Questions
Answer the following questions to test your knowledge of this chapter:
- What is the core network?
- The network that connects the servers to the internet
- The center of the network that connects the data center(s) and the user networks
- A general term for an enterprise network
- The network between the users and the internet
- In Figure 1.5, on the left, we can see a typical network topology. In this network, assuming they are on the same IP subnet, when PC1 pings PC5, the packets are forwarded through which of the following?
- Access switch ACC1, distribution switch DIST1, core switches CORE1 and CORE2, data center switches DC1 and DC2, distribution switch DIST2, and access switch ACC4.
- Access switch ACC1, distribution switch DIST1, core switches CORE1 and CORE2, distribution switch DIST2, and access switch ACC4.
- Answers (a) and (b) can both be correct, depending on the routing configuration.
- Answers (a) and (b) can both be correct, depending on the HSRP configuration.
- In the same figure (Figure 1.5) on the left, PC1 pings PC4. The packets will go through which of the following?
- ACC1, DIST1, CORE1, DIST2, and ACC3
- ACC1, DIST1, CORE2, DIST2, and ACC3
- ACC1, DIST1, CORE1, CORE2, DIST2, and ACC3
- ACC1, DIST1, CORE1, DC1, DC2, CORE2, DIST2, and ACC3
- Assuming PC1 is in VLAN50 and PC2 is in VLAN60, pings are sent from PC1 to PC2. Routing will be performed on which of the following?
- The left network is on CORE1 and the right network is on DC1.
- The left network is on CORE1 or CORE2, and the right network is on DC1 or DC2, depending on the routing protocol configuration.
- The left network is on CORE1 and the right network is on DC2.
- The left network is on CORE1 or CORE2, and the right network is on DC1 or DC2, depending on HSRP configuration.
- In Figure 1.8, on the left, the packets from PC4 that are sent to the servers will be forwarded through which of the following?
- ACC3, DIST2, CORE2, and DC2
- ACC3, DIST2, CORE2, FW2, DC2, and FW1
- ACC3, DIST2, CORE2, FW2, and DC2
- Any of the above, depending on the routing configuration.
- Which of the following is a characteristic of attacks that target the data plane?
- Changing routing tables to divert packets in the attacker's direction
- Flooding the network to stop users from using it
- Taking control of the device's console to change its configuration
- All the above
- Which of the following is a characteristic of attacks that target the control plane?
- Changing routing tables to divert packets toward the attacker's direction
- Flooding the network to stop users from using it
- Taking control of the device's console to change its configuration
- All the above
- What are DDoS attacks?
- Attacks that prevent access to the network
- Attacks that prevent access from network servers
- Attacks that prevent access from network services
- All of the above