Chapter 1 - IPv4 Design Flashcards

1
Q

Which of the following addresses is an IPv4 private address?

  1. 198.176.1.1
  2. 172.31.16.1
  3. 191.168.1.1
  4. 224.130.1.1
A

B. Private IPv4 address blocks are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255.255, and 192.168.0.0 to 192.168.255.255.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many IP addresses are available for hosts in the subnet 198.10.100.64/27?

  1. 14
  2. 30
  3. 62
  4. 126
A

B. There are 5 host bits: 25 − 2 = 30 hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What subnet mask should you use in loopback addresses?

  1. 255.255.255.252
  2. 255.255.255.254
  3. 255.255.255.0
  4. 255.255.255.255
A

D. Loopback addresses should have a /32 mask so that address space is not wasted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In what IPv4 field are the precedence bits located?

  1. Priority field
  2. IP Protocol field
  3. Type of Service field
  4. IP Options field
A

C. The precedence bits are located in the Type of Service field of the IPv4 header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of address is 225.10.1.1?

  1. Unicast
  2. Multicast
  3. Broadcast
  4. Anycast
A

B. Multicast addresses range from 224.0.0.1 to 239.255.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which subnetworks are summarized by the summary route 150.10.192.0/21?

  1. 150.10.192.0/24, 150.10.193.0/24
  2. 150.10.192.0/22, 150.10.196.0/23, 150.10.197.0/24
  3. 150.10.192.0/22, 150.10.199.0/22
  4. 150.10.192.0/23, 150.10.194.0/23, 150.10.196.0/23, 150.10.199.0/24, 150.10.198.0/24
A

D. The summary route summarizes subnetworks from 150.10.192.0/24 to 150.10.199.0/24. Answer D is the only one that includes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of network and subnet mask would you use to save address space in a point-to-point WAN link?

  1. 100.100.10.16/26
  2. 100.100.10.16/28
  3. 100.100.10.16/29
  4. 100.100.10.16/30
A

D. Point-to-point links need only two host addresses. They use a /30 mask, which provides 22 − 2 = 2 host addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocol is used to automatically assign IP addresses?

  1. Dynamic Host Control Protocol
  2. Dedicated Host Configuration Protocol
  3. Dynamic Host Configuration Protocol
  4. Automatic Host Configuration Protocol
A

C. DHCP assigns IP addresses dynamically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company needs to use public IP addresses so that four network servers are accessible from the Internet. What technology is used to meet this requirement?

  1. DNS
  2. IPsec
  3. Static NAT
  4. Dynamic NAT
A

C. Static NAT is used to statically translate public IP addresses to private IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The DS field of DSCP is capable of how many codepoints?

  1. 8
  2. 32
  3. 64
  4. 128
A

C. The DS field allocates 6 bits in the ToS field, thus making it capable of 64 distinct codepoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How long is the IP header with no optional fields?

A

The IPv4 header is 20 bytes in length when it uses no optional fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: The IP header includes fields for the upper-layer protocol, one for prioritization, and one for fragmentation.

A

True.

See the attached header diagram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many bits is the Version field in the IP header? What does it contain?

A

Version: This field is 4 bits in length. It indicates the IP header’s format, based on the version number. Version 4 is the current version, and this field is set to 0100 (4 in binary) for IPv4 packets. The Version field is set to 0110 (6 in binary) in IPv6 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the IHL field in the IPv4 header? How long is this field?

A

IHL (Internet Header Length): This field is 4 bits in length. It indicates the length of the header in 32-bit words (4 bytes) so that the beginning of the data can be found in the IP header. The minimum value for a valid header is 5 (0101) for five 32-bit words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long is the ToS field in the IPv4 header? What does it contain?

A

ToS (Type of Service): This field is 8 bits in length. Quality of service (QoS) parameters such as IP precedence and DSCP are found in this field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the maximum length of an IP packet, in bytes, including the header and data?

What field in the IP header contains this information?

A

The maximum length of an IP packet can be 2^16 − 1 = 65,535 bytes. Routers use this field to determine whether fragmentation is necessary by comparing the total length with the outgoing MTU.

Total Length: This field is 16 bits in length. It represents the length of the datagram, or packet, in bytes, including the header and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What field in the IPv4 header denotes fragments for reassembly into an original IP packet?

A

Identification: This field is 16 bits in length. It is a unique identifier that denotes fragments for reassembly into an original IP packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which field in the IPv4 header indicates whether a packet can be fragmented or not?

A

Flags: This field is 3 bits in length. It indicates whether the packet can be fragmented and whether more fragments follow.

Bit 0 is reserved and set to 0.

Bit 1 indicates May Fragment (0) or Do Not Fragment (1).

Bit 2 indicates Last Fragment (0) or More Fragments to Follow (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which field in the IPv4 header indicates where in the packet a fragment belongs? How long is this field?

A

Fragment Offset: This field is 13 bits in length. It indicates (in bytes) where in the packet this fragment belongs. The first fragment has an offset of 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What field in the IPv4 header indicates to a router that the packet should be discarded because it has taken too many hops?

A

Time to Live: This field is 8 bits in length. It indicates the maximum time the packet is to remain on the network. Each router decrements this field by 1 for loop avoidance. If this field is 0, the packet must be discarded. This scheme permits routers to discard undeliverable packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What field in the IPv4 header indicates the upper-layer protocol?

How long is this field?

A

Protocol: This field is 8 bits in length. It indicates the upper-layer protocol. The Internet Assigned Numbers Authority (IANA) is responsible for assigning IP protocol values. Table 1-2 shows some key protocol numbers. You can find a full list at www.iana.org/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How many bits long is the “Header Checksum” field?

A

Header Checksum: This field is 16 bits in length. The checksum does not include the data portion of the packet in the calculation. The checksum is verified and recomputed at each point the IP header is processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T/F: The IP Options field in the IPv4 headers is variable in length.

A

True

IP Options: This field is variable in length. The options provide for control functions that are useful in some situations but unnecessary for the most common communications. Specific options are security, loose source routing, strict source routing, record route, and timestamp.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which field in the IPv4 header ensures that the IP headers ends on a 32-bit boundary?

A

Padding: This field is variable in length. It ensures that the IP header ends on a 32-bit boundary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the function of the ToS field in the IPv4 header?

A

The ToS field of the IP header is used to specify QoS parameters.

Routers and Layer 3 switches look at the ToS field to apply policies, such as priority, to IP packets based on the markings. An example is a router prioritizing time-sensitive IP packets over regular data traffic such as web or email, which is not time sensitive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the leftmost bits in the ToS field called and used for?

A

The first 3 (leftmost) bits are the IP precedence bits.

These bits define values that are used by QoS methods. The precedence bits especially help in marking packets to give them differentiated treatment with different priorities. For example, Voice over IP (VoIP) packets can get preferential treatment over regular data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the bits in the ToS field set to for “normal service” traffic

A

RFC 1349 redefined bits 3 and 6 (expanding for ToS bits) to reflect a desired type of service optimization. Table 1-5 shows the ToS field values that indicate service parameters to use for IP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How many levels of packet classification are provided by the DS field? What are these levels called?

A

The Differentiated Services field takes the form shown in Figure 1-2. The DS field provides more granular levels of packet classification by using 6 bits for packet marking. DS has 2^6 = 64 levels of classification, which is significantly higher than the eight levels of the IP precedence bits. These 64 levels are called codepoints, and they have been defined to be backward compatible with IP precedence values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the maximum length of an IP packet?

A

Although the maximum length of an IP packet is 65,535 bytes, most of the common lower-layer protocols do not support such large MTUs. For example, the MTU for Ethernet is approximately 1518 bytes. When the IP layer receives a packet to send, it first queries the outgoing interface to get its MTU. If the packet’s size is greater than the interface’s MTU, the layer fragments the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

T/F: When a packet is fragmented, it is not reassembled until it reaches the destination IP layer.

T/F: A fragmented packet can be fragmented again.

A

True and True.

When a packet is fragmented, it is not reassembled until it reaches the destination IP layer. The destination IP layer performs the reassembly.

Any router in the path can fragment a packet, and any router in the path can fragment a fragmented packet again. Each fragmented packet receives its own IP header and identifier, and it is routed independently from other packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

T/F: The destination router reassembles the fragmented packets before forwarding them on to the segment where the receiving host is.

A

False.

Routers and Layer 3 switches in the path do not reassemble the fragments. The destination host performs the reassembly and places the fragments in the correct order by looking at the Identification and Fragment Offset fields.

32
Q

What happens if a fragment is lost?

A

If one or more fragments are lost, the entire packet must be retransmitted. Retransmission is the responsibility of a higher-layer protocol (such as TCP).

33
Q

What happens to a packet if the outgoing MTU is smaller than the packet?

A

The IP layer will fragment the packet.

However, if the Flags field in the IP header is set to Do Not Fragment the packet is discarded if the outgoing MTU is smaller than the packet.

34
Q

What are the client and server ports in BOOTP?

A

The server port is UDP port 67. The client port is UDP port 68.

Clients send BOOTP requests to the BOOTP server, and the server responds to UDP port 68 to send messages to the client. The destination IP address of the BOOTP requests uses the all-hosts address (255.255.255.255), which the router does not forward. If the BOOTP server is one or more router hops from the subnet, you must configure the local default gateway router to forward the BOOTP requests. BOOTP requires that you build a MAC address–to–IP address table on the server. You must obtain every device’s MAC address, which is a time-consuming effort. BOOTP has been replaced by the more sophisticated DHCP.

35
Q

What are the three allocation methods used by DHCP?

A

Manual: In manual allocation, DHCP is used to dispatch a preallocated IP address to a specific MAC address.

Automatic: For automatic allocation, IP addresses are permanently assigned to a host. The IP address does not expire.

Dynamic: For dynamic allocation, an IP address is assigned for a limited time or until the host explicitly releases the address. This

36
Q

Put the following DHCP steps in order:

Step A. Using DHCPREQUEST, the client can request additional options or an extension on its lease of an IP address. This message also confirms that the client is accepting the DHCP offer.

Step B. The server sends a DHCPOFFER message to respond to the client, offering IP address, lease expiration, and other DHCP option information.

Step C. DHCP relay agents (routers and switches) can forward the DHCPDISCOVER message to the DHCP server in another subnet.

Step D. The client sends a DHCPDISCOVER message to the local network using a 255.255.255.255 broadcast.

Step E. If the server is out of addresses or determines that the client request is invalid, it sends a DHCPNAK message to the client.

Step F. The server sends a DHCPACK (acknowledgment) message that confirms the lease and contains all the pertinent IP configuration parameters.

A

The proper order is: D, C, B, A, F, E

THIS IS THE PROPER ORDER:

Step 1. The client sends a DHCPDISCOVER message to the local network using a 255.255.255.255 broadcast.

Step 2. DHCP relay agents (routers and switches) can forward the DHCPDISCOVER message to the DHCP server in another subnet.

Step 3. The server sends a DHCPOFFER message to respond to the client, offering IP address, lease expiration, and other DHCP option information.

Step 4. Using DHCPREQUEST, the client can request additional options or an extension on its lease of an IP address. This message also confirms that the client is accepting the DHCP offer.

Step 5. The server sends a DHCPACK (acknowledgment) message that confirms the lease and contains all the pertinent IP configuration parameters.

Step 6. If the server is out of addresses or determines that the client request is invalid, it sends a DHCPNAK message to the client.

37
Q

Define the following DNS terms.

  1. A
  2. AAAA
  3. CNAME
  4. MX
  5. NS
  6. PTR
  7. SOA
A
  1. Address. Provides the name-to-address mapping. It contains the IP address in dotted-decimal form.
  2. Secure IPv6 address.
  3. Canonical name. Used for aliases or nicknames.
  4. Mail Exchanger. Specifies the IP of the server where mail should be delivered.
  5. Name server. Specifies the name of the device that provides DNS for a particular domain
  6. Pointer. Used for reverse mapping from the translation of IP addresses to names.
  7. Start of Authority. Designates the start of a zone. This is the device that is the master of DNS data for a zone.
38
Q

Which TCP port does DNS use? Which UDP port does DNS use?

A

53

39
Q

When would a zone transfer be required?

A

A zone transfer occurs when you place a secondary server in the domain and transfer the DNS information from the primary DNS server to the secondary server.

40
Q

List the RFC 1918 private address ranges.

A

10/8, 172.16/12 (172.16.0.0 to 172.31.255.255), and 192.168/16.

41
Q

True or false: You can use DHCP to specify the TFTP host’s IP address to a client PC.

A

True. You can use DHCP to specify several host IP configuration parameters, including IP address, mask, default gateway, DNS servers, and TFTP server.

42
Q

True or false: 255.255.255.248 and /28 are two representations of the same IP mask.

A

False. The bit-number representation of 255.255.255.248 is /29. /28 is the same mask as 255.255.255.240.

43
Q

True or false: Upper-layer protocols are identified in the IP header’s Protocol field. TCP is protocol 6, and UDP is protocol 17.

A

True.

44
Q

Without any options, the IP header is _________ bytes in length.

A

20 (bytes).

45
Q

The IP header’s ToS field is redefined as the DS field. How many bits does DSCP use for packet classification, and how many levels of classification are possible?

A

DSCP uses 6 bits, which provides 64 levels of classification.

46
Q

True or false: NAT uses different IP addresses for translations. PAT uses different port numbers to identify translations.

A

True

47
Q

True or false: The IP header’s header Checksum field performs the checksum of the IP header and data.

A

False. The header checksum field only includes a checksum of the IP header; it does not check the data portion.

48
Q

Calculate the subnet, the address range within the subnet, and the subnet broadcast of the address 172.56.5.245/22.

A

The subnet is 172.56.4.0/22, the address range is from 172.56.4.1 to 172.56.7.254, and the subnet broadcast is 172.56.7.255.

49
Q

When packets are fragmented at the network layer, where are the fragments reassembled?

A

The IP layer in the destination host.

50
Q

Which protocol can you use to configure a default gateway setting on a host?

  1. ARP
  2. DHCP
  3. DNS
  4. RARP
A

B. DHCP configures the IP address, subnet mask, default gateway, and other optional parameters.

51
Q

How many host addresses are available with a Class B network with the default mask?

  1. 63,998
  2. 64,000
  3. 65,534
  4. 65,536
A

C. Class B networks have 16 bits for host addresses with the default mask: 216 − 2 = 65,534.

52
Q

Which of the following is a dotted-decimal representation of a /26 prefix mask?

  1. 255.255.255.128
  2. 255.255.255.192
  3. 255.255.255.224
  4. 255.255.255.252
A

B. A /26 mask has 26 network bits and 6 host bits.

53
Q

Which network and mask summarizes both the 192.170.20.16/30 and 192.170.20.20/30 networks?

  1. 192.170.20.0/24
  2. 192.170.20.20/28
  3. 192.170.20.16/29
  4. 192.170.20.0/30
A

C. Network 192.170.20.16 with a prefix of /29 summarizes addresses from 192.170.20.16 to 192.170.20.23.

54
Q

Which AF class is backward compatible with flash traffic of the IP precedence bits?

  1. AF2
  2. AF3
  3. AF4
  4. EF
A

B. AF3 is backward compatible with IP precedence priority traffic with a binary of 011.

55
Q

Which of the following is true about fragmentation?

  1. Routers between source and destination hosts can fragment IPv4 packets.
  2. Only the first router in the network can fragment IPv4 packets.
  3. IPv4 packets cannot be fragmented.
  4. IPv4 packets are fragmented and reassembled at each link through the network.
A

A. IPv4 packets can be fragmented by the sending host and routers.

56
Q

A packet sent to a multicast address reaches what destinations?

  1. The nearest destination in a set of hosts
  2. All destinations in a set of hosts
  3. All hosts
  4. Reserved global destinations
A

B. Multicast addresses are received by a set of hosts subscribed to the multicast group.

57
Q

What are three types of IPv4 addresses? (Choose three.)

  1. Anycast
  2. Multicast
  3. Dynamic
  4. Broadcast
  5. Unicast
  6. Global
  7. Static
A

B, D, and E. The three types of IPv4 address are unicast, broadcast, and multicast.

58
Q

Which devices should be assigned an IP address dynamically? (Choose three.)

  1. Cisco IP phones
  2. LAN switches
  3. Workstations
  4. Mobile devices
  5. Routers
A

A, C, and D. End-user workstations, Cisco IP phones, and mobile devices should have their IP addresses assigned dynamically.

59
Q

Which name resolution method reduces administrative overhead?

  1. Static name resolution
  2. Dynamic name resolution
  3. DHCP name resolution
  4. Host.txt name resolution
A

B. Dynamic name resolution reduces administrative overhead. Name-to-IP address tables do not need to be configured.

60
Q

How many hosts can be addressed with the IPv4 subnet 172.30.192.240/28?

  1. 6
  2. 14
  3. 126
  4. 1024
A

B. There are 4 bits to determine the number of host addresses: 24 − 2 = 16 − 2 = 14.

61
Q

What is the smallest subnet and mask that can be used in a DMZ network that needs to have only three hosts?

  1. 192.168.10.32/30
  2. 192.168.10.32/29
  3. 192.168.10.32/28
  4. 192.168.10.32/27
A

B. Answer B allows up to 6 hosts. Answer A allows only 2 hosts, which is too small. Answer C allows 14 hosts, which is larger than Answer B.

62
Q

Which modules cannot use private IPv4 address space? (Choose all that apply.)

  1. Access
  2. Distribution
  3. Core
  4. E-commerce
  5. LAN
  6. WAN
  7. Internet connection
  8. Data center
  9. Remote access/VPN
A

4, 7, and 9

63
Q

Which technology allows a company to use a single public IP address when using private IPv4 addresses in the internal LAN?

  1. NAT
  2. Redistribution
  3. PAT
  4. Access list
A

C. PAT.

64
Q

Which of the following is the European RIR?

  1. IANA
  2. ARIN
  3. RIPE
  4. ERIR
A

C. RIPE.

65
Q

Which technology allows you to divide address blocks into subnets of different sizes?

  1. NAT
  2. VLSM
  3. PAT
  4. Variable division subnet masking
A

B. VLSM.

66
Q

Which regional registry allocates address blocks in North America?

  1. IANA
  2. RIPE
  3. ARIN
  4. APNIC
  5. LACNIC
  6. AfriNIC
A

C. The American Registry for Internet Numbers allocates IP address blocks for the United States, Canada, several parts of the Caribbean region, and Antarctica.

67
Q

Which regional registry allocates address blocks in China?

  1. IANA
  2. RIPE
  3. ARIN
  4. APNIC
  5. LACNIC
  6. AfriNIC
A

D. The Asia-Pacific Network Information Centre allocates IP address blocks for Asia, Australia, New Zealand, and neighboring counties.

68
Q

The remote site uses the network prefix 192.168.10.0/24. What subnets and masks can you use for the LANs at the remote site to conserve address space?

  1. 192.168.10.64/26 and 192.168.10.192/26
  2. 192.168.10.0/25 and 192.168.10.128/25
  3. 192.168.10.32/28 and 192.168.10.64/28
  4. 192.168.10.0/30 and 192.168.10.128/30
A

B. The networks in Answer B provide 126 addresses for hosts in each LAN at Site B.

69
Q

Answer the following questions based on the given scenario and Figure 1-12. (attached image)

Figure 1-12 Scenario diagram Company VWX has the network shown in Figure 1-12. The main site has three LANs, with 100, 29, and 60 hosts. The remote site has two LANs, each with 100 hosts. The network uses private addresses. The Internet service provider assigned the company the network 210.200.200.8/26.

The remote site uses the network prefix 192.168.10.0/24. What subnets and masks can you use for the LANs at the remote site to conserve address space?

  1. 192.168.10.64/26 and 192.168.10.192/26
  2. 192.168.10.0/25 and 192.168.10.128/25
  3. 192.168.10.32/28 and 192.168.10.64/28
  4. 192.168.10.0/30 and 192.168.10.128/30
A

B. The networks in Answer B provide 126 addresses for hosts in each LAN at Site B.

70
Q

In what subnet does 172.16.45.227/27 reside?

  1. 172.16.45.128
  2. 172.16.45.192
  3. 172.16.45.224
  4. 172.16.45.0
A

C. Subnet 172.16.45.224.

71
Q

Answer the following questions based on the given scenario and Figure 1-12.

Company VWX has the network shown in Figure 1-12. The main site has three LANs, with 100, 29, and 60 hosts. The remote site has two LANs, each with 100 hosts. The network uses private addresses. The Internet service provider assigned the company the network 210.200.200.8/26.

The main site uses the network prefix 192.168.15.0/24. What subnets and masks can you use to provide sufficient addresses for LANs at the main site and conserve address space?

  1. 192.168.15.0/25 for LAN 1, 192.168.15.128/26 for LAN 2, and 172.15.192.0/27 for LAN 3
  2. 192.168.15.0/27 for LAN 1, 192.168.15.128/26 for LAN 2, and 172.15.192.0/25 for LAN 3
  3. 192.168.15.0/100 for LAN 1, 192.168.15.128/60 for LAN 2, and 172.15.192.0/29 for LAN 3
  4. 192.168.15.0/26 for LAN 1, 192.168.15.128/26 for LAN 2, and 172.15.192.0/29 for LAN 3
A

A. Network 192.168.15.0/25 provides 126 addresses for LAN 1, network 192.168.15.128/26 provides 62 addresses for LAN 2, and network 192.168.15.192/27 provides 30 addresses for LAN 3.

72
Q

Answer the following questions based on the given scenario and Figure 1-12.

Company VWX has the network shown in Figure 1-12. The main site has three LANs, with 100, 29, and 60 hosts. The remote site has two LANs, each with 100 hosts. The network uses private addresses. The Internet service provider assigned the company the network 210.200.200.8/26.

Which network and mask would you use for the WAN link to save the most address space?

  1. 192.168.11.240/27
  2. 192.168.11.240/28
  3. 192.168.11.240/29
  4. 192.168.11.240/30
A

4.

73
Q

What networks does Router C announce to the Internet service provider’s Internet router?

  1. 210.200.200.8/26
  2. 192.168.10.0/24 and 192.168.11.0/24
  3. 192.168.10.0/25 summary address
  4. 201.200.200.8/29 and 192.168.10.0/25
A

A. Private addresses are not announced to Internet service providers.

74
Q

What technology does Router C use to convert private addresses to public addresses?

  1. DNS
  2. NAT
  3. ARP
  4. VLSM
A

B. NAT translates internal private addresses to public addresses.

75
Q

What mechanism supports the ability to divide a given subnet into smaller subnets based on need?

  1. DNS
  2. NAT
  3. ARP
  4. VLSM
A

D. VLSM provides the ability to use different masks throughout the network.