Subnetting and Network Segmentation Quiz
29 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a reason for subnetting a network?

  • To increase the size of the network
  • To increase the amount of broadcast traffic
  • To connect multiple routers
  • To reduce the size of the network and create smaller broadcast domains (correct)
  • What formula is used to calculate the number of subnets in subnetting?

  • 2n (correct)
  • 2h-2
  • 2n-2
  • 2h
  • What is the subnet mask for creating two equal subnets with 126 hosts each, when applied to the IP address 192.168.10.0?

  • /27
  • /25
  • /28
  • /26 (correct)
  • Which of the following subnet masks applied to 192.168.10.0 will create four equal subnets, each with 62 hosts?

    <p>/26</p> Signup and view all the answers

    What is the formula to calculate the number of hosts in a subnet?

    <p>2^n-2</p> Signup and view all the answers

    A subnet mask of /16 applied to 172.16.32.0 will create a network with how many hosts?

    <p>65534</p> Signup and view all the answers

    If a range of 200.42.98.0/24 needs to be subnetted into 7 subnets, with each subnet having no more than 29 hosts, what subnet mask should be applied?

    <p>/27</p> Signup and view all the answers

    Which device is used to determine the path that messages should take through a network?

    <p>Router</p> Signup and view all the answers

    What is used to filter incoming and outgoing traffic?

    <p>Firewall</p> Signup and view all the answers

    What is a measure of the data carrying capacity?

    <p>Bandwidth</p> Signup and view all the answers

    Which of the following are characteristics of a peer-to-peer network?

    <p>Low cost</p> Signup and view all the answers

    What device determines the path that messages should take through internetworks?

    <p>Router</p> Signup and view all the answers

    Which functions do end devices perform on a network?

    <p>Data generation and communication</p> Signup and view all the answers

    Which statement describes a characteristic of cloud computing?

    <p>Cloud computing allows users to access resources on a business or campus network using personal tools and devices.</p> Signup and view all the answers

    What security violation would cause the most amount of damage to the life of a home user?

    <p>Accessing resources on a business or campus network.</p> Signup and view all the answers

    A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network?

    <p>Implementing a policy that requires strong, complex passwords.</p> Signup and view all the answers

    What are two functions of intermediary devices on a network?

    <p>Forwarding data packets between networks.</p> Signup and view all the answers

    Which of the following is an example of an internal security threat to an organization?

    <p>All of the above</p> Signup and view all the answers

    Which network infrastructure provides access to other networks over a large geographic area?

    <p>WAN</p> Signup and view all the answers

    Which network connection requires a dish and clear line of sight for service?

    <p>Satellite</p> Signup and view all the answers

    Which statement about scalable networks is true?

    <p>Grows in size without impacting existing users</p> Signup and view all the answers

    Which of the following is a characteristic of a converged network?

    <p>A single network that delivers voice, video, and data to a variety of devices.</p> Signup and view all the answers

    What is the purpose of a virtual private network (VPN)?

    <p>To provide secure access to remote workers.</p> Signup and view all the answers

    Which of the following is an intermediary device in a network?

    <p>Router</p> Signup and view all the answers

    What is an intranet?

    <p>A private connection of LANs and WANs that belongs to an organization and is designed to be accessible only by the members and employees of the organization.</p> Signup and view all the answers

    Which of the following is a characteristic of peer-to-peer networks?

    <p>They are less secure, not scalable, and may perform slower.</p> Signup and view all the answers

    Which of the following is a characteristic of an intranet?

    <p>It is a private connection of LANs and WANs belonging to an organization.</p> Signup and view all the answers

    What is the primary purpose of maintaining data integrity during transmission?

    <p>To assure that the information has not been altered.</p> Signup and view all the answers

    What is the main difference between cable and DSL as network mediums?

    <p>Cable and DSL both provide high bandwidth and an Ethernet connection.</p> Signup and view all the answers

    More Like This

    Networking Concepts: IP Addressing and Subnets
    25 questions
    IP Addressing and Subnetting
    30 questions

    IP Addressing and Subnetting

    CuteWatermelonTourmaline avatar
    CuteWatermelonTourmaline
    Use Quizgecko on...
    Browser
    Browser