1. Please select all of the valid IP addresses. Check all that apply.
Answers
·
8.8.8.8
·
123.456.123.456
·
192.168.1.1
·
257.70.312.49
Explanation: These
are examples of valid IP addresses in both IPv4 and IPv6 formats. It is
important to keep in mind that legitimate IP addresses must correspond to the
standards set for either IPv4 or IPv6, as well as particular rules and ranges
that govern them.
2. How many IP addresses
does a class C network have?
Answers
·
16,777,216 addresses
·
256 addresses
·
65,536 addresses
·
1 address
Explanation: A
certain range of Internet Protocol (IP) addresses is used by a Class C network.
A Class C network in the context of IPv4 addressing contains 256 addresses,
however the addresses that may actually be used for hosts are often just 254.
This is due to the fact that the first and final addresses in the range are set
aside specifically for the purposes of network identification and broadcast,
respectively.
A Class C network may have any IP address in the range
192.0.0.0 to 223.255.255.255 as its domain name. A Class C network has a subnet
mask of 255.255.255.0, which indicates that the first three octets describe the
network and the final octet is free for host addresses to be assigned to it.
Therefore, a Class C network has the potential to support
28 IP addresses, or 256, but two of those addresses are set aside for the
purposes of network identification and broadcasting. This leaves 254 addresses
that may be used by hosts that are part of that network.
3. Which IP address
class has the first two octets reserved for the network ID and the last two
octets for the host ID?
Answers
·
Class B
·
Class A
·
Class E
·
Class C addresses
Explanation: Class B is the IP address class that
has the first two octets designated for the network ID and the final two octets
reserved for the host ID. Both of these octets are located at the end of the
address. The network part of a Class B IP address takes up the first 16 bits
(two octets), while the host address portion of the address takes up the
remaining 16 bits (two octets) of the Class B IP address.
4. The ____ is used to
indicate that the datagram is allowed to be fragmented or to indicate that the
datagram has already been fragmented.
Answers
·
service type field
·
fragmentation offset field
·
total length field
·
flag field
Explanation: The
"Fragmentation" field in the IP header is used to either signal that
the datagram has already been fragmented or that it may be fragmented in the
future. It may also be used to indicate that the datagram may be fragmented in
the future. This section of the IP (Internet Protocol) header is responsible
for managing the transmission of data across networks that have varying Maximum
Transmission Unit (MTU) sizes. The IP header is a component of the Internet
Protocol. The Fragmentation field includes flags such as "Don't Fragment
(DF)" and "More Fragments (MF)" to control the fragmentation
process.
5. The IP address
assigned to a device would depend on the _______ it is connected.
Answers
·
network
·
ARP
·
MAC addresses
·
IP datagram
Explanation: The IP address that is given to a piece of hardware is determined by the network to which it is attached. IP addresses are used to uniquely identify devices that are part of a network. These addresses are allocated depending on the architecture of the network. Each device connected to a network must have a unique IP address to facilitate communication and data exchange within that network. In most cases, network administrators or Dynamic Host Configuration Protocol (DHCP) servers are responsible for managing the assignment of IP addresses. However, in the event of dynamic IP address allocation, this responsibility may shift.
6. What does CIDR stand
for?
Answers
·
Classful Identification Routing
·
Class Interconnect Destination Routing
·
Classful Interlink-Destination Routing
·
Classless Inter-Domain
Routing
Explanation: Classless
Inter-Domain Routing is what CIDR, or just CIDR, stands for. The old approach,
which is based on classes (Class A, Class B, and Class C networks), is less
flexible than the CIDR technique, which is used to assign and describe IP
addresses and their routing in a manner that is more adaptable.
CIDR makes it possible to aggregate IP addresses into
blocks, doing away with the need for strictly delineated class boundaries. It
is denoted by an IP address, which is then followed by a forward slash and a
decimal number. This number represents the number of bits that are used for the
network component. For example, "192.168.1.0/24" denotes a CIDR
notation where the first 24 bits represent the network, and the remaining 8
bits are available for host addresses.
Through helping to optimize the distribution of IP
addresses and reducing the size of routing tables, CIDR contributes to the
improvement of the effectiveness of Internet routing.
7. Which of the
following is a correct form of CIDR notation?
Answers
·
192.168.1.0 + 255.255.255.0
·
192.168.1.0/24
·
192.168.1.0:24
·
192.168.1.0\24
Explanation: The
right way to write CIDR, which stands for Classless Inter-Domain Routing, is an
IP address followed by a forward slash and a decimal number that indicates the
number of bits that are utilized for the network component.
8. How many octets does
a subnet mask have?
Answers
·
4
·
1
·
3
·
2
Explanation: A
subnet mask is made up of 32 bits and is often shown in dotted-decimal format
so that it can be read by humans. Each set of 8 bits in the binary
representation of the subnet mask is represented as a dotted-decimal octet,
which means that each octet in the dotted-decimal notation has 8 bits.
As a result, a subnet mask is comprised of four octets.
When expressed in decimal form, an octet looks like a sequence of four integers
separated by dots (for example, 255.255.255.0), since each octet is equivalent
to one byte.
Within a particular network, the subnet mask is an
extremely important component in the process of determining the network and
host components of an IP address. The number of consecutive "1" bits
in the subnet mask indicates the length of the network prefix, determining the
size of the network and the number of available host addresses.
9. Consider the
following scenario:
Your IP address is 192.168.8.34, and your subnet mask is 255.255.0.0. What part
of the subnet mask represents the subnet ID?
Answers
·
The last two octets of the subnet
mask, 0.0
·
The first two octets of
the subnet mask, 255.255
·
192.168.0.254
· 255.255.0.1
10. How many possible
host IDs do you always lose per network?
Answers
·
2
·
12
·
4
·
8
11. Which of the
following are types of Interior Gateway Protocols? (Select all that apply)
Answers
·
Link State Routing
Protocols
·
Distance-Vector Protocols.
·
Hypertext Transfer Protocol
·
Transmission Control Protocol
Explanation: These protocols were developed specifically for the purpose of routing inside an autonomous system (AS), and they are used by routers that are part of the same network to communicate routing information with one another. In comparison, Exterior Gateway Protocols (EGPs), which are used for the process of routing data between various autonomous systems, are described below.
12. Who is permitted to
use non-routable address space?
Answers
·
It’s for testing purposes only
·
The IANA
·
The IETF
·
Anyone
Explanation: Address space that is not meant to be
routable on the public Internet is referred to as non-routable address space.
This address space is sometimes referred to as private IP address space. It is
reserved for usage only inside private networks. RFC 1918 details the
procedures for using address space that is not routable.
13. A typical routing
table may contain which of the following? Check all that apply.
Answers
·
Total Hops
·
TTL
·
Destination Network
· Destination address
14. What is the
difference between Interior Gateway Protocols and Exterior Gateway Protocols?
Answers
·
Interior gateway protocols share
information with public networks. Exterior gateway protocols are used for
private networks.
·
Interior Gateway Protocols
share information within a single autonomous system. Exterior Gateway Protocols
are used for the exchange of information between multiple autonomous systems.
·
Interior gateway protocols share
information with multiple autonomous systems. Exterior Gateway Protocols are
used for the exchange of information between independent autonomous systems.
·
There is no difference between them.
Explanation: IGPs
are used for routing inside a single organization or network (within the
borders of an AS), but EGPs are used for routing across several organizations
or networks (across the boundaries of ASes). In conclusion, IGPs are used for
intra-organizational routing, whilst EGPs are utilized inter-organizational
routing. Each component fulfills a unique function that contributes to the
overarching architecture of the Internet and other large-scale networks.
15. Which of the
following are non-routable IP addresses? (Select all that apply)
Answers
·
172.16.0.0/12
·
192.168.0.0/16
·
9.0.0.0
·
10.0.0.0/8
16. No matter where a device is
used, what address will stay the same regardless of the network it is attached
to?
Answers
·
Physical, or MAC, address
·
Dynamic
IP address
·
Static
IP address
·
EIN
serial
In
contrast to IP addresses, which might shift depending on the network setup and
location, the media access control (MAC) address will never change for a given
network interface no matter how long the device in question is in use. It is
hardcoded into the NIC by the manufacturer and serves as a globally unique
identifier for that particular hardware.
In the OSI
model, the media access control address (MAC address) is utilized at the data
connection layer. This address is critical to the operation of Ethernet as well
as other networking protocols. It is normally not utilized for routing traffic
across various networks since it is only intended for usage inside a network
segment for the purpose of local communication.
Answers
·
16
·
8
·
2
·
4
Answers
·
Fragmentation
·
Clustering
·
NAT
firewall
·
Load
balancing
The
initial datagram is broken up into a number of smaller pieces, each of which
may be sent across the network without exceeding its maximum transmission unit
(MTU). These fragments can be transmitted independently to reach the
destination, where they are reassembled to reconstruct the original datagram.
The Internet Protocol (IP) includes specifications for the fragmentation and
reassembly procedures in order to permit the transfer of data across networks
that have varied maximum transmission unit sizes.
Answers
·
0 through 127
·
255
through 420
·
0
through 255
·
128
through 199
Answers
·
Anonymous
Resource Protocol
·
Augmented
Resolution Picture
·
Address Resolution Protocol
·
Aggressive
Resource Protection
Answers
·
Costless
Inter-Data Routing
·
Classless Inter-Domain Routing
·
Clear
Inter-Developer Relations
·
Classic
Intra-Demo Ratings
Answers
·
The
router examines the destination IP of this packet.
·
Sent
an ARP response.
·
Check
the routing table.
·
A router receives a packet of data.
Answers
·
Modern
encryption standards
·
Manual
updating
·
Less
memory and less processing power
·
More memory and more processing power
Answers
·
ICANN
·
INNA
·
IANA
·
IBM
Answers
·
Realtime
Frame Check
·
Request For Comments
·
Redundant
Frame Controller
·
Routing
Frequency Control
Answers
·
Octuplet
·
Figure
eight
·
Octoploid
·
Octet
Answers
·
64
bits
·
32 bits
·
8
bits
·
256
bits
Answers
·
128.42.39.72
·
172.38.14.72
·
224.24.45.69
·
192.37.48.98
29.
When describing blocks of IP addresses, what does CIDR do?
Answers
·
Interpolates
data across multiple servers
·
Calls
back to the source router for confirmation
·
Uses subnet masks to demarcate networks.
·
Encrypts
the header data
Answers
·
Distance-vector
·
Link
state
·
Interior
gateway
·
Exterior gateway
Answers
·
192.168.0.0/16
·
172.16.0.0/12
·
255.255.255.0/1
·
10.0.0.0/8
Answers
·
If
a datagram should be scanned for viruses
·
If
a datagram has degraded and become unusable
·
If
a datagram is high or low priority
·
If a datagram is allowed to or has already been fragmented
Answers
·
A
router receives a packet of data.
·
The
router examines the destination IP of this packet.
·
Check
the routing table.
·
Sent
an ARP response.
Answers
·
MAC
address
·
Non-routable address space
·
Subnet
mask
·
IP
address
Answers
·
598.36.789
·
126.396.659.100
·
128.42.64.78
·
A8:97:4F:6D:H6:0F
Answers
·
0-255
·
0-250
·
1-255
·
0-155
Answers
·
The router looks up the destination network in
its routing table.
·
The
router forwards the packet.
·
The
router examines the destination IP.
·
A
router receives a packet of data.
Answers
·
CIDR
·
Multicasting
·
Broadcasting
·
Testing
Answers
·
To
keep space in the table
·
It
will use too much memory
·
It
only needs to be used one time
·
To
account for network changes
Answers
·
Total length field
·
Identification field
·
Service Type field
· Fragmentation offset field
41. What is the purpose
of an ARP response?
Answers
·
To improve authentication security
·
To prevent a flood of UDP packets
·
To let a broadcasting node
know what is the MAC address to put into the destination hardware address field
·
To send an ACK message to the
broadcasting computer
Explanation: ARP is required because the software address, also known as the IP address, of the host computer or computer that is connected to the network has to be converted into the hardware address, also known as the MAC address. A host would be unable to determine the hardware address of another host if it did not have access to the ARP protocol.
42. What is one main
reason CIDR is helpful in modern networking?
Answers
·
CIDR increases network security with
no additional resources
·
CIDR simplifies MAC address assignment
·
CIDR lowers the amount of power needed
to run a server
·
CIDR allows for more
arbitrary network sizes
Explanation: Send the data as promptly as possible. CIDR enables routers to more effectively arrange IP addresses into different subnets than was previously possible. A smaller network that is contained inside a larger network is referred to as a subnet. As an example, all of the electronic gadgets that are linked to a router are included in the same subnet and share the same IP address prefix.
43. Interior gateway
protocols are used by routers in order to share information within a single…
Answers
·
subnet
·
autonomous system
·
collision domain
·
destination network
Explanation: A
dynamic route update protocol that is utilized between routers that operate on
TCP/IP hosts inside a single autonomous system is referred to as an internal
gateway protocol, or IGP for short. The routers use this protocol to exchange
information about IP routes.