Network+ Guide to Networks, Chapter 10
Network Segmentation and Virtualization -
Review Questions With Correct Answers
A CIDR block of /26 is equivalent to what subnet mask below? - answer✔✔255.255.255.192
A network with 6 bits remaining for the host portion will have how many usable host addresses?
- answer✔✔62
A network with the subnet mask 255.255.255.0 would have what CIDR block? - answer✔✔/24
A single switch can manage traffic belonging to several VLANs on a single interface, by
configuring which option on the interface? - answer✔✔A trunk port
An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the
frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately
removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN,
which the attacker is not authorized to access. What kind of attack is this? - answer✔✔VLAN
hopping attack
How does a vNIC get a MAC address? - answer✔✔Upon creation, each vNIC is automatically
assigned a MAC address
How can VLAN hopping attacks be prevented on a network? - answer✔✔Disable auto trunking
and move native VLANs to unused VLANs.
How many bits of a Class A IP address are used for host information? - answer✔✔24 bits (p492)
In an IPv6 address, the first 64 bits of the address are known as what? - answer✔✔routing prefix
In order to allow communication between VLANs for exchange of data, what must be used? -
answer✔✔a router
STP selects the root bridge based on which parameter? - answer✔✔Bridge ID (BID)
Suppose you have leased two Class C licenses, 115.100.10.0 and 115.100.11.0. You want to use
all these Class C IP addresses in one supernet. What is the CIDR notation for this supernet?
What is its supernet mask? - answer✔✔2^h-2 255.255.254.0/23 115.100.10.0/23 Number of biTs