Filters
Question type

Study Flashcards

How does the logical process of combining bits known as ANDing work?

Correct Answer

verifed

verified

In ANDing, a bit with a value of 1 combi...

View Answer

All that is needed to provide communication between two VLANs is a DHCP relay agent.

Correct Answer

verifed

verified

How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?


A) 4 bytes
B) 8 bytes
C) 12 bytes
D) 20 bytes

Correct Answer

verifed

verified

An interface that manages traffic from multiple VLANs is known by what term?


A) access port
B) aggregation port
C) trunk port
D) egress port

Correct Answer

verifed

verified

In 1993, the IETF devised a shorthand method for identifying network and host bits in an IP address. What is this method, and how do you use it?

Correct Answer

verifed

verified

The method is known as CIDR (Classless I...

View Answer

Which of the following statements regarding IPv6 subnetting is NOT accurate?


A) IPv6 addressing uses no classes, and is therefore classless.
B) IPv6 does not use subnet masks.
C) A single IPv6 subnet is capable of supplying 18,446,744,073,709,551,616 IPv6 addresses.
D) The largest IPv6 subnet capable of being created is a /64.

Correct Answer

verifed

verified

D

What are some of the different reasons to use VLANs?

Correct Answer

verifed

verified

Reasons for using VLANs include:
* You w...

View Answer

Network segmentation at Layer 2 of the OSI model is accomplished using VLANs.

Correct Answer

verifed

verified

You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal?


A) 10.3.0.0/19
B) 172.20.50.0/23
C) 192.168.0.0/20
D) 10.90.0.0/22

Correct Answer

verifed

verified

When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?


A) VLAN 1
B) VLAN 1001
C) VLAN 1003
D) VLAN 1005

Correct Answer

verifed

verified

Subtracting an interesting octet value from 256 yields what number?


A) network ID
B) subnet ID
C) magic number
D) host ID

Correct Answer

verifed

verified

Where does the term trunk originate from, and how does it apply to modern networking?

Correct Answer

verifed

verified

A single switch can support traffic belo...

View Answer

How many subnets can a /48 site prefix support?


A) 256 subnets
B) 16384 subnets
C) 65,536 subnets
D) 131,072 subnets

Correct Answer

verifed

verified

Only Class B and Class C networks can be subnetted.

Correct Answer

verifed

verified

When a hacker attempts to perform a VLAN hopping attack, what are the two approaches likely to be used?

Correct Answer

verifed

verified

The two approaches the hacker might use ...

View Answer

IPv6 addressing does not utilize classful addressing, therefore every IPv6 address is classless.

Correct Answer

verifed

verified

True

How do unmanaged switches and managed switches differ from each other?

Correct Answer

verifed

verified

An unmanaged switch provides plug-and-pl...

View Answer

With VTP, where is the VLAN database stored?


A) On the router responsible for maintaining the VTP database.
B) On the switch that is known as the stack master.
C) On the switch that is configured as the trunk root.
D) On the designated VLAN server for the network.

Correct Answer

verifed

verified

B

Which of the following suggestions can help prevent VLAN hopping attacks on a network?


A) Install an additional switch to isolate traffic.
B) Disable auto trunking and move native VLANs to unused VLANs.
C) Install a router to process the untagged traffic on the VLAN.
D) Use MAC address filtering.

Correct Answer

verifed

verified

By default, the native VLAN is the same as the default VLAN.

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer