chapter 8 quiz computer networks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

SANs use the same IP technologies as standard IT networks.

False

2
New cards

What needs to be configured on a network to allow routers, firewalls, or layer 3 switches to forward UDP traffic across broadcast domains and enable centralization of key network services?

UDP forwarding

3
New cards

When traffic moves between two VLANs, it must pass through a router. What is the term for this process?

inter-VLAN routing

4
New cards

This logical appliance provides filtered and protected access from resources in the private subnet to services on the Internet. However, Internet-based resources are not able to initiate contact with the private subnet or access the protected resources directly. What is this logical appliance called?

NAT gateway

5
New cards

In this configuration error, a group of nodes was added to a VLAN, but the rest have been cut off from the network. What type of configuration error is this?

VLAN isolation

6
New cards

A benefit of cloud hosted resources is that a company can put those resources anywhere in the world in regions that are closest to the point of use.

True

7
New cards

How many subnets can the subnet mask 255.255.255.240 create?

16

8
New cards

Which type of VLAN supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency?

voice

9
New cards

In a storage area network (SAN), storage drives are located in one or more separate devices, possibly even in a different rack or a different room. The network connections between servers and SAN devices must support extremely high data throughput. To maximize throughput, SAN storage relies on specific networking technologies. What are these technologies? Choose all that apply.
a. FC (Fibre Channel)
b. BNC Ethernet
c. FCoE (Fibre Channel over Ethernet)
d. iSCSI (Internet SCSI)

- FC (Fibre Channel)

- FCoE (Fibre Channel over Ethernet)

- iSCSI (Internet SCSI)

10
New cards

If one storage device within a storage area network (SAN) suffers a fault, data is automatically retrieved from elsewhere in the SAN. If one connection in a SAN suffers a failure, another connection is in place to handle network traffic. What is this technique called?

multipathing

11
New cards

What is the purpose of a content delivery network (CDN)? Choose all that apply.

- reduces latency

- delivers data closer to the user

12
New cards

When calculating subnets either manually or by using subnet tables, the following types of information will be needed. Some of this information is initially known, while some of it must be determined: If the number of subnets and the number of host addresses per subnet is known, what else must be determined? Choose all that apply.

network ID for each subnet
number of routers per subnet
broadcast address for each subnet
range of host addresses

- broadcast address for each subnet

- network ID for each subnet

- range of host addresses

13
New cards

Which type of VLAN is typically preconfigured on a switch and initially includes all the switch's ports?

default

14
New cards

What is the term for a resource requiring detailed zoning and object-level security?

micro-segmentation

15
New cards

Edge computing runs compute resources in physical locations closer to the user, and often, this data and compute caching happen on edge devices rather than on traditional servers.

True

16
New cards

What do the last four blocks (64 bits) identify in an IPv6 address?

host interface

17
New cards

Enlarged headers are necessary to support VXLANs, as they require a much larger message on the network than the standard 1500-byte message defined by the MTU (maximum transmission unit). How do networks manage these larger messages?

networks supporting VXLANs must be configured with a larger MTU

18
New cards

Which subnet mask is used for a class B network?

11111111 11111111 00000000 00000000

19
New cards

Which type of VLAN carries user-generated traffic, such as email, web browsing, or database updates?

data

20
New cards

Hackers sometimes take advantage of the way VLANs are tagged to implement an attack. The attacker generates transmissions that, to the switch, appear to belong to a protected VLAN, then cross VLANs to access sensitive data or inject harmful software. What is this attack called?

VLAN hopping

21
New cards

What are some ways to mitigate VLAN hopping and enhance network segmentation? Choose all that apply.

Configure all ports as trunk ports on switches that carry traffic from multiple VLANs.

Do not use the default VLAN.

Disable auto - trunking.

Change the native VLAN to an unused VLAN ID

Do not use the default VLAN.

Disable auto-trunking.

Change the native VLAN to an unused VLAN ID.

22
New cards

Which layers of the OSI model play a part in network segmentation? Choose from the list below.

7. Application Layer 6. Presentation Layer

5. Session Layer 4. Transport Layer

3. Network Layer 2. Data-Link Layer

1. Physical Layer

3, 2, 1

23
New cards

Variable Length Subnet Mask (VLSM) is an efficient way to define IP address spaces on a network. However, in reality, it is not a good idea to configure subnets so tightly. Why is it not recommended to configure subnets so tightly? Choose all that apply.

routers cannot function properly

network addresses may overlap

possible address pool exhaustion

little room for future growth

possible address pool exhaustion

little room for future growth

24
New cards

Segmentation is crucial for cloud network security, and it can be achieved through subnet configuration. What are the different types of subnets? Choose all that apply.

IG subnet

private subnet

NAT subnet

public subnet

private subnet

public subnet

25
New cards

What is the most popular protocol for exchanging VLAN information over trunks?

Cisco's VTP (VLAN Trunk Protocol)

26
New cards

Operational Technology (OT) specialists often focus on different priorities than Information Technology (IT) specialists, as they involve varying levels of certain types of risks. How are OT risks defined?

physical systems' vulnerabilities in response to interruptions caused by a breach

27
New cards

Jason's company has purchased a new building and will be relocating part of the marketing and engineering teams to it. Jason wants to ensure that the departments will have access to the same resources as those in the original building. How should Jason set up the office network in the new building?

managed switches with VLANs

28
New cards

Howard was speaking with his IT manager when the subject arose regarding VLANs. The company was about to add at least two VLANs due to expansion. Howard, who is new to VLANs, asked his IT manager which type of VLANs pose the greatest security risk. Which VLANs did the IT manager pick? Choose all that apply.

Data VLAN

Native VLAN

Voice VLAN

Management VLAN

- Management VLAN

- Native VLAN

29
New cards

Sandy has an internal /24 network. Their address starts at 192.198.120.0 and ends at 192.198.120.255. In order, what do the numbers 0 and 255 stand for?

network address (Network ID) and broadcast address

30
New cards

A VLAN configuration error can occur for various reasons, such as connecting a device to the wrong switch port or misconfiguring the client authentication process, resulting in the allocation of a VLAN to a device before the authentication process is complete. What type of configuration error is this?

incorrect VLAN assignment

31
New cards

Daniel's company just switched over to AWS services EC2 cloud instance. He needs to work remotely, on a host server in their private subnet, but there is a NAT gateway set up within the company's EC2 cloud. How can Daniel work remotely while having the NAT gateway in place?

Create a bastion host/jump box, in the public subnet.

32
New cards

What type of data storage systems do small networks rely on? Choose all that apply.

storage area network (SAN)

redundant array of inexpensive disks (RAID)

network attached storage (NAS)

common network file system (CIFS)

network attached storage (NAS) ONLY ONE THAT IS FOR SURE RIGHT

redundant array of inexpensive disks (RAID)

common network file system (CIFS)

33
New cards

A computer is connected to a switch port and then to a server on another switch port, but the computer is not connecting properly to the server. What could the error be?

incorrect port mode

34
New cards

George is planning a new network and is going to put all his servers in one rack and keep the broadcast traffic to a minimum. What is the best way for George to accomplish this goal?

put servers into one network segment

35
New cards

What protocol does virtual extensible LAN (VXLAN) use to function at OSI layer 4?

UDP (User Datagram Protocol)

36
New cards

On which OSI layer does VLAN traffic traverse?

layer 2

37
New cards

When traffic from three VLANs reach a router, the router sees three logical LANs connected to a single router port. What is each of these logical interfaces on one physical interface called?

subinterface

38
New cards

The Internet is referred to by more than one zone name. What are those names? Choose all that apply.

trusted zone
untrusted zone
demilitarized zone
public zone

untrusted zone
public zone

39
New cards

How do VLAN clients receive the appropriate IP address assignments from the subnet's range of addresses portioned to each VLAN?

a. Run a DHCP server for the entire network and have each
subinterface configured with its own subnetted range of IP addresses.

b. Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet.

c. Have the router provide DHCP services with each subinterface
and use a DHCP relay agent to help sort DHCP requests
by subnet.

d. Have the router provide DHCP services with each subinterface
configured with its own subnetted range of IP addresses

Run a DHCP server for the entire network and use a DHCP relay
agent to help sort DHCP requests by subnet

40
New cards

How is subnetting in IPv6 simpler than subnetting in IPv4, and how does it differ from IPv4? Choose all that apply.
A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.
D) IPv6 works at a different level of the OSI model.

A) A single IPv6 subnet can supply 18,446,744,073,709,551,616 IPv6 addresses.
B) IPv6 addressing does not use classes, and there are no IPv6 equivalents to IPv4's class A, class B, or class C networks.
C) IPv6 does not use subnet masks.