Subnetting and Network Segmentation Quiz

SignificantOnyx avatar
SignificantOnyx
·
·
Download

Start Quiz

Study Flashcards

29 Questions

Which of the following is a reason for subnetting a network?

To reduce the size of the network and create smaller broadcast domains

What formula is used to calculate the number of subnets in subnetting?

2n

What is the subnet mask for creating two equal subnets with 126 hosts each, when applied to the IP address 192.168.10.0?

/26

Which of the following subnet masks applied to 192.168.10.0 will create four equal subnets, each with 62 hosts?

/26

What is the formula to calculate the number of hosts in a subnet?

2^n-2

A subnet mask of /16 applied to 172.16.32.0 will create a network with how many hosts?

65534

If a range of 200.42.98.0/24 needs to be subnetted into 7 subnets, with each subnet having no more than 29 hosts, what subnet mask should be applied?

/27

Which device is used to determine the path that messages should take through a network?

Router

What is used to filter incoming and outgoing traffic?

Firewall

What is a measure of the data carrying capacity?

Bandwidth

Which of the following are characteristics of a peer-to-peer network?

Low cost

What device determines the path that messages should take through internetworks?

Router

Which functions do end devices perform on a network?

Data generation and communication

Which statement describes a characteristic of cloud computing?

Cloud computing allows users to access resources on a business or campus network using personal tools and devices.

What security violation would cause the most amount of damage to the life of a home user?

Accessing resources on a business or campus network.

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network?

Implementing a policy that requires strong, complex passwords.

What are two functions of intermediary devices on a network?

Forwarding data packets between networks.

Which of the following is an example of an internal security threat to an organization?

All of the above

Which network infrastructure provides access to other networks over a large geographic area?

WAN

Which network connection requires a dish and clear line of sight for service?

Satellite

Which statement about scalable networks is true?

Grows in size without impacting existing users

Which of the following is a characteristic of a converged network?

A single network that delivers voice, video, and data to a variety of devices.

What is the purpose of a virtual private network (VPN)?

To provide secure access to remote workers.

Which of the following is an intermediary device in a network?

Router

What is an intranet?

A private connection of LANs and WANs that belongs to an organization and is designed to be accessible only by the members and employees of the organization.

Which of the following is a characteristic of peer-to-peer networks?

They are less secure, not scalable, and may perform slower.

Which of the following is a characteristic of an intranet?

It is a private connection of LANs and WANs belonging to an organization.

What is the primary purpose of maintaining data integrity during transmission?

To assure that the information has not been altered.

What is the main difference between cable and DSL as network mediums?

Cable and DSL both provide high bandwidth and an Ethernet connection.

Test your knowledge on subnetting an IPv4 network and network segmentation. Learn about broadcast domains and the problems associated with large broadcast domains. Explore the reasons for subnetting and how it can help reduce network size and create smaller broadcast domains.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

DHCP Mastery Quiz
13 questions

DHCP Mastery Quiz

UserReplaceableStream avatar
UserReplaceableStream
Modules 11-13 Partie 3
31 questions
Use Quizgecko on...
Browser
Browser