Network Theory: Subnetting and VLANs

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of subnetting in IPv4 addressing?

  • To increase the number of host addresses per network
  • To increase the number of networks by borrowing host bits (correct)
  • To enhance network security effectively
  • To reduce the number of networks available

What is the first step in subnetting a network ID?

  • Determine the broadcast address
  • Calculate the network IDs
  • Establish the IP address range
  • Borrow from host bits (correct)

When subnetting, what effect does borrowing bits have on the number of hosts?

  • Increases the number of hosts per subnet
  • Has no effect on the number of hosts
  • Allows for unlimited hosts in each subnet
  • Decreases the number of hosts per subnet (correct)

In the example using the network ID 192.168.89.0 with a subnet mask of 255.255.255.0, what is the immediate action to take for subnetting?

<p>Borrow from host bits (D)</p> Signup and view all the answers

What should you determine after establishing how many bits to borrow in the subnetting process?

<p>Subnet mask (D)</p> Signup and view all the answers

What information is NOT typically calculated when performing subnet calculations?

<p>Financial cost of the network (D)</p> Signup and view all the answers

What is a consequence of reducing the number of bits for host identification?

<p>Decreases the potential number of hosts in each subnet (A)</p> Signup and view all the answers

Which of the following is NOT a factor to consider when calculating subnets?

<p>Uptime of network devices (A)</p> Signup and view all the answers

Which type of VLAN is typically preconfigured on a switch and includes all switch ports by default?

<p>Default VLAN (B)</p> Signup and view all the answers

What type of VLAN is used to support Voice over IP (VoIP) traffic?

<p>Voice VLAN (D)</p> Signup and view all the answers

Which VLAN type can be utilized for administrative access to a network switch?

<p>Management VLAN (C)</p> Signup and view all the answers

In the context of VLANs, what does the term 'Isolated VLAN' refer to?

<p>A VLAN that restricts communication between its members (D)</p> Signup and view all the answers

Which command would you use to list the current VLANs recognized by a Cisco switch?

<p>show vlan (A)</p> Signup and view all the answers

What kind of traffic does a Data VLAN primarily carry?

<p>User-generated traffic such as email and web browsing (C)</p> Signup and view all the answers

What does a Native VLAN receive?

<p>Untagged frames from untagged ports (B)</p> Signup and view all the answers

Which type of private VLAN allows communication only between certain members?

<p>Community VLAN (A)</p> Signup and view all the answers

Which class of network provides the most host information bits for subnetting?

<p>Class A (A)</p> Signup and view all the answers

What is a possible outcome when subnetting a Class C network?

<p>Create multiple smaller subnets (D)</p> Signup and view all the answers

What must you calculate when given certain network requirements like the number of hosts?

<p>Number of IP addresses needed and required subnets (B)</p> Signup and view all the answers

What type of IP address calculation involves determining the network ID and broadcast address?

<p>Provided an IP address analysis (C)</p> Signup and view all the answers

In a subnetted Class A network, what is typically true about the number of available subnets?

<p>The number of subnets depends on the host bit allocation (A)</p> Signup and view all the answers

Which statement best describes how subnetting impacts network design?

<p>It allows for efficient IP address distribution across multiple segments. (B)</p> Signup and view all the answers

What is a common goal of subnetting when managing a network?

<p>To segregate traffic and improve network performance (D)</p> Signup and view all the answers

What is typically not a factor when determining how subnetting will be applied in network design?

<p>The physical location of network devices (C)</p> Signup and view all the answers

What can trigger a dynamic VLAN assignment for a device?

<p>Client device information such as MAC address (A)</p> Signup and view all the answers

Which of the following is a common configuration error in VLAN management?

<p>Incorrect VLAN assignment (A), Using trunk mode for access ports (C)</p> Signup and view all the answers

What is VLAN hopping?

<p>An attack that allows access to a protected VLAN (B)</p> Signup and view all the answers

Which method is NOT associated with VLAN hopping attacks?

<p>MAC address spoofing (A)</p> Signup and view all the answers

What might happen to devices that have not authenticated to the network?

<p>They are placed in a quarantine VLAN (C)</p> Signup and view all the answers

Which statement correctly describes the access mode for switch ports connected to endpoints?

<p>Ports should nearly always use access mode (C)</p> Signup and view all the answers

What undesired effect can VLAN isolation have on a network?

<p>Potentially cutting off an entire group from the rest of the network (D)</p> Signup and view all the answers

What is a potential advantage of grouping all WLAN traffic into the same VLAN?

<p>Simplified management and configuration (D)</p> Signup and view all the answers

What are the two types of VLAN ports on a switch?

<p>Access port and Trunk port (B)</p> Signup and view all the answers

What does a trunk port manage?

<p>Traffic from multiple VLANs (D)</p> Signup and view all the answers

Which of the following best describes a trunk in networking?

<p>It is a single physical connection for multiple logical VLANs. (A)</p> Signup and view all the answers

What is the role of Cisco’s VLAN Trunking Protocol (VTP)?

<p>To synchronize VLAN information across switches. (B)</p> Signup and view all the answers

In most situations, how is each VLAN typically assigned in relation to IP addresses?

<p>Each VLAN has its own subnet of IP addresses. (D)</p> Signup and view all the answers

What does the router see when multiple VLANs are connected to a single port?

<p>Multiple logical LANs connected through one port. (B)</p> Signup and view all the answers

What is the main function of a trunk line between switches?

<p>To allow data packets from different VLANs to communicate. (B)</p> Signup and view all the answers

Which statement about VLANs is accurate?

<p>Different VLANs can transmit over the same trunk line. (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Subnetting

  • Subnetting, or classless addressing, modifies classful IPv4 addressing.
  • It involves borrowing bits from the host portion of the address to create additional network bits.
  • This increases the number of available networks but reduces the number of hosts per network.
  • Subnetting processes include determining the subnet mask, network IDs, and host IP address ranges. Calculations can be done using binary or formulas.
  • Exam questions often involve calculating subnets given network requirements or identifying subnet details from an IP address.

VLANs and Trunking

  • VLANs (Virtual LANs) segment a physical network into multiple logical networks.
  • Switch ports are configured as either access ports (connecting to hosts) or trunk ports (connecting to other network devices, carrying traffic from multiple VLANs).
  • Trunking protocols (like Cisco's VTP) manage VLAN traffic across trunk links.
  • A trunk is a single physical connection carrying multiple logical VLANs.

VLAN Types and Configuration

  • Common VLAN types include default, native, data, management, voice, and private VLANs.
  • Private VLANs further subdivide broadcast domains into isolated and community VLANs.
  • VLANs are configured and managed through switch software (e.g., using the show vlan command on Cisco switches).
  • VLANs can be assigned dynamically based on MAC addresses, location, or authentication.

VLAN Security and Troubleshooting

  • Common VLAN configuration errors include incorrect assignments, port modes, or isolation issues.
  • VLAN hopping is a security threat where attackers exploit vulnerabilities to access unauthorized VLANs. Methods used include double tagging and switch spoofing.
  • Devices failing authentication might be placed in a quarantine VLAN. All WLAN traffic may be grouped in a single VLAN for management purposes.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Netplus9e_PPT_Mod 08 (2).pptx

More Like This

Use Quizgecko on...
Browser
Browser