• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back

The portion of an IP address common to all nodes on the same network or subnet.

Network ID

Another way of arranging network and host information in an IP address without following the limitations imposed by traditional network class distinctions is known as what?

CIDR (Classless Interdomain Routing) pronounced cider.

This takes the network ID or a host's IP address and follows it with a forward slash (/) followed by the bits that are used for the network ID.

CIDR notation

In the IP address 192.34.89.0/22




What term is used to describe the /22?

CIDR Block

The logical process of combining bits is known as what?

ANDing




A 1 bit combined with a 1 bit results in a 1 bit.




A 0 bit combined with any other bit results is a 0.




1=True


0=False

The emulation of all or part of a network is known as what? Emulation of a computer, operating system environment, network device, or application.

Virtualization

In virtualization the physical computer is known as what?

Host

What software name makes the most widely implemented virtualization software today?

VMware

To connect to a network a virtual machine needs what?

Virtual Adapter or vNIC (virtual network interface care)

True or False, you can have more than one vNIC on a virtual machine?

True, the number of vNICs on a VM depends on the limits imposed by the virtualization software.

Subnets separates networks into what?

Multiple logically defined segments

The three type of virtualization are:

Host - The physical computer




Guest - The virtual machines




Hypervisor - Manages virtual machines

Network and broadcast addresses are not used as...

number of hosts

The advantages of using virtualization are:

Efficient use of resources


Cost and energy savings


Fault and threat isolation


Simplify backups and recovery

The disadvantages of using virtualization are:

Compromised performance


Increased complexity


Increased licensing cost


Single point of failure

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

802.1Q

The first iteration of STP was defined in what IEEE standard?

802.1d

Defined by the IEEE 802.d standard a switching protocol that operates in the Data Link layer to prevent traffic loops.

STP (Spanning Tree Protocol)

Cisco's protocol for exchanging VLAN information over trunks. Allows one switch on a network to centrally manage all VLANs

VTP (VLAN Trunking Protocol)

VTP (VLAN trunking protocol) allows changes to the VLAN database on one switch which is called?

stack master

A BID (Bridge Id) is a combination of what?

2-byte priority field




The bridges MAC address

A type of network connection in which a virtual machine (VM) on a host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host.

host-only mode

Class A default subnet mask

255.0.0.0




11111111.00000000.00000000.00000000




8 bits used in network portion

Class B default subnet mask

255.255.0.0




11111111.11111111.00000000.00000000




16 bits used in network portion

Class C default subnet mask

255.255.255.0




11111111.11111111.11111111.00000000




24 bits used in network portion

A vNIC accesses a physical network using the host machines NIC is known as what?

bridged mode

This type of VLAN will automatically receive all untagged frames.

native VLAN

What provides a common language between the ritualized service applications and the network's physical devices?

OpenFlow