Chapter 5 ( 2) Flashcards
What is the purpose of address resolution in network communication?
A) Encrypting data packets for secure transmission
B) Translating physical MAC addresses to IP addresses
C) Converting domain names to IP addresses
D) Translating addresses from one type to another for message transmission
D
An example of an application layer address is www.indiana.edu
T
What type of address is associated with the Data Link Layer in network communication?
A) IP address
B) MAC address
C) Domain name
D) URL
B
The data link layer address is generally encoded in a network card by the card’s
manufacturer
T
Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution
T
A client computer is typically assigned a data link layer address by a:
a.) hardware manufacturer
b.) software manufacturer
c.) middleware manufacturer
d.) network manager who configures a file in a computer’s network layer software package
e.) ISO
A
What type of address is associated with the Network Layer in network communication?
A) MAC address
B) IP address
C) Domain name
D) URL
B
How are IP addresses typically assigned?
A) Automatically by network hardware manufacturers
B) Manually by network administrators or through software like DHCP
C) Based on geographic location
D) By domain name registrars
B
How do computers on the same network typically differ in terms of IP addresses?
A) They all have the same IP address
B) They have IP addresses assigned randomly
C) They have IP addresses assigned sequentially
D) They each have a unique IP address within a certain range
D
What distinguishes the IP addresses of servers from those of clients?
A) Servers have dynamic IP addresses, while clients have static IP addresses
B) Servers have temporary IP addresses, while clients have permanent IP addresses
C) Servers have permanent IP addresses, while clients usually do not
D) Servers have public IP addresses, while clients have private IP addresses
C
Part of the function of address resolution is translating the application layer address of
the destination into a network layer address
T
Who typically assigns Application Layer addresses?
A) Internet Service Providers (ISPs)
B) Network managers
C) Domain Name System (DNS) servers
D) Web developers
B
Where are Application Layer addresses placed?
A) In web browsers
B) In server logs
C) In configuration files
D) In email headers
C
How many application layer addresses can a server computer have?
A) Only one
B) Two
C) Several
D) None
C
What is the relationship between “www.kelley.indiana.edu” and “www.kelley.iu.edu”?
A) They are unrelated websites
B) They point to different servers
C) They are aliases for the same server
D) They are subdomains of each other
C
Who generally does not need an Application Layer address?
A) Servers
B) Network managers
C) Clients
D) Domain registrars
C
Which protocol is commonly used to translate domain names into IP addresses?
A) HTTP
B) DNS
C) TCP
D) SMTP
B
What is the significance of the “.edu” domain in “www.kelley.indiana.edu”?
A) It specifies the type of server
B) It indicates the country of origin
C) It identifies the educational institution
D) It denotes the server’s location
D
An application layer address using TCP/IPv4 looks like:
a. 128.192.78.5
b. www.cba.uga.edu
c. user@cba.uga.edu
d. 00-0F-00-81-14-00
e. Building 4, Room 2, User 3
B
A client computer is assigned a data link layer address is by:
a. hardware manufacturers
b. software manufacturers
c. middleware manufacturers
d. network managers who configure a file in a computer’s network layer software
package
e. ISO
A
ICANN:
a. developed the IPX/SPX network layer protocol
b. assigns data link layer addresses
c. approves which network layer addresses (usually, approved or assigned in groups or
classes) can be used by an organization for its computers that will connect to the
Internet
d. developed X.25 network layer protocol
e. refers to Interchange Computer Addressing Networks and Nodes
C
Who manages Internet addresses, including both IP addresses and domain names?
a) ISP (Internet Service Provider)
b) ICANN (Internet Corporation for Assigned Names and Numbers)
c) IEEE (Institute of Electrical and Electronics Engineers)
d) NSA (National Security Agency)
B
Which organization directly manages some top-level domains like .com, .org, and .net?
a) DNS (Domain Name System)
b) IETF (Internet Engineering Task Force)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) IEEE (Institute of Electrical and Electronics Engineers)
C
Who authorizes private companies to become domain name registrars for certain domains?
a) Internet Protocol Society
b) ISOC (Internet Society)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) IANA (Internet Assigned Numbers Authority)
C
Which organization sets rules for creating new domain names?
a) IEEE (Institute of Electrical and Electronics Engineers)
b) IANA (Internet Assigned Numbers Authority)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) DNS (Domain Name System)
C
IP addresses are often assigned to organizations in:
a) Sequential order
b) Random order
c) Alphabetical order
d) Groups with numerically similar addresses
D
What is the organization responsible for approving network layer addresses for organizations connecting to the Internet?
a) IEEE (Institute of Electrical and Electronics Engineers)
b) IETF (Internet Engineering Task Force)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) IANA (Internet Assigned Numbers Authority)
C
In IPv4 addressing, what do the first “n” bits of an IP address represent?
a) The host portion
b) The specific network
c) The subnet mask
d) The broadcast address
B
What is the term used to refer to the remaining (32 - n) bits of an IPv4 address?
a) Host mask
b) Network mask
c) Host portion
d) Network portion
C
In slash notation (e.g., a.b.c.d/n), what does “n” represent?
a) The number of host bits
b) The number of network bits
c) The total number of bits in the address
d) The number of octets in the address
B
What is the range of IP addresses within a subnet represented by the notation 192.168.1.0/24?
a) 256 addresses
b) 128 addresses
c) 512 addresses
d) 64 addresse
A
Which notation indicates the number of bits used for the network portion in an IP address?
a) Dot notation
b) Slash notation
c) Binary notation
d) Octet notation
B
How many possible IP addresses can be allocated within the subnet 10.0.0.0/28?
a) 256 addresses
b) 128 addresses
c) 16 addresses
d) 32 addresses
C
IPv4 uses ________ bytes per Internet address.
a. 4
b. 32
c. 8
d. 24
e. 16
A
IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.
F
The network layer address for IP is ten bytes long when using IPv4
F
What defines a subnet?
a) A subdivision of a larger network
b) A group of computers with identical IP addresses
c) A logical grouping of computers with the same prefix
d) All of the above
D
A(n) ________ refers to a group of computers that are logically grouped together by IP
number.
a. IPv6 group
b. subnet
c. data link group
d. TCP group
e. application net
B
A subnet mask of ___________ means that all computers with only the same first two bytes
in their IPv4 addresses are on the same subnet.
a. 11111111.0.0.0
b. 255.255.255.0
c. 255.0.0.0
d. 255.255.0.0
e. 255.255.255.255
D
What is the significance of an IP address with all 0s in the host portion within a subnet?
a) It represents the network address
b) It represents the broadcast address
c) It denotes the default gateway
d) It identifies a reserved IP address
A
Which of the following IP addresses is an example of a network address within a subnet?
a) 128.192.56.0
b) 128.192.56.1
c) 128.192.56.254
d) 128.192.56.255
A
Which term describes an IP address with all 1s in the host portion within a subnet?
a) Default address
b) Broadcast address
c) Reserved address
d) Gateway address
A
What role does the broadcast address play within a subnet?
a) It identifies the first host on the subnet
b) It denotes the last available host on the subnet
c) It allows communication with all devices on the subnet
d) It serves as the default gateway for the subnet
C
What is the purpose of the network address within a subnet?
a) To identify the specific host on the network
b) To communicate with all devices on the subnet
c) To denote the boundary of the subnet
d) To uniquely identify the subnet within a larger network
C
In a subnet with a subnet mask of 255.255.255.0, how many possible host addresses are available?
a) 254
b) 256
c) 255
d) 128
A
What is the primary function of routers in a network with multiple subnets?
a) Routing data packets between computers within the same subnet
b) Connecting subnets and enabling communication between them
c) Assigning IP addresses to devices within a subnet
d) Filtering incoming traffic to enhance network security
B
Subnet masks tell computers what part of an IP address is to be used to determine whether a
destination is in the same subnet or in a different subnet
T
What is the primary purpose of subnet masks in networking?
a) To encrypt data transmitted over the network
b) To identify the physical location of network devices
c) To separate the network and host portions of an IP address
d) To assign unique IP addresses to each network device
C
Which part of an IP address does a subnet mask primarily specify?
a) The network portion
b) The host portion
c) The subnet portion
d) The gateway portion
A
What part of an IP address can be designated as a subnet using a subnet mask?
a) Only the first byte
b) Only the last byte
c) Any portion of the address
d) Only the first 3 bytes
C
Which of the following best describes the function of a subnet mask?
a) It assigns unique IP addresses to each device on the network.
b) It specifies the range of IP addresses that belong to the same subnet.
c) It determines the physical location of network devices.
d) It encrypts data transmitted over the network for security purposes.
B
The most common standard for dynamic addressing for TCP/IP networks is Dynamic Host
Control Protocol.
T
Dynamic addressing:
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing,
changing networks
E
Which scenario best describes dynamic addressing?
a) Assigning permanent IP addresses to devices
b) Assigning IP addresses to devices only when they are logged in to the network
c) Assigning IP addresses based on physical location
d) Assigning IP addresses manually by network administrators
B
How does dynamic addressing handle IP address assignments when a device is moved to a new location?
a) It assigns the same IP address regardless of location.
b) It assigns a new IP address automatically based on the new network location.
c) It requires manual reconfiguration of IP addresses.
d) It maintains a static IP address for each device.
B
Which statement accurately describes the efficiency of dynamic addressing in IP address space usage?
a) Dynamic addressing leads to wastage of IP addresses.
b) Dynamic addressing ensures efficient utilization of available IP addresses.
c) Dynamic addressing requires a large pool of IP addresses.
d) Dynamic addressing limits the number of devices connected to the network.
B
Which protocol is commonly used for dynamic addressing in TCP/IP networks?
a) SMTP
b) DNS
c) DHCP
d) FTP
C
Which aspect of dynamic addressing allows for efficient use of IP address resources?
a) Manual IP address assignment
b) Static IP address allocation
c) Automatic IP address assignment upon login
d) Real-time monitoring of network traffic
C
What is the first step in the DHCP process when a computer connects to a network?
a) The DHCP server sends an IP address to the client.
b) The client sends a DHCP request message to the server.
c) The client broadcasts a DHCP message to any available server.
d) The server assigns a subnet mask to the client.
C. When a computer turns on and connects to the network, it sends a client broadcast DHCP message to any DHCP server available, requesting an address
How does a DHCP server respond to a client’s DHCP request message?
a) By assigning a subnet mask to the client
b) By broadcasting an IP address to all clients on the network
c) By sending a message containing an IP address to the requesting client
d) By requesting authentication from the client
C
When does a DHCP client automatically obtain a new IP address?
a) When the DHCP server is restarted
b) When the client’s network adapter is replaced
c) When the lease duration expires
d) When the client’s operating system is updated
C
How do ISPs manage a larger number of users than available network layer addresses using DHCP?
a) By assigning static IP addresses to each user
b) By implementing subnetting techniques
c) By leasing IP addresses to users for a specified time period
d) By limiting the number of simultaneous connections
C
Domain Name Servers provide the equivalent of directory assistance for application layer
addresses
T
Server name resolution is done using the:
a. Address Resolution Protocol
b. Border Gateway Protocol
c. Internet Control Message Protocol
d. Routing Information Protocol
e. Domain Name Service
E
What is the primary function of Server Name Resolution?
a) Translating an IP address to a domain name
b) Translating a data link layer address to a network layer address
c) Translating a domain name to an IP address
d) Translating a network layer address to an application layer address
C
How is a destination host’s domain name translated into its corresponding IP address?
a) Through DHCP server assignment
b) Through MAC address allocation
c) Through DNS server resolution
d) Through subnetting configuration
C
What technology is commonly used for Server Name Resolution?
a) FTP
b) DHCP
c) DNS
d) SNMP
C
How do DNS servers exchange information about address changes?
a) Through ARP broadcasts
b) Through HTTP requests
c) Through DHCP responses
d) Through replication
D
What is the purpose of DNS replication?
a) To translate IP addresses to domain names
b) To distribute domain names to clients
c) To synchronize address information across DNS servers
d) To secure network communication
C
Server name resolution is done using the:
a. Address Resolution Protocol
b. Border Gateway Protocol
c. Internet Control Message Protocol
d. Routing Information Protocol
e. Domain Name Service
E
What is the primary function of DNS (Domain Name Service)?
a) Assigning domain names to websites
b) Determining the IP address for a given URL
c) Encrypting data transmitted over the internet
d) Creating directories of website content
B
What are the computers responsible for providing DNS known as?
a) Web servers
b) Name servers
c) Domain servers
d) IP servers
B
What do databases maintained by DNS servers contain?
a) Lists of website visitors
b) Directories of domain names and their corresponding IP addresses
c) Email addresses of website administrators
d) Records of website transactions
B
How do large organizations typically manage DNS?
a) They rely on name servers provided by their ISPs.
b) They use public DNS servers available on the internet.
c) They maintain their own name servers.
d) They delegate DNS management to domain registrars.
C
What do smaller organizations often do for DNS management?
a) They maintain their own name servers.
b) They rely on name servers provided by their ISPs.
c) They use public DNS servers exclusively.
d) They outsource DNS management to third-party companies.
B
What information must be provided to a domain registrar when registering a domain name?
a) The website’s content directory
b) The IP address of the web server
c) The IP address of the DNS server
d) The organization’s financial information
C
Which of the following is an example of a domain name?
a) 192.168.1.1
b) www.example.com
c) 256.128.64.32
d) http://example.com
B
If a user wants to visit the website www.indiana.edu, what role does DNS play?
a) It translates the domain name into an IP address.
b) It encrypts the data transmitted to and from the website.
c) It verifies the authenticity of the website’s SSL certificate.
d) It blocks access to unauthorized users.
A