View
5.534
Download
12
Category
Preview:
DESCRIPTION
Citation preview
Chapter 4
True/False
Indicate whether the statement is true or false.
____ 1. An IP address has 32 bits divided into four octets (four sets of eight binary digits).
____ 2. TCP/IP networks cannot use MAC addresses in communication.
____ 3. TCP/IP hosts use the combination of the IP address and the subnet mask to determine if other addresses are
local or remote.
____ 4. The allocation of network numbers based on CIDR has let to the depletion of IP addresses.
____ 5. Basic routing protocols such as RIP version 1 and IGRP support VLSM.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 6. A(n) ____ address identifies both a network and a host, so you can route communications through large
networks, including the Internet.
a. ARP c. IP
b. HMAC d. MAC
____ 7. It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is
reserved as the ____ address.
a. multicast c. broadcast
b. loopback d. unicast
____ 8. IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting.
a. A c. C
b. B d. D
____ 9. To determine how many digits are used for the network identifier, you must look at the ____, which is a
required component for all IP hosts.
a. subnet mask c. network mask
b. MAC mask d. TCP/IP mask
____ 10. ____ broadcasts are for a specific subnet.
a. Flooded c. Half-duplex
b. Directed d. Full-duplex
____ 11. When the host portion of an IP address is all binary zeros, that address is the ____ identifier.
a. subnetwork c. class
b. broadcast d. multicast
____ 12. When the host portion of an IP address is all binary ones, that address is a ____ address.
a. multicast c. subnetwork
b. class d. broadcast
____ 13. ____ is based on assigning IP addresses on criteria other than octet boundaries.
a. ARIN c. CIDR
b. IANNA d. VLSR
____ 14. The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask.
a. prefix c. route mask
b. suffix d. mask table
____ 15. ____ tell the computer or router which part of an IP address is the network portion and which part is the host
portion.
a. CIDR tables c. Subnet masks
b. Summarization tables d. Router masks
____ 16. In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on
different subnets.
a. classful c. class-based
b. class-dependant d. classless
____ 17. The decimal number 192 expressed in binary is ____.
a. 10000101 c. 11010010
b. 11000000 d. 11100100
____ 18. The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.
a. binary c. hexadecimal
b. decimal d. vigesimal
____ 19. Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters,
it really is an efficient way to express large numbers such as MAC and IPv6 addresses.
a. 2 c. 20
b. 16 d. 21
____ 20. ____ is the version of IP currently deployed on most systems today.
a. IPX c. IPv6
b. IP2 d. IPv4
____ 21. ____ was originally designed to address the eventual depletion of IPv4 addresses.
a. IPv6 c. IP2
b. IPX d. IPNext
____ 22. ____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all
sizes.
a. IPSec c. ARP
b. NAT d. CIDR
____ 23. ____ is the most important layer 3 security protocol.
a. IPSec c. DNS
b. ARP d. NAT
____ 24. IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process
traffic not ultimately destined for them.
a. multicasting c. unicasting
b. anycasting d. broadcasting
____ 25. The ____ transition method involves enabling IPv6 on all routers, switches, and end nodes but not disabling
IPv4—so both version 4 and version 6 stacks run at the same time.
a. scheduling c. dual stack
b. tunneling d. natting
____ 26. ____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets.
a. Tunneling c. Natting
b. Scheduling d. Dual stack
Completion
Complete each statement.
27. The ____________________ devised the hierarchical IP addressing structure.
28. ____________________ is the sending of a stream of data (usually audio and video) to multiple computers
simultaneously.
29. ____________________ broadcasts are broadcasts for any subnet and use the IP address 255.255.255.255.
30. The purpose of ____________________ is to allow many IP subnets to be advertised as one.
31. ____________________ solves the design problem of basic subnetting by allowing different masks on the
subnets.
Matching
Match each item with a statement below:
a. ARIN f. RIP version 1
b. ICANN g. OSPF
c. Subnet mask h. Nibble
d. CIDR i. IPv6
e. Summarization
____ 32. a classless routing protocol
____ 33. the next generation of IP
____ 34. indicates how much of the IP address represents the network or subnet
____ 35. also known as route aggregation
____ 36. a global, government-independent entity with overall responsibility for the Internet
____ 37. four bits, which is half of a byte
____ 38. manages IP addresses in the United States
____ 39. developed to slow the exhaustion of IP addresses
____ 40. a classful routing protocol
Short Answer
41. Briefly describe the Class A IP addresses.
42. Briefly describe Class B IP addresses.
43. Briefly describe Class C IP addresses.
44. Describe private IP ranges.
45. What are the standard (default) subnet masks?
46. Describe the IP broadcast address.
47. What are some reasons to incorporate subnetting into an organization’s network?
48. What are the subnetting formulas?
49. Briefly describe the hexadecimal numbering system.
50. Describe the tunneling transition to IPv6 method.
Recommended