4
Chapter 4 True/False Indicate whether the statement is true or false. ____ 1. An IP address has 32 bits divided into four octets (four sets of eight binary digits). ____ 2. TCP/IP networks cannot use MAC addresses in communication. ____ 3. TCP/IP hosts use the combination of the IP address and the subnet mask to determine if other addresses are local or remote. ____ 4. The allocation of network numbers based on CIDR has let to the depletion of IP addresses. ____ 5. Basic routing protocols such as RIP version 1 and IGRP support VLSM. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. A(n) ____ address identifies both a network and a host, so you can route communications through large networks, including the Internet. a. ARP c. IP b. HMAC d. MAC ____ 7. It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is reserved as the ____ address. a. multicast c. broadcast b. loopback d. unicast ____ 8. IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting. a. A c. C b. B d. D ____ 9. To determine how many digits are used for the network identifier, you must look at the ____, which is a required component for all IP hosts. a. subnet mask c. network mask b. MAC mask d. TCP/IP mask ____ 10. ____ broadcasts are for a specific subnet. a. Flooded c. Half-duplex b. Directed d. Full-duplex ____ 11. When the host portion of an IP address is all binary zeros, that address is the ____ identifier. a. subnetwork c. class b. broadcast d. multicast ____ 12. When the host portion of an IP address is all binary ones, that address is a ____ address. a. multicast c. subnetwork b. class d. broadcast ____ 13. ____ is based on assigning IP addresses on criteria other than octet boundaries.

CCNA IP Addressing

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: CCNA IP Addressing

Chapter 4

True/False

Indicate whether the statement is true or false.

____ 1. An IP address has 32 bits divided into four octets (four sets of eight binary digits).

____ 2. TCP/IP networks cannot use MAC addresses in communication.

____ 3. TCP/IP hosts use the combination of the IP address and the subnet mask to determine if other addresses are

local or remote.

____ 4. The allocation of network numbers based on CIDR has let to the depletion of IP addresses.

____ 5. Basic routing protocols such as RIP version 1 and IGRP support VLSM.

Multiple Choice

Identify the choice that best completes the statement or answers the question.

____ 6. A(n) ____ address identifies both a network and a host, so you can route communications through large

networks, including the Internet.

a. ARP c. IP

b. HMAC d. MAC

____ 7. It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is

reserved as the ____ address.

a. multicast c. broadcast

b. loopback d. unicast

____ 8. IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting.

a. A c. C

b. B d. D

____ 9. To determine how many digits are used for the network identifier, you must look at the ____, which is a

required component for all IP hosts.

a. subnet mask c. network mask

b. MAC mask d. TCP/IP mask

____ 10. ____ broadcasts are for a specific subnet.

a. Flooded c. Half-duplex

b. Directed d. Full-duplex

____ 11. When the host portion of an IP address is all binary zeros, that address is the ____ identifier.

a. subnetwork c. class

b. broadcast d. multicast

____ 12. When the host portion of an IP address is all binary ones, that address is a ____ address.

a. multicast c. subnetwork

b. class d. broadcast

____ 13. ____ is based on assigning IP addresses on criteria other than octet boundaries.

Page 2: CCNA IP Addressing

a. ARIN c. CIDR

b. IANNA d. VLSR

____ 14. The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask.

a. prefix c. route mask

b. suffix d. mask table

____ 15. ____ tell the computer or router which part of an IP address is the network portion and which part is the host

portion.

a. CIDR tables c. Subnet masks

b. Summarization tables d. Router masks

____ 16. In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on

different subnets.

a. classful c. class-based

b. class-dependant d. classless

____ 17. The decimal number 192 expressed in binary is ____.

a. 10000101 c. 11010010

b. 11000000 d. 11100100

____ 18. The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.

a. binary c. hexadecimal

b. decimal d. vigesimal

____ 19. Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters,

it really is an efficient way to express large numbers such as MAC and IPv6 addresses.

a. 2 c. 20

b. 16 d. 21

____ 20. ____ is the version of IP currently deployed on most systems today.

a. IPX c. IPv6

b. IP2 d. IPv4

____ 21. ____ was originally designed to address the eventual depletion of IPv4 addresses.

a. IPv6 c. IP2

b. IPX d. IPNext

____ 22. ____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all

sizes.

a. IPSec c. ARP

b. NAT d. CIDR

____ 23. ____ is the most important layer 3 security protocol.

a. IPSec c. DNS

b. ARP d. NAT

____ 24. IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process

traffic not ultimately destined for them.

a. multicasting c. unicasting

b. anycasting d. broadcasting

____ 25. The ____ transition method involves enabling IPv6 on all routers, switches, and end nodes but not disabling

IPv4—so both version 4 and version 6 stacks run at the same time.

Page 3: CCNA IP Addressing

a. scheduling c. dual stack

b. tunneling d. natting

____ 26. ____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets.

a. Tunneling c. Natting

b. Scheduling d. Dual stack

Completion

Complete each statement.

27. The ____________________ devised the hierarchical IP addressing structure.

28. ____________________ is the sending of a stream of data (usually audio and video) to multiple computers

simultaneously.

29. ____________________ broadcasts are broadcasts for any subnet and use the IP address 255.255.255.255.

30. The purpose of ____________________ is to allow many IP subnets to be advertised as one.

31. ____________________ solves the design problem of basic subnetting by allowing different masks on the

subnets.

Matching

Match each item with a statement below:

a. ARIN f. RIP version 1

b. ICANN g. OSPF

c. Subnet mask h. Nibble

d. CIDR i. IPv6

e. Summarization

____ 32. a classless routing protocol

____ 33. the next generation of IP

____ 34. indicates how much of the IP address represents the network or subnet

____ 35. also known as route aggregation

____ 36. a global, government-independent entity with overall responsibility for the Internet

____ 37. four bits, which is half of a byte

____ 38. manages IP addresses in the United States

____ 39. developed to slow the exhaustion of IP addresses

____ 40. a classful routing protocol

Short Answer

41. Briefly describe the Class A IP addresses.

Page 4: CCNA IP Addressing

42. Briefly describe Class B IP addresses.

43. Briefly describe Class C IP addresses.

44. Describe private IP ranges.

45. What are the standard (default) subnet masks?

46. Describe the IP broadcast address.

47. What are some reasons to incorporate subnetting into an organization’s network?

48. What are the subnetting formulas?

49. Briefly describe the hexadecimal numbering system.

50. Describe the tunneling transition to IPv6 method.