Deck 4: Ip Addressing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 4: Ip Addressing
1
The decimal number 192 expressed in binary is ____.
A) 10000101
B) 11000000
C) 11010010
D) 11100100
A) 10000101
B) 11000000
C) 11010010
D) 11100100
B
2
A(n) ____ address identifies both a network and a host, so you can route communications through large networks, including the Internet.
A) ARP
B) HMAC
C) IP
D) MAC
A) ARP
B) HMAC
C) IP
D) MAC
C
3
TCP/IP networks cannot use MAC addresses in communication.
False
4
____ is the version of IP currently deployed on most systems today.
A) IPX
B) IP2
C) IPv6
D) IPv4
A) IPX
B) IP2
C) IPv6
D) IPv4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ is based on assigning IP addresses on criteria other than octet boundaries.
A) ARIN
B) IANNA
C) CIDR
D) VLSR
A) ARIN
B) IANNA
C) CIDR
D) VLSR
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
TCP/IP hosts use the combination of the IP address and the subnet mask to determine if other addresses are local or remote.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Basic routing protocols such as RIP version 1 and IGRP support VLSM.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ tell the computer or router which part of an IP address is the network portion and which part is the host portion.
A) CIDR tables
B) Summarization tables
C) Subnet masks
D) Router masks
A) CIDR tables
B) Summarization tables
C) Subnet masks
D) Router masks
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The allocation of network numbers based on CIDR has let to the depletion of IP addresses.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask.
A) prefix
B) suffix
C) route mask
D) mask table
A) prefix
B) suffix
C) route mask
D) mask table
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
When the host portion of an IP address is all binary ones, that address is a ____ address.
A) multicast
B) class
C) subnetwork
D) broadcast
A) multicast
B) class
C) subnetwork
D) broadcast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is reserved as the ____ address.
A) multicast
B) loopback
C) broadcast
D) unicast
A) multicast
B) loopback
C) broadcast
D) unicast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
An IP address has 32 bits divided into four octets (four sets of eight binary digits).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
To determine how many digits are used for the network identifier, you must look at the ____, which is a required component for all IP hosts.
A) subnet mask
B) MAC mask
C) network mask
D) TCP/IP mask
A) subnet mask
B) MAC mask
C) network mask
D) TCP/IP mask
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
When the host portion of an IP address is all binary zeros, that address is the ____ identifier.
A) subnetwork
B) broadcast
C) class
D) multicast
A) subnetwork
B) broadcast
C) class
D) multicast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC and IPv6 addresses.
A) 2
B) 16
C) 20
D) 21
A) 2
B) 16
C) 20
D) 21
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ broadcasts are for a specific subnet.
A) Flooded
B) Directed
C) Half-duplex
D) Full-duplex
A) Flooded
B) Directed
C) Half-duplex
D) Full-duplex
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.
A) binary
B) decimal
C) hexadecimal
D) vigesimal
A) binary
B) decimal
C) hexadecimal
D) vigesimal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting.
A) A
B) B
C) C
D) D
A) A
B) B
C) C
D) D
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets.
A) classful
B) class-dependant
C) class-based
D) classless
A) classful
B) class-dependant
C) class-based
D) classless
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The ____________________ devised the hierarchical IP addressing structure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets.
A) Tunneling
B) Scheduling
C) Natting
D) Dual stack
A) Tunneling
B) Scheduling
C) Natting
D) Dual stack
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Briefly describe the hexadecimal numbering system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all sizes.
A) IPSec
B) NAT
C) ARP
D) CIDR
A) IPSec
B) NAT
C) ARP
D) CIDR
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ is the most important layer 3 security protocol.
A) IPSec
B) ARP
C) DNS
D) NAT
A) IPSec
B) ARP
C) DNS
D) NAT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the standard (default) subnet masks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
What are the subnetting formulas?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Briefly describe Class C IP addresses.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The ____ transition method involves enabling IPv6 on all routers, switches, and end nodes but not disabling IPv4-so both version 4 and version 6 stacks run at the same time.
A) scheduling
B) tunneling
C) dual stack
D) natting
A) scheduling
B) tunneling
C) dual stack
D) natting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ is the sending of a stream of data (usually audio and video) to multiple computers simultaneously.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ solves the design problem of basic subnetting by allowing different masks on the subnets.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
____________________ broadcasts are broadcasts for any subnet and use the IP address 255.255.255.255.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Briefly describe the Class A IP addresses.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Describe the IP broadcast address.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Describe private IP ranges.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The purpose of ____________________ is to allow many IP subnets to be advertised as one.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____ was originally designed to address the eventual depletion of IPv4 addresses.
A) IPv6
B) IPX
C) IP2
D) IPNext
A) IPv6
B) IPX
C) IP2
D) IPNext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly describe Class B IP addresses.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process traffic not ultimately destined for them.
A) multicasting
B) anycasting
C) unicasting
D) broadcasting
A) multicasting
B) anycasting
C) unicasting
D) broadcasting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are some reasons to incorporate subnetting into an organization's network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the tunneling transition to IPv6 method.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck