SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Chapter 4

True/False
Indicate whether the statement is true or false.

____    1. An IP address has 32 bits divided into four octets (four sets of eight binary digits).

____    2. TCP/IP networks cannot use MAC addresses in communication.

____    3. TCP/IP hosts use the combination of the IP address and the subnet mask to determine if other addresses are
           local or remote.

____    4. The allocation of network numbers based on CIDR has let to the depletion of IP addresses.

____    5. Basic routing protocols such as RIP version 1 and IGRP support VLSM.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. A(n) ____ address identifies both a network and a host, so you can route communications through large
           networks, including the Internet.
           a. ARP                                         c. IP
           b. HMAC                                        d. MAC

____    7. It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is
           reserved as the ____ address.
           a. multicast                                      c. broadcast
           b. loopback                                       d. unicast

____    8. IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting.
           a. A                                          c. C
           b. B                                          d. D
____    9. To determine how many digits are used for the network identifier, you must look at the ____, which is a
           required component for all IP hosts.
           a. subnet mask                                 c. network mask
           b. MAC mask                                    d. TCP/IP mask
____ 10. ____ broadcasts are for a specific subnet.
         a. Flooded                                          c. Half-duplex
         b. Directed                                         d. Full-duplex
____ 11. When the host portion of an IP address is all binary zeros, that address is the ____ identifier.
         a. subnetwork                                    c. class
         b. broadcast                                     d. multicast
____ 12. When the host portion of an IP address is all binary ones, that address is a ____ address.
         a. multicast                                     c. subnetwork
         b. class                                         d. broadcast
____ 13. ____ is based on assigning IP addresses on criteria other than octet boundaries.
a. ARIN                                        c. CIDR
            b. IANNA                                       d. VLSR
____ 14. The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask.
         a. prefix                                    c. route mask
         b. suffix                                    d. mask table
____ 15. ____ tell the computer or router which part of an IP address is the network portion and which part is the host
         portion.
         a. CIDR tables                                  c. Subnet masks
         b. Summarization tables                         d. Router masks
____ 16. In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on
         different subnets.
         a. classful                                     c. class-based
         b. class-dependant                              d. classless
____ 17. The decimal number 192 expressed in binary is ____.
         a. 10000101                                   c. 11010010
         b. 11000000                                   d. 11100100
____ 18. The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.
         a. binary                                     c. hexadecimal
         b. decimal                                    d. vigesimal

____ 19. Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters,
         it really is an efficient way to express large numbers such as MAC and IPv6 addresses.
         a. 2                                              c. 20
         b. 16                                             d. 21

____ 20. ____ is the version of IP currently deployed on most systems today.
         a. IPX                                          c. IPv6
         b. IP2                                          d. IPv4
____ 21. ____ was originally designed to address the eventual depletion of IPv4 addresses.
         a. IPv6                                        c. IP2
         b. IPX                                         d. IPNext
____ 22. ____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all
         sizes.
         a. IPSec                                       c. ARP
         b. NAT                                         d. CIDR
____ 23. ____ is the most important layer 3 security protocol.
         a. IPSec                                         c. DNS
         b. ARP                                           d. NAT
____ 24. IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process
         traffic not ultimately destined for them.
         a. multicasting                                 c. unicasting
         b. anycasting                                   d. broadcasting

____ 25. The ____ transition method involves enabling IPv6 on all routers, switches, and end nodes but not disabling
         IPv4—so both version 4 and version 6 stacks run at the same time.
a. scheduling                                  c. dual stack
            b. tunneling                                   d. natting
____ 26. ____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets.
         a. Tunneling                                    c. Natting
         b. Scheduling                                   d. Dual stack


Completion
Complete each statement.

      27. The ____________________ devised the hierarchical IP addressing structure.

      28. ____________________ is the sending of a stream of data (usually audio and video) to multiple computers
          simultaneously.

      29. ____________________ broadcasts are broadcasts for any subnet and use the IP address 255.255.255.255.

      30. The purpose of ____________________ is to allow many IP subnets to be advertised as one.

      31. ____________________ solves the design problem of basic subnetting by allowing different masks on the
          subnets.


Matching

            Match each item with a statement below:
            a. ARIN                                        f.   RIP version 1
            b. ICANN                                       g.   OSPF
            c. Subnet mask                                 h.   Nibble
            d. CIDR                                        i.   IPv6
            e. Summarization
____ 32. a classless routing protocol
____ 33. the next generation of IP
____ 34. indicates how much of the IP address represents the network or subnet
____ 35. also known as route aggregation
____ 36. a global, government-independent entity with overall responsibility for the Internet
____ 37. four bits, which is half of a byte
____ 38. manages IP addresses in the United States
____ 39. developed to slow the exhaustion of IP addresses
____ 40. a classful routing protocol


Short Answer

      41. Briefly describe the Class A IP addresses.
42. Briefly describe Class B IP addresses.

43. Briefly describe Class C IP addresses.

44. Describe private IP ranges.

45. What are the standard (default) subnet masks?

46. Describe the IP broadcast address.

47. What are some reasons to incorporate subnetting into an organization’s network?

48. What are the subnetting formulas?

49. Briefly describe the hexadecimal numbering system.

50. Describe the tunneling transition to IPv6 method.

Mais conteúdo relacionado

Mais procurados

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Treegopi1985
 
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCSMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCVLSICS Design
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commandsAniket Thakur
 

Mais procurados (20)

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCSMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
 
Ch22
Ch22Ch22
Ch22
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Networking
NetworkingNetworking
Networking
 
Networks notes
Networks notesNetworks notes
Networks notes
 
Chenchu
ChenchuChenchu
Chenchu
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
Presentation on copy
Presentation  on   copyPresentation  on   copy
Presentation on copy
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
Bcs 061
Bcs 061Bcs 061
Bcs 061
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 

Semelhante a CCNA IP Addressing

Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)welcometofacebook
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questionsCarmenLamdegil
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020tadeseguchi
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020tadeseguchi
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdfVUPHUONGTHAO9
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docxDIPESH30
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networkssmumbahelp
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGNKylieJonathan
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module IIIAjit Nayak
 

Semelhante a CCNA IP Addressing (20)

Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
exam2
exam2exam2
exam2
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
2
22
2
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Ipv6 questions
Ipv6 questionsIpv6 questions
Ipv6 questions
 
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docxLab 18 Answer TemplateProblem 1IP address  192.168.10.0 27 (giv.docx
Lab 18 Answer TemplateProblem 1IP address 192.168.10.0 27 (giv.docx
 
De thi(1)
De thi(1)De thi(1)
De thi(1)
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networks
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN
 
Computer Networks Module III
Computer Networks Module IIIComputer Networks Module III
Computer Networks Module III
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 

Mais de Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

Mais de Dsunte Wilson (19)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 

Último

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Último (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

CCNA IP Addressing

  • 1. Chapter 4 True/False Indicate whether the statement is true or false. ____ 1. An IP address has 32 bits divided into four octets (four sets of eight binary digits). ____ 2. TCP/IP networks cannot use MAC addresses in communication. ____ 3. TCP/IP hosts use the combination of the IP address and the subnet mask to determine if other addresses are local or remote. ____ 4. The allocation of network numbers based on CIDR has let to the depletion of IP addresses. ____ 5. Basic routing protocols such as RIP version 1 and IGRP support VLSM. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. A(n) ____ address identifies both a network and a host, so you can route communications through large networks, including the Internet. a. ARP c. IP b. HMAC d. MAC ____ 7. It seems that 127.0.0.1 (decimal) is the highest assignable Class A address, but that particular address range is reserved as the ____ address. a. multicast c. broadcast b. loopback d. unicast ____ 8. IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting. a. A c. C b. B d. D ____ 9. To determine how many digits are used for the network identifier, you must look at the ____, which is a required component for all IP hosts. a. subnet mask c. network mask b. MAC mask d. TCP/IP mask ____ 10. ____ broadcasts are for a specific subnet. a. Flooded c. Half-duplex b. Directed d. Full-duplex ____ 11. When the host portion of an IP address is all binary zeros, that address is the ____ identifier. a. subnetwork c. class b. broadcast d. multicast ____ 12. When the host portion of an IP address is all binary ones, that address is a ____ address. a. multicast c. subnetwork b. class d. broadcast ____ 13. ____ is based on assigning IP addresses on criteria other than octet boundaries.
  • 2. a. ARIN c. CIDR b. IANNA d. VLSR ____ 14. The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask. a. prefix c. route mask b. suffix d. mask table ____ 15. ____ tell the computer or router which part of an IP address is the network portion and which part is the host portion. a. CIDR tables c. Subnet masks b. Summarization tables d. Router masks ____ 16. In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets. a. classful c. class-based b. class-dependant d. classless ____ 17. The decimal number 192 expressed in binary is ____. a. 10000101 c. 11010010 b. 11000000 d. 11100100 ____ 18. The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number. a. binary c. hexadecimal b. decimal d. vigesimal ____ 19. Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC and IPv6 addresses. a. 2 c. 20 b. 16 d. 21 ____ 20. ____ is the version of IP currently deployed on most systems today. a. IPX c. IPv6 b. IP2 d. IPv4 ____ 21. ____ was originally designed to address the eventual depletion of IPv4 addresses. a. IPv6 c. IP2 b. IPX d. IPNext ____ 22. ____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all sizes. a. IPSec c. ARP b. NAT d. CIDR ____ 23. ____ is the most important layer 3 security protocol. a. IPSec c. DNS b. ARP d. NAT ____ 24. IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process traffic not ultimately destined for them. a. multicasting c. unicasting b. anycasting d. broadcasting ____ 25. The ____ transition method involves enabling IPv6 on all routers, switches, and end nodes but not disabling IPv4—so both version 4 and version 6 stacks run at the same time.
  • 3. a. scheduling c. dual stack b. tunneling d. natting ____ 26. ____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets. a. Tunneling c. Natting b. Scheduling d. Dual stack Completion Complete each statement. 27. The ____________________ devised the hierarchical IP addressing structure. 28. ____________________ is the sending of a stream of data (usually audio and video) to multiple computers simultaneously. 29. ____________________ broadcasts are broadcasts for any subnet and use the IP address 255.255.255.255. 30. The purpose of ____________________ is to allow many IP subnets to be advertised as one. 31. ____________________ solves the design problem of basic subnetting by allowing different masks on the subnets. Matching Match each item with a statement below: a. ARIN f. RIP version 1 b. ICANN g. OSPF c. Subnet mask h. Nibble d. CIDR i. IPv6 e. Summarization ____ 32. a classless routing protocol ____ 33. the next generation of IP ____ 34. indicates how much of the IP address represents the network or subnet ____ 35. also known as route aggregation ____ 36. a global, government-independent entity with overall responsibility for the Internet ____ 37. four bits, which is half of a byte ____ 38. manages IP addresses in the United States ____ 39. developed to slow the exhaustion of IP addresses ____ 40. a classful routing protocol Short Answer 41. Briefly describe the Class A IP addresses.
  • 4. 42. Briefly describe Class B IP addresses. 43. Briefly describe Class C IP addresses. 44. Describe private IP ranges. 45. What are the standard (default) subnet masks? 46. Describe the IP broadcast address. 47. What are some reasons to incorporate subnetting into an organization’s network? 48. What are the subnetting formulas? 49. Briefly describe the hexadecimal numbering system. 50. Describe the tunneling transition to IPv6 method.