Ch 8 Network segmnetation (Total)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/70

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key concepts and definitions related to network segmentation and VLANs based on the lecture notes provided.

Last updated 10:20 PM on 4/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

71 Terms

1
New cards

What is network segmentation and why is it used?

Network segmentation is the process of separating a network's broadcast domain into smaller portions.

2
New cards

What is a subnet?

A group of IP addresses created when physcially subnetting a network

3
New cards

What is a Vlan?

A group of Ports on a Manged switch that become their own Virtual Lan.

4
New cards

True OR false: Each segment has its own broadcast domain?

True

5
New cards

What are the benefits of segmenting a network?

to enhance security, improve network performance, and simplify troubleshooting.

6
New cards

What are common criteria for segmenting networks?

Networks are commonly segmented according to geographic locations, departmental boundaries, or device types.

7
New cards

What OSI layers do Vlans work on?

Layer 2 Data link layer ( Remember: Vlan switches use Ethernet protocol tags)

8
New cards

What layer of the OSI model do Subnets work in?

Layer 3 Network Layer (rememeber: Subnets use IP addresses)

9
New cards

How can virtual LANs (VLANs) be created?

At layer 2, VLANs can be created using physical devices such as switches.

10
New cards

What is the role of a router in network segmentation?

Routers act as broadcast boundaries that can break up large broadcast domains into smaller ones.

11
New cards

What is the purpose of a subnet mask?

A subnet mask helps a device determine how much of the IP address is netowrk ID and how much is Host ID

12
New cards

How does taking a bit from the host ID and giving it to the network ID effect the network?

All of the above (increase number of Bits to represent Network ID, Increase the number of networks (Lans & Vlans) & decrease the number of usable Host IP addresses per subnet )

13
New cards
<p>What kind of Subnetting is this?</p>

What kind of Subnetting is this?

Subnets (Physical)

14
New cards

Which Ip address of a subnet is assigned to the router port that the lan connects to?

The First Ip address, the netowrk ID

15
New cards

What problem does subnetting solve in classful addressing?

Subnetting addresses the problem of too many node addresses assigned to each classful network.

16
New cards

What must be configured on a router to allow DHCP dynamic Ip addressing?

UDP Forwarding

17
New cards

What is UDP Forwarding on a router?

UDP forwarding, Allows routers to forward UDP traffic. Icluding DHCP broadcasts

18
New cards

What is a Relay Device?

A Networking device configured to allow UDP Forwarding

19
New cards

What is the IP helper address

A command Configuraion on the relay agent, Helps relay agent know where to send network service transmissions.


tells relay agent “ if you get [network service broadcast] from [ port ] then forward the message to [IP address]”

20
New cards

What is static IP addressing and where is it used?

Static IP addressing involves manually assigning IP addresses to devices in a network, often used in smaller or more controlled environments.

21
New cards

What is VLSM and why is it beneficial?

Variable Length Subnet Mask (VLSM) allows subnets to be subdivided into smaller groups, which can optimize IP address usage.

22
New cards

What does VLSM stand for?

Variable Length subnet mask
(easy to remember, variable = can be different & change, length of subnet mask)

23
New cards

How many bits do IPV6 addresses have?

128 bits. (1 hexadecimal number (16 bits) per block x 8 blocks = 128)

24
New cards

True or false, Do IPV6 Ip addresses use subnet masks?

False

25
New cards

What is the Network Prefix?

The First 64 Bits of a IPV6 address. (aka global routing prefix, or site prefix) It identifies the network

26
New cards

What is the Interface ID?

The Last 64 Bits of the IPV6 address. It ID's the Port

27
New cards

Vlans abstract ____ From the ____

Vlans abstract the broadcast domain from the networking hardware

28
New cards

How many switches do you need to make 4 Vlans?

Only 1. Multiple Vlans can be created on One switch

29
New cards

What can you use to Configure Vlans on a managed switch?

CLI (command line interface) or a web-based GUI

30
New cards

True or False: IPV6 IP addresses use Classes?

Flase

31
New cards
<p>What kind of Subnetting is this?</p>

What kind of Subnetting is this?

Logical (VLAN)

32
New cards
<p>If a device on Vlan 1 wants to communicate with another device on Vlan 1, what networking devices does the message need to go through?</p>

If a device on Vlan 1 wants to communicate with another device on Vlan 1, what networking devices does the message need to go through?

Because these devices are on the same vlan, the message only needs to go through the switch.

33
New cards
<p>If a device on Vlan 1 wahts to communicate with another device on vlan 2, what networking devices will the messge need to cross.</p>

If a device on Vlan 1 wahts to communicate with another device on vlan 2, what networking devices will the messge need to cross.

The message needs to go through the router, even tho both vlans are on the same switch

34
New cards

What is a Tag?

A frame header added by the switch, so that networking devices know which VLAN the meassage came from. Specified by IEEE 802.1Q Standard

35
New cards

Whats another name for the 802.1Q standard?

dot1q

36
New cards

How long does the tag stay with a message?

D) Option A & C

Until the message reaches the switch port connected to the destination device

OR

If the desitnation device is in a different network, so the message reaches a router first. The tag is stripped and given a new one. The new tag will be stripped when the message arrives to the final switch port

37
New cards

What is a VLAN and how does it function?

A VLAN (Virtual Local Area Network) groups ports on switches that limit broadcast traffic to smaller broadcast domains, guiding some traffic through a router.

38
New cards

What are access ports in VLAN configurations?

Access ports connect switches to hosts and carry traffic for only one VLAN

39
New cards

What are trunk ports in Vlan Configurations?

trunk ports connect switches to other networking devices and manage traffic for multiple VLANs.

40
New cards

What is a trunk line?

A single connection medium (cable or wire) that connects two trunk ports

41
New cards

What is Trunking?

The tramsission of data from multiple vlans between two networking devices, using trunk ports and a trunk line

42
New cards

What is ciso’s VTP?

VTP, Vlan trunk protocol.
Chooses one switch in the network to be the “stack master”. Network admin can use the stack master to centrally manage all of the Vlans,

43
New cards

What is a Subinterface?

The logical division of all the data of multiple broadcast domains (vlans & subinterfaces), that enter one router port

44
New cards

What is VLAN hopping?

VLAN hopping is an attack type related to VLAN configurations that can allow unauthorized access between VLANs.

45
New cards

How can devices be assigned to a VLAN?

Devices can be assigned to a VLAN Static-ly ( by which switch port the device is connected to) or Dynamically based on various criteria.

46
New cards

What is a default Vlan?

A vlan that comes preconfigures on a managed switch. Cannot be deleted or renamed, but ports can be redistributed to different vlans

47
New cards

What is a Native Vlan?

A Vlan that revieves all untagge frames from untagged ports
DANGEROUS: Should be changed to unused vlan

48
New cards

What is a Native Vlan mismatch?

When both ends of a connection line both use native vlans, but different individual native vlans (like vlan 1 & 3)

49
New cards

Data Vlan (aka user vlan)

carries user gen traffic (email, web, database updates)

50
New cards

management Vlan

Used to provide administrative access to a switch

51
New cards

Voice Vlan

Designed to support VOIP traffic. So it requires high bandwidth, priority over other traffic, flexable routing, & minimized latency

52
New cards

Private Vlan

A vlan divided into smaller broadcast somains called secondary vlans
Can connect a server, load balancer, or defailt gateway to the primary vlan, so it can communicate with all the secondary vlans

53
New cards

True or false secondary vlans cannot communicate outside of their broadcast domain

54
New cards

What are the two types of secondary vlans

Islotated & Community (both cannot communicte with other vlans), may or may not be able to use trunk line to communicate with other networks

55
New cards
56
New cards

What is static Vlan assignment?

When Clients are assigned to a Vlan based on the switch port they’re connected to

57
New cards

What is Dynamic Vlan assignment?

When a client is chosen for a vlan based on various criteria
, like mac address, location, results of an authentication process by an RADIUS server, deivices that failed to be authenticated, or which WLAN its in

58
New cards

What is Vlan Hopping?

A common VLAN attack that takes advantage of how vlans are tagged.
Creates a transmittion that tricks the switch to believing that it belongs to a protected VLAN of the network. Once within the network the hacker can steal sensitive info or inject harmful software.

Two approahes:

1) Double Tagging
2) Switch Spoofing

59
New cards

What is Double Tagging?

A type of Vlan hopping, a VLAN Cyberattack.
Stacks a fake enterhnet tag below a real ethernet tag. At the real tag is removed by the switch, the fake tag underneath tricks the switch into sending the transmisson to a restricted Vlan.

60
New cards

Switch Spoofing

Attacker connects to Switch, making the connection look like a trunkline.
switch auto configs the port into a trunk port to match the transmission.
Hacker now has access to network & where it can inject harmful trafic into the port

61
New cards

What formula can be used to calculate how many subnets a number of bits make?

2n = y

y= subnets created

n = bits taken

62
New cards

which standard defines how VlAN info aprears in frames & how switches interpret that info?

802.1Q (aka dot1q)

63
New cards
<p>What is the VLAN configuration, where one router connects to a switch that supports multiple VLANs called?</p>

What is the VLAN configuration, where one router connects to a switch that supports multiple VLANs called?

Router on a stick

64
New cards

How many bits of a Class A adress is used for host information?

Class A subnet: 255.0.0.0

24 bits

65
New cards

Whats the number for determining the number of possible hosts?

2n - 2 = z

n = bits taken from host

z = total possible hosts

(total ip addresses - 2 (for network id & broadcast address) )

66
New cards

Which of the following is NOT a good reason to segment a network?

c. To increase the number of networkindg devices on the network

67
New cards

What is the greatest number of bits you can borrow from the host portion of the class B submask, and still have at least 130 hosts per subnet?

b) 8 bits

68
New cards

Which hexademcial block in an IPV^ adress is used for the subnet ID?

c) The forth

69
New cards

Which assignment technique requires a RADIUS server?

Dynamic VLAN

70
New cards

Which port mode on the switch enables that port to manage traffic for multiple vlans?

Trunk

71
New cards

Which IEEE standard determines how VLANs work on a network?

802.1Q