Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

11. What is the network ID with CIDR notation for the IP address 172.16.32.108 w

ID: 3772753 • Letter: 1

Question

11. What is the network ID with CIDR notation for the IP address 172.16.32.108 with thesubnet mask 255.255.255.0?

12. Suppose you have leased two Class C licenses, 115.100.10.0 and 115.100.11.0. Youwant to use all these Class C IP addresses in one supernet. What is the CIDR notationfor this supernet? What is its supernet mask?

13. Suppose your company has leased one Class C license, 120.10.10.0, and wants to sub-lease the first half of these IP addresses to another company. What is the CIDR nota-tion for the subnet to be subleased? What is the subnet mask for this network?

14. What are four advantages to using virtualization on a network?

15. How does a vNIC get a MAC address?

16. Subnetting operates at Layer while VLANs function atLayer .

17. Which VLAN on a switch manages untagged frames?

18. An attacker configures a VLAN frame with two tags instead of just one. The first tagdirects the frame to the authorized VLAN. After the frame enters the first VLAN, theswitch appropriately removes the tag, then discovers the next tag, and sends the framealong to a protected VLAN, which the attacker is not authorized to access. What kindof attack is this?

19. Why is a BPDU filter needed at the demarc point?

20. Only one ________ exists on a network using STP.

Explanation / Answer

CAn help u with this:


14)

1. You can host a guest operating system known as a VM inside your main operating system known as the host sharing the computing resources from your pc such as the CPU and memory.

This will allow you to have access to other operating systems in real time. A huge benefit if you dont want to fork out on a new computer just because you want to try the latest linux operating system or the latest macosx.

2. Testing and learning. If your a software developer, you can test software inside a VM. If the VM would or ever crash your operating system due to ur software, then the main operating system is not affected, only the VM would be.

So its good for testing purposes. Its also good for testing a virtual network. You could set up multiple VMs and network each VM together as if they were separate machines. This would allow you to test out networking protocols and that would help to become a network engineer.

3. If you have a server with lots of computing resources then you could create lots of webservers which are separate to each other and resell what they call 'virtual server' to customers. This means they get a slice of your computer resources. If their webserver shuts down abnormally, the machine wouldnt be affected as you they will only have access to their virtual machine.

4. If you have more than one monitor, then you can each assign a virtual machine to a monitor so each virtual machine has its own monitor :-)

5. VMs are portable. Its just a huge file. Take that file with you anywhere and you have your files and operating with u whereever you go. However you can only run it on a pc that has a Virtualisation software, software that allows you to run virtual machines.


19)

>BPDU filter disables spanning-tree on a port period. It does this by restricting sending and receiving BPDU’s. Simple enough. When enabled on a global level, BPDU filter will apply to all portfast ports. When a port links up it will transmit some BPDU’s out before the port starts to filter BPDUs.
>Remember that if a BPDU is received on a portfast interface, the interface will lose portfast status and because BPDU filtering relies on this it will become disabled.