Comptia Net+ - Module 8

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

What is network segmentation and why is it used?

Dividing a network into smaller, separate segments (each a broadcast domain) to:

  • Enhance security

  • Improve performance

  • Simplify troubleshooting

2
New cards

How are networks commonly segmented?

By geographic location, departmental boundaries, or device types.

3
New cards

What is subnetting and why is it used?

Subnetting divides a network into smaller LANs (subnets) to manage traffic better. Each subnet has its own IP group and clients know which devices are local.

4
New cards

How do subnet masks work in IPv4?

The subnet mask determines which part of an IP address is the network ID and which part is the host ID. Example: 192.168.123.132 / 255.255.255.0 → Network: 192.168.123.0, Host: 0.0.0.132

5
New cards

What is CIDR (classless interdomain routing) and how does it work?

CIDR specifies how many bits in an IP address are for the network ID. Written as IP/number-of-network-bits. Example: 192.168.89.127/24 → 24 bits for network.

6
New cards

How does subnetting (classless addressing) affect networks and hosts?

Borrowing host bits for the network ID increases the number of networks but decreases the number of hosts per network.

7
New cards

How do subnet mask tables work for different IPv4 classes?

Class A, B, and C networks can be subnetted. The number of host bits depends on the network class and subnetting approach.

8
New cards

What is DHCP relay and how does it work?

A router (relay agent) forwards DHCP requests from one subnet to a DHCP server on another subnet. The server assigns an IP for the client’s subnet. Also called an IP Helper Address.

9
New cards

What is VLSM (variable length subnet mask) and how does it differ from CLSM (constant length subnet mask)?

VLSM allows subnets to be different sizes, creating “subnets of subnets” by starting with the largest and moving to smaller ones. CLSM uses the same size for all subnets.

10
New cards

How does subnetting work in IPv6?

IPv6 uses no classes or masks. Subnets help manage the huge address space. Addresses are 8 blocks of 4 hex digits; first 4 blocks = network, last 4 = interface. Alter the 4th block of the prefix to create subnets.

11
New cards

What is a VLAN and why is it used?

A VLAN groups switch ports to create smaller broadcast domains, forcing some traffic through a router and reducing unnecessary traffic.

12
New cards

Why are VLANs used?

To isolate traffic, prioritize devices, handle legacy protocols, separate secure users, set up temporary networks, and reduce equipment costs

13
New cards

What’s the difference between unmanaged and managed switches?

  • Unmanaged: Plug-and-play, no IP, no VLANs.

  • Managed: Configurable, has IP, supports VLANs, port groups, and provides stats/errors.

14
New cards

How does a normal Layer 2 switch differ from a managed switch using VLANs?

  • Normal Layer 2 switch: All ports share one broadcast domain.

  • Managed switch with VLANs: Ports can be grouped into separate VLANs, even if not adjacent, creating isolated broadcast domains.

15
New cards

What is VLAN tagging (802.1Q) and how does it work?

VLAN tagging marks Ethernet frames with VLAN info. The tag stays with the frame until the final switch port removes it. If the frame moves to a new VLAN, the router adds a new tag

16
New cards

What’s the difference between access ports and tagged (trunk) ports on a switch?

  • Access port: Single device, single VLAN.

  • Tagged port (trunk): One link carrying multiple VLANs using VLAN tags. Protocols manage and interpret the tags.

17
New cards

How do VLANs, subnets, and router ports work together?

Each VLAN has its own subnet. A router can treat multiple VLANs as separate logical networks, even if they connect through a single port.

18
New cards

What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?

172.16.32.0/24

19
New cards

Suppose your company has leased one class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?

  • 120.10.10.0/25

  • 255.255.255.128

20
New cards

Subnetting operates at the __ layer while VLANs function at the __ layer.

  • network

  • data link

21
New cards

Which VLAN on a switch manages untagged frames?

The native VLAN

22
New cards

An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?

Either VLAN hopping or double tagging is an acceptable answer.

23
New cards

What area of a network can provide less stringent security so a web server is more accessible from the open Internet?

Either screened subnet or DMZ (demilitarized zone) is an acceptable answer.

24
New cards

On which networking device do you configure VLANs?

Either switch or managed switch is an acceptable answer.

25
New cards

Which IP addressing technique subnets a subnet to create subnets of various sizes?

VLSM (variable length subnet mask)

26
New cards

Which VLAN type would be the best fit for a company’s web servers that need to be accessible from the Internet but should not be able to communicate with each other?

Isolated VLAN

27
New cards

Which Cisco command lists configured VLANs on a switch?

show vlan