Subnetting and Network Segmentation Quiz
29 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a reason for subnetting a network?

  • To increase the size of the network
  • To increase the amount of broadcast traffic
  • To connect multiple routers
  • To reduce the size of the network and create smaller broadcast domains (correct)

What formula is used to calculate the number of subnets in subnetting?

  • 2n (correct)
  • 2h-2
  • 2n-2
  • 2h

What is the subnet mask for creating two equal subnets with 126 hosts each, when applied to the IP address 192.168.10.0?

  • /27
  • /25
  • /28
  • /26 (correct)

Which of the following subnet masks applied to 192.168.10.0 will create four equal subnets, each with 62 hosts?

<p>/26 (B)</p> Signup and view all the answers

What is the formula to calculate the number of hosts in a subnet?

<p>2^n-2 (D)</p> Signup and view all the answers

A subnet mask of /16 applied to 172.16.32.0 will create a network with how many hosts?

<p>65534 (C)</p> Signup and view all the answers

If a range of 200.42.98.0/24 needs to be subnetted into 7 subnets, with each subnet having no more than 29 hosts, what subnet mask should be applied?

<p>/27 (A)</p> Signup and view all the answers

Which device is used to determine the path that messages should take through a network?

<p>Router (B)</p> Signup and view all the answers

What is used to filter incoming and outgoing traffic?

<p>Firewall (A)</p> Signup and view all the answers

What is a measure of the data carrying capacity?

<p>Bandwidth (C)</p> Signup and view all the answers

Which of the following are characteristics of a peer-to-peer network?

<p>Low cost (D)</p> Signup and view all the answers

What device determines the path that messages should take through internetworks?

<p>Router (C)</p> Signup and view all the answers

Which functions do end devices perform on a network?

<p>Data generation and communication (D)</p> Signup and view all the answers

Which statement describes a characteristic of cloud computing?

<p>Cloud computing allows users to access resources on a business or campus network using personal tools and devices. (B)</p> Signup and view all the answers

What security violation would cause the most amount of damage to the life of a home user?

<p>Accessing resources on a business or campus network. (A)</p> Signup and view all the answers

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network?

<p>Implementing a policy that requires strong, complex passwords. (D)</p> Signup and view all the answers

What are two functions of intermediary devices on a network?

<p>Forwarding data packets between networks. (D)</p> Signup and view all the answers

Which of the following is an example of an internal security threat to an organization?

<p>All of the above (D)</p> Signup and view all the answers

Which network infrastructure provides access to other networks over a large geographic area?

<p>WAN (A)</p> Signup and view all the answers

Which network connection requires a dish and clear line of sight for service?

<p>Satellite (B)</p> Signup and view all the answers

Which statement about scalable networks is true?

<p>Grows in size without impacting existing users (D)</p> Signup and view all the answers

Which of the following is a characteristic of a converged network?

<p>A single network that delivers voice, video, and data to a variety of devices. (D)</p> Signup and view all the answers

What is the purpose of a virtual private network (VPN)?

<p>To provide secure access to remote workers. (C)</p> Signup and view all the answers

Which of the following is an intermediary device in a network?

<p>Router (D)</p> Signup and view all the answers

What is an intranet?

<p>A private connection of LANs and WANs that belongs to an organization and is designed to be accessible only by the members and employees of the organization. (C)</p> Signup and view all the answers

Which of the following is a characteristic of peer-to-peer networks?

<p>They are less secure, not scalable, and may perform slower. (C)</p> Signup and view all the answers

Which of the following is a characteristic of an intranet?

<p>It is a private connection of LANs and WANs belonging to an organization. (A)</p> Signup and view all the answers

What is the primary purpose of maintaining data integrity during transmission?

<p>To assure that the information has not been altered. (D)</p> Signup and view all the answers

What is the main difference between cable and DSL as network mediums?

<p>Cable and DSL both provide high bandwidth and an Ethernet connection. (C)</p> Signup and view all the answers

More Like This

Networking Concepts: IP Addressing and Subnets
25 questions
IP Addressing and Subnetting Quiz
30 questions
Use Quizgecko on...
Browser
Browser