting in IPv6 simpler than subnetting in IPv4, and how does it differ from IPv4? Choose all that apply.
A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.
D) IPv6 works at a different level of the OSI model.
A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.