1. Please select all of the valid IP addresses. Check all that apply.
Answers
· 8.8.8.8
· 123.456.123.456
· 192.168.1.1
· 257.70.312.49
Explanation: These are examples of valid IP addresses in both IPv4 and IPv6 formats. It is important to keep in mind that legitimate IP addresses must correspond to the standards set for either IPv4 or IPv6, as well as particular rules and ranges that govern them.
2. How many IP addresses does a class C network have?
Answers
· 16,777,216 addresses
· 256 addresses
· 65,536 addresses
· 1 address
Explanation: A certain range of Internet Protocol (IP) addresses is used by a Class C network. A Class C network in the context of IPv4 addressing contains 256 addresses, however the addresses that may actually be used for hosts are often just 254. This is due to the fact that the first and final addresses in the range are set aside specifically for the purposes of network identification and broadcast, respectively.
A Class C network may have any IP address in the range 192.0.0.0 to 223.255.255.255 as its domain name. A Class C network has a subnet mask of 255.255.255.0, which indicates that the first three octets describe the network and the final octet is free for host addresses to be assigned to it.
Therefore, a Class C network has the potential to support 28 IP addresses, or 256, but two of those addresses are set aside for the purposes of network identification and broadcasting. This leaves 254 addresses that may be used by hosts that are part of that network.
3. Which IP address class has the first two octets reserved for the network ID and the last two octets for the host ID?
Answers
· Class B
· Class A
· Class E
· Class C addresses
Explanation: Class B is the IP address class that has the first two octets designated for the network ID and the final two octets reserved for the host ID. Both of these octets are located at the end of the address. The network part of a Class B IP address takes up the first 16 bits (two octets), while the host address portion of the address takes up the remaining 16 bits (two octets) of the Class B IP address.
4. The ____ is used to indicate that the datagram is allowed to be fragmented or to indicate that the datagram has already been fragmented.
Answers
· service type field
· fragmentation offset field
· total length field
· flag field
Explanation: The "Fragmentation" field in the IP header is used to either signal that the datagram has already been fragmented or that it may be fragmented in the future. It may also be used to indicate that the datagram may be fragmented in the future. This section of the IP (Internet Protocol) header is responsible for managing the transmission of data across networks that have varying Maximum Transmission Unit (MTU) sizes. The IP header is a component of the Internet Protocol. The Fragmentation field includes flags such as "Don't Fragment (DF)" and "More Fragments (MF)" to control the fragmentation process.
5. The IP address assigned to a device would depend on the _______ it is connected.
Answers
· network
· ARP
· MAC addresses
· IP datagram
Explanation: The IP address that is given to a piece of hardware is determined by the network to which it is attached. IP addresses are used to uniquely identify devices that are part of a network. These addresses are allocated depending on the architecture of the network. Each device connected to a network must have a unique IP address to facilitate communication and data exchange within that network. In most cases, network administrators or Dynamic Host Configuration Protocol (DHCP) servers are responsible for managing the assignment of IP addresses. However, in the event of dynamic IP address allocation, this responsibility may shift.
6. What does CIDR stand for?
Answers
· Classful Identification Routing
· Class Interconnect Destination Routing
· Classful Interlink-Destination Routing
· Classless Inter-Domain Routing
Explanation: Classless Inter-Domain Routing is what CIDR, or just CIDR, stands for. The old approach, which is based on classes (Class A, Class B, and Class C networks), is less flexible than the CIDR technique, which is used to assign and describe IP addresses and their routing in a manner that is more adaptable.
CIDR makes it possible to aggregate IP addresses into blocks, doing away with the need for strictly delineated class boundaries. It is denoted by an IP address, which is then followed by a forward slash and a decimal number. This number represents the number of bits that are used for the network component. For example, "192.168.1.0/24" denotes a CIDR notation where the first 24 bits represent the network, and the remaining 8 bits are available for host addresses.
Through helping to optimize the distribution of IP addresses and reducing the size of routing tables, CIDR contributes to the improvement of the effectiveness of Internet routing.
7. Which of the following is a correct form of CIDR notation?
Answers
· 192.168.1.0 + 255.255.255.0
· 192.168.1.0/24
· 192.168.1.0:24
· 192.168.1.0\24
Explanation: The right way to write CIDR, which stands for Classless Inter-Domain Routing, is an IP address followed by a forward slash and a decimal number that indicates the number of bits that are utilized for the network component.
8. How many octets does a subnet mask have?
Answers
· 4
· 1
· 3
· 2
Explanation: A subnet mask is made up of 32 bits and is often shown in dotted-decimal format so that it can be read by humans. Each set of 8 bits in the binary representation of the subnet mask is represented as a dotted-decimal octet, which means that each octet in the dotted-decimal notation has 8 bits.
As a result, a subnet mask is comprised of four octets. When expressed in decimal form, an octet looks like a sequence of four integers separated by dots (for example, 255.255.255.0), since each octet is equivalent to one byte.
Within a particular network, the subnet mask is an extremely important component in the process of determining the network and host components of an IP address. The number of consecutive "1" bits in the subnet mask indicates the length of the network prefix, determining the size of the network and the number of available host addresses.
9. Consider the following scenario:
Your IP address is 192.168.8.34, and your subnet mask is 255.255.0.0. What part of the subnet mask represents the subnet ID?
Answers
· The last two octets of the subnet mask, 0.0
· The first two octets of the subnet mask, 255.255
· 192.168.0.254
· 255.255.0.1
10. How many possible host IDs do you always lose per network?
Answers
· 2
· 12
· 4
· 8
11. Which of the following are types of Interior Gateway Protocols? (Select all that apply)
Answers
· Link State Routing Protocols
· Distance-Vector Protocols.
· Hypertext Transfer Protocol
· Transmission Control Protocol
Explanation: These protocols were developed specifically for the purpose of routing inside an autonomous system (AS), and they are used by routers that are part of the same network to communicate routing information with one another. In comparison, Exterior Gateway Protocols (EGPs), which are used for the process of routing data between various autonomous systems, are described below.
12. Who is permitted to use non-routable address space?
Answers
· It’s for testing purposes only
· The IANA
· The IETF
· Anyone
Explanation: Address space that is not meant to be routable on the public Internet is referred to as non-routable address space. This address space is sometimes referred to as private IP address space. It is reserved for usage only inside private networks. RFC 1918 details the procedures for using address space that is not routable.
13. A typical routing table may contain which of the following? Check all that apply.
Answers
· Total Hops
· TTL
· Destination Network
· Destination address
14. What is the difference between Interior Gateway Protocols and Exterior Gateway Protocols?
Answers
· Interior gateway protocols share information with public networks. Exterior gateway protocols are used for private networks.
· Interior Gateway Protocols share information within a single autonomous system. Exterior Gateway Protocols are used for the exchange of information between multiple autonomous systems.
· Interior gateway protocols share information with multiple autonomous systems. Exterior Gateway Protocols are used for the exchange of information between independent autonomous systems.
· There is no difference between them.
Explanation: IGPs are used for routing inside a single organization or network (within the borders of an AS), but EGPs are used for routing across several organizations or networks (across the boundaries of ASes). In conclusion, IGPs are used for intra-organizational routing, whilst EGPs are utilized inter-organizational routing. Each component fulfills a unique function that contributes to the overarching architecture of the Internet and other large-scale networks.
15. Which of the following are non-routable IP addresses? (Select all that apply)
Answers
· 172.16.0.0/12
· 192.168.0.0/16
· 9.0.0.0
· 10.0.0.0/8
16. No matter where a device is used, what address will stay the same regardless of the network it is attached to?
Answers
· Physical, or MAC, address
· Dynamic IP address
· Static IP address
· EIN serial
In contrast to IP addresses, which might shift depending on the network setup and location, the media access control (MAC) address will never change for a given network interface no matter how long the device in question is in use. It is hardcoded into the NIC by the manufacturer and serves as a globally unique identifier for that particular hardware.
In the OSI model, the media access control address (MAC address) is utilized at the data connection layer. This address is critical to the operation of Ethernet as well as other networking protocols. It is normally not utilized for routing traffic across various networks since it is only intended for usage inside a network segment for the purpose of local communication.
Answers
· 16
· 8
· 2
· 4
Answers
· Fragmentation
· Clustering
· NAT firewall
· Load balancing
The initial datagram is broken up into a number of smaller pieces, each of which may be sent across the network without exceeding its maximum transmission unit (MTU). These fragments can be transmitted independently to reach the destination, where they are reassembled to reconstruct the original datagram. The Internet Protocol (IP) includes specifications for the fragmentation and reassembly procedures in order to permit the transfer of data across networks that have varied maximum transmission unit sizes.
Answers
· 0 through 127
· 255 through 420
· 0 through 255
· 128 through 199
Answers
· Anonymous Resource Protocol
· Augmented Resolution Picture
· Address Resolution Protocol
· Aggressive Resource Protection
Answers
· Costless Inter-Data Routing
· Classless Inter-Domain Routing
· Clear Inter-Developer Relations
· Classic Intra-Demo Ratings
Answers
· The router examines the destination IP of this packet.
· Sent an ARP response.
· Check the routing table.
· A router receives a packet of data.
Answers
· Modern encryption standards
· Manual updating
· Less memory and less processing power
· More memory and more processing power
Answers
· ICANN
· INNA
· IANA
· IBM
Answers
· Realtime Frame Check
· Request For Comments
· Redundant Frame Controller
· Routing Frequency Control
Answers
· Octuplet
· Figure eight
· Octoploid
· Octet
Answers
· 64 bits
· 32 bits
· 8 bits
· 256 bits
Answers
· 128.42.39.72
· 172.38.14.72
· 224.24.45.69
· 192.37.48.98
29. When describing blocks of IP addresses, what does CIDR do?
Answers
· Interpolates data across multiple servers
· Calls back to the source router for confirmation
· Uses subnet masks to demarcate networks.
· Encrypts the header data
Answers
· Distance-vector
· Link state
· Interior gateway
· Exterior gateway
Answers
· 192.168.0.0/16
· 172.16.0.0/12
· 255.255.255.0/1
· 10.0.0.0/8
Answers
· If a datagram should be scanned for viruses
· If a datagram has degraded and become unusable
· If a datagram is high or low priority
· If a datagram is allowed to or has already been fragmented
Answers
· A router receives a packet of data.
· The router examines the destination IP of this packet.
· Check the routing table.
· Sent an ARP response.
Answers
· MAC address
· Non-routable address space
· Subnet mask
· IP address
Answers
· 598.36.789
· 126.396.659.100
· 128.42.64.78
· A8:97:4F:6D:H6:0F
Answers
· 0-255
· 0-250
· 1-255
· 0-155
Answers
· The router looks up the destination network in its routing table.
· The router forwards the packet.
· The router examines the destination IP.
· A router receives a packet of data.
Answers
· CIDR
· Multicasting
· Broadcasting
· Testing
Answers
· To keep space in the table
· It will use too much memory
· It only needs to be used one time
· To account for network changes
Answers
· Total length field
· Identification field
· Service Type field
· Fragmentation offset field
41. What is the purpose of an ARP response?
Answers
· To improve authentication security
· To prevent a flood of UDP packets
· To let a broadcasting node know what is the MAC address to put into the destination hardware address field
· To send an ACK message to the broadcasting computer
Explanation: ARP is required because the software address, also known as the IP address, of the host computer or computer that is connected to the network has to be converted into the hardware address, also known as the MAC address. A host would be unable to determine the hardware address of another host if it did not have access to the ARP protocol.
42. What is one main reason CIDR is helpful in modern networking?
Answers
· CIDR increases network security with no additional resources
· CIDR simplifies MAC address assignment
· CIDR lowers the amount of power needed to run a server
· CIDR allows for more arbitrary network sizes
Explanation: Send the data as promptly as possible. CIDR enables routers to more effectively arrange IP addresses into different subnets than was previously possible. A smaller network that is contained inside a larger network is referred to as a subnet. As an example, all of the electronic gadgets that are linked to a router are included in the same subnet and share the same IP address prefix.
43. Interior gateway protocols are used by routers in order to share information within a single…
Answers
· subnet
· autonomous system
· collision domain
· destination network
Explanation: A dynamic route update protocol that is utilized between routers that operate on TCP/IP hosts inside a single autonomous system is referred to as an internal gateway protocol, or IGP for short. The routers use this protocol to exchange information about IP routes.