Deck 2: Ip Addressing and Related Topics
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 2: Ip Addressing and Related Topics
1
What name is given to a device that interconnects multiple IP networks or subnets?
A)subnet mask
B)IP gateway
C)layer-3 switch
D)network address
A)subnet mask
B)IP gateway
C)layer-3 switch
D)network address
B
2
As a frame moves from interface to interface, the IP source and destination address information is preserved.
True
3
Which of the following technologies is used to permit computers to translate numeric IP addresses to MAC layer addresses?
A)ARP
B)RARP
C)Reverse proxying
D)Subnet masking
A)ARP
B)RARP
C)Reverse proxying
D)Subnet masking
A
4
To be valid, any domain name must correspond to at least one of which of the following?
A)loopback address
B)unique numeric IP address
C)firewall
D)IP gateway
A)loopback address
B)unique numeric IP address
C)firewall
D)IP gateway
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic that actually travels over the public Internet does not reveal the address structure of the internal network to outsiders?
A)loopback
B)proxy server
C)subnet mask
D)layer-3 switch
A)loopback
B)proxy server
C)subnet mask
D)layer-3 switch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.16.0.0-172.31.255.255), and 256 Class Cs (192.168.0.0-192.168.255.255)?
A)1517
B)1518
C)1878
D)1918
A)1517
B)1518
C)1878
D)1918
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
When a host uses a service that employs a multicast address, it registers itself to "listen" on that address, as well as on its own unique host address (and the broadcast address).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which term is used to describe the data frame crossing a router?
A)firewall
B)hop
C)loopback
D)dot squad
A)firewall
B)hop
C)loopback
D)dot squad
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A special bit pattern that "blocks off " the network portion of an IPv4 address with an all-ones pattern is known as which of the following?
A)reverse proxy
B)summary address
C)broadcast address
D)subnet mask
A)reverse proxy
B)summary address
C)broadcast address
D)subnet mask
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following represents a network address that all hosts on a network must read?
A)loopback
B)hop
C)broadcast address
D)dot squad
A)loopback
B)hop
C)broadcast address
D)dot squad
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What type of address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers?
A)symbolic address
B)logical numeric address
C)reverse proxy address
D)physical numeric address
A)symbolic address
B)logical numeric address
C)reverse proxy address
D)physical numeric address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which class of IP addresses are used for multicast communications, in which a single address may be associated with more than one network host machine?
A)Class A
B)Class B
C)Class C
D)Class D
A)Class A
B)Class B
C)Class C
D)Class D
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which technology allows networks use multiple private IPv4 addresses internally and maps them to one or more public IPv4 addresses externally?
A)DNS
B)IP gateway
C)NAT
D)VoIP
A)DNS
B)IP gateway
C)NAT
D)VoIP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
What protocol is used to translate MAC layer addresses into numeric IP addresses?
A)ARP
B)RARP
C)RIP
D)IP
A)ARP
B)RARP
C)RIP
D)IP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Previously, IPv6 specified that interface identifiers followed which format, which specifies a unique 64-bit interface identifier for each interface?
A)RFC 4941
B)EUI-64
C)EULA-64
D)IEEE 802.64v6
A)RFC 4941
B)EUI-64
C)EULA-64
D)IEEE 802.64v6
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Providing a narrower address space is the primary design goal for IPv6.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Multicast addresses in IPv6 use which of the following to define the portion of the Internet to which the multicast group pertains?
A)scope identifier
B)interface identifier
C)loopback identifier
D)aggregatable global unicast address
A)scope identifier
B)interface identifier
C)loopback identifier
D)aggregatable global unicast address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Class D addresses are used strictly for unicast applications.
Indicate the answer choice that best completes the statement or answers the question.
Indicate the answer choice that best completes the statement or answers the question.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
What technique may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server?
A)IP renumbering
B)Supernetting
C)Address masquerading
D)Subnetting
A)IP renumbering
B)Supernetting
C)Address masquerading
D)Subnetting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?
A)Route aggregation
B)Address masquerading
C)NAT
D)Classless Inter-Domain Routing
A)Route aggregation
B)Address masquerading
C)NAT
D)Classless Inter-Domain Routing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
an IPv6 address that is all zeros except for the very last bit, which is set to 1 and may be represented as ::1 in compact notation
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
an IPv6 address that is all zeros except for the very last bit, which is set to 1 and may be represented as ::1 in compact notation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
a type of networking device that combines switch, router, and network management functions within a single box
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
a type of networking device that combines switch, router, and network management functions within a single box
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
in IPv6 addressing, a bit string that uniquely identifies a particular interface
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
in IPv6 addressing, a bit string that uniquely identifies a particular interface
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
In IPv6, which address contains all zeros and can be represented as two colon characters (::) in normal notation?
A)anycast
B)broadcast
C)multicast
D)unspecified
A)anycast
B)broadcast
C)multicast
D)unspecified
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
packets goes to the nearest single instance of this address
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
packets goes to the nearest single instance of this address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The physical numeric address functions at a sublayer of the Data Link layer in the OSI network reference model, called the ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
a way of reducing the number of individual routing table entries that routers must manage
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
a way of reducing the number of individual routing table entries that routers must manage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
an addressing scheme that is designed to be used only on a single segment of a local network
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
an addressing scheme that is designed to be used only on a single segment of a local network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
an address that can be combined with other addresses into a single entry in the router table
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
an address that can be combined with other addresses into a single entry in the router table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ combines contiguous network addresses by stealing bits from the network portion and using them to create a single, larger contiguous address space for host addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
allows internetwork devices to perform complex address recognition and management functions that can keep up with data volumes and time-sensitive processing needs
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
allows internetwork devices to perform complex address recognition and management functions that can keep up with data volumes and time-sensitive processing needs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following allows IPv4 addresses from Class A, B, or C to be combined and treated as a larger address space, or subdivided arbitrarily, as needed?
A)Supernetting
B)Classless Inter-Domain Routing
C)Subnet masking
D)Address masquerading
A)Supernetting
B)Classless Inter-Domain Routing
C)Subnet masking
D)Address masquerading
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
In IPv6, _________________________ addresses are used to send an identical message to multiple hosts.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
In which subnetting technique can a single address to be subdivided into multiple subnets, in which subnets need not all be the same size?
A)IP gateway
B)constant-length subnet masking
C)variable-length subnet masking
D)IP renumbering
A)IP gateway
B)constant-length subnet masking
C)variable-length subnet masking
D)IP renumbering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The activity of stealing (borrowing) bits from the host portion to further subdivide the network portion of an address is called ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which technique is known as the simplest form of subnet masking in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments?
A)constant-length subnet masking
B)firewall
C)dot squad
D)anycast
Enter the appropriate word(s) to complete the statement.
A)constant-length subnet masking
B)firewall
C)dot squad
D)anycast
Enter the appropriate word(s) to complete the statement.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
a 4-bit field limiting the valid range for a multicast address
a.interface identifier
b.anycast address
c.scope identifier
d.loopback address
e.aggregatable global unicast address
f.link-local address
g.route aggregation
h.application-specific integrated circuits
i.Layer 3 switch
a 4-bit field limiting the valid range for a multicast address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When a computer on one subnet wishes to communicate with a computer on another subnet, traffic must be forwarded from the sender to which of the following devices?
A)broadcast server
B)IP gateway
C)firewall
D)proxy server
A)broadcast server
B)IP gateway
C)firewall
D)proxy server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
____________________ informs the network interface card to pass packets sent to that address to the IP stack so their contents can be read, and tells the IP gateway to forward such traffic onto the physical network, where the listening network interface resides.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are the limitations of creating a CIDR address?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Give two reasons why you should use binary boundaries.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Briefly discuss IPs three-part addressing scheme.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How can you express native IPv6 addresses in URLs?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Why are concepts such as subnets and supernets important for TCP/IP networks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Briefly describe how to calculate subnet masks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Most organizations need public IP addresses only for two classes of equipment. Briefly describe each of these classes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are some of the design goals for IPv6?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What are the disadvantages of using private IP addresses?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List the constraints that determine the number and size of networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck