Exam 5 Flashcards

1
Q

Which of the following statements is true?

MAC and IP addresses need to work in parallel for effective communication.

NICs are hardwired with IP and MAC addresses.

MAC and IP addresses can both work independently depending on the environment.

MAC addresses can route data packets over the internet independent of IP addresses.

A

MAC and IP addresses need to work in parallel for effective communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between RIPv1 and RIPv2?

RIPv1 utilizes classful routing whereas RIPv2 uses classless routing.

RIPv1 uses classless routing, but RIPv2 uses classful routing.

RIPv1 and RIPv2 each have their own routing protocol.

RIPv1 uses the Routing Information Protocol and RIPv2 does not.

A

RIPv1 utilizes classful routing whereas RIPv2 uses classless routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In dotted decimal, which network numbering segment is reserved for loopback?

  • 0.x.x.x
  • 192.168.x.x
  • 127.x.x.x
  • 172.x.x.x
A

127.x.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The following IP address is most likely of what type of address class?

192.168.1.100

Class C

Class D

Class B

Class A

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What criteria do EGPs use to determine data packet routes?

locations, cost metrics, and optimal paths

locations, external addresses, and optimal paths

domain names, cost metrics, and optimal paths

locations, cost metrics, and bandwidth

A

locations, cost metrics, and optimal paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Traffic passed on a network between two nodes on the same subnet:

Requires EIGRP to send between the nodes.

Requires OSPF to send between the nodes.

None of these.

Requires RIP to send between the nodes.

A

None of these.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following actions would be allowed because of a router?

  • Being able to send a document from your office computer to a printer several offices away.
  • An HR specialist in one location is able to pull employee data from a department located in another building.
  • Saving a slideshow presentation in HD.
  • Blocking a computer virus from accessing a laptop.
A

An HR specialist in one location is able to pull employee data from a department located in another building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Given the following information, identify the network address.

IP: 192.155.1.2

Subnet mask: 255.255.0.0

255.0.0

192.155.

155.1.

255.255.

A

192.155.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is NOT a component of a network switch?

Bypass Engine

Switch Fabric

CPU

Replication Engine

A

Bypass Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The different types of Address Translations are _____

  • Static Network Address Transformation Dynamic Network Address Transformation. Port Address Translation
  • Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation
  • Statin Network Address Translation, Dynamic Network Address Translation. Support Address Translation
  • Gateway Network Address Translation, Dynamic Network Address Translation. Web Address Translation
A

Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are hostnames resolved?

  • Hostnames are resolved through an Internationally designated body saddled with the task.
  • Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.
  • Hostnames are already in-built in the computer systems and hence are resolved on their own.
  • Hostnames are resolved locally and remotely on a servers.
A

Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Subnet is a _____ of a computer network.

portion

Mask

interface

host

A

portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IPv4 Address is how many bits in length?

16 bits

4 bits

32 bits

256 bits

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following contains a set of rules that determine exactly where data will be directed to over a network?

Bootstrap

Routing table

IOS

ROM

A

routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Of the multiple different addressing types mentioned, which is the odd one out that has no purpose in future IPv6 networking solutions?

Multicast

Unicast

Anycast

Broadcast

A

broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The range of address that can be used in the first octet of Class C address are _____.

0-127

192-223

128-191

240-255

A

192-223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does the MAC Address differ from an IP address?

The MAC address is dynamically assigned each time a device establishes a new connection in a network.

The MAC address carries only network addressing information.

The MAC address is a hardwired number, permanent and unique to a device’s NIC.

The MAC address operates in the Network layer of the TCP/IP stack.

A

The MAC address is a hardwired number, permanent and unique to a device’s NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following types of routing do NOT carry a subnet mask?

Classless routing

None of these

Classful routing

Routing tables

A

Classful routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who was responsible for the creation of IPv4 protocols?

Lycos

DARPA

Google

IBM

A

DARPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Given the following IP address, which numbers represent the network?

227.21.6.173

227.

6.173

6.

227.21

A

227.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two main routing classifications?

Internet Protocol Router and External Hop Counter

Internet Gateway Protocol and External Gateway Protocol

External Gateway Protocol and Internet Protocol Router

Interior and Exterior Gateway Protocols

A

Interior and Exterior Gateway Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IPv4 represents a _____-bit integer and IPv6 represents a _____-bit alphanumeric string.

32, 128

64, 128

32, 64

24, 48

A

32, 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In terms of computer networking, what is a router?

  • A computer networking device that allows for computers and other devices to be connected together in a general area.
  • A tool used to prevent computer viruses from accessing a computer.
  • A device that is used to assist electricians in routing wires and other cables through a wall.
  • A device that allows for several individual networks to be connected to each other.
A

A device that allows for several individual networks to be connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following represents a Class B IP address?

172.16.81.100/1
172.16.81.100/3
172.16.81.100/15
172.16.81.100/23

A

172.16.81.100/15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
**A _____ is a device that is used to create a network of computers and other devices.** Replication Engine CPU switch Switch Fabric
Switch
26
**If a company with a very low budget needs to lease a public IP address to access the Internet what would you advise and why?** Employing a single ISP would be the best option. they sign up for the public Ip addresses they need Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network Dynamic NAT would be their best option as they can pay for a single public IP address and share among the nodes within the network. The address would be available to any user on demand. Static NAT would be their best option as it would enable them to access their computers remotely.
Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network
27
**What is Hostname Resolution?** * It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes. * It is the process through which hostnames are separated from each other using a router. * It is the process through which hosts on a network communicate with another. * It is the process through which hostnames are reserved for use on another network.
It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.
28
**What are the two main problems resolved via network segmentation?** computer reachability and addressing network congestion and security roads and junctions IP addresses and subnets
network congestion and security
29
**EIGRP sends payloads from node to node in what manner?** By advertising all table routes every 30 seconds. By building a table based upon specific data sets like MTU, bandwidth, etc. and sending the packet along the best course determined by the table. Through communication with neighbors to build route tables then by going to the shortest number of nodes for a destination. None of these.
By building a table based upon specific data sets like MTU, bandwidth, etc. and sending the packet along the best course determined by the table.
30
**What is the difference between WAN and LAN ports?** * WAN ports connect computers to the router. LAN ports connect a router's ROM to the RAM. * WAN ports connect computers to the router. LAN ports connect the router to the Internet. * WAN ports connect the router to the Internet. LAN ports connect computers to the router. * WAN ports connect the router to the Internet. LAN ports connect the CPU to a computer
WAN ports connect the router to the Internet. LAN ports connect computers to the router.
31
How does RIP route payloads? All of these. By advertising a connected table to all neighbors every 30 seconds. By using a table built upon specific informational pieces to determine the best path to send the payload. Through communication with neighbors to build route tables then by going to the shortest number of nodes for a destination.
By advertising a connected table to all neighbors every 30 seconds.
32
**_____ represents a standard IP address.** 10101000.01001010.00000101.11100111 1010000.01001010.00011001.11111111 10101000.01001010.00011001.1111111 10101000.01001010.0001001.11111111
10101000.01001010.00000101.11100111 32 bits
33
**Which of the following best defines the Routing Information Protocol?** It is a standard that determines what information is most valuable to an end user. It is a way for computers to manage their hard drives. It is a method for preventing hackers from infiltrating a network. It is a standard used by routers that dictates how data should be shared between a group of individual networks.
It is a standard used by routers that dictates how data should be shared between a group of individual networks.
34
**What is the maximum number of IP addresses that can be assigned through means of IPv4?** 4.3 million 4.3 billion 4.3 trillion None of these answers are correct.
4.3 billion
35
**What is Address Translation(AT)?** AT is mapping private IP addresses to public IP addresses AT is transposing private IP addresses into public IP addresses AT is converting public IP addresses into private IP addresses AT is converting private IP addresses into public IP addresses
AT is mapping private IP addresses to public IP addresses
36
**The _____ of an IP address indicates the device.** Subnet Suffix Non-routable flag Prefix
Suffix
37
**An IP address is written in the form of _____ notation.** Binary Period Dot Dotted Decimal
Dotted Decimal
38
**What is an IP address?** An IP (Internet Protocol) address is used to identify a computer. An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment. An IP (Internet Protocol) address is a series of hardwired numbers which is used to identify a network environment. An IP (Internet Protocol) address is used to identify a NIC.
An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.
39
**Which of the following is responsible for the switch's long-term memory?** ROM RAM Ports CPU
ROM
40
**On which component can a router's operating system be found?** * Ports * ROM * IOS * Flash memory
Flash Memory
41
**A subnet mask _____.** * indicates the network address within the IP address * represents the network address of a node * indicates a secondary 32-bit binary address * is a shadow 32-bit binary address of the IP
indicates the network address within the IP address
42
**IGPs use _____, _____, and _____ criteria to determine data packet routes.** * network bandwidth, delays, and packet sizes * network speed, delays, and packet sizes * network speed, IP addresses, and packet sizes * network speed, delays, and RP specifications
network speed, delays, and packet sizes
43
**In a company setup where users are required to work from home when needed, what is the best address translation?** * Static NAT * NAT * Dynamic NAT * Port Address Translation
Static NAT
44
**How could a non-routable device send or receive messages on the Internet?** * Use Class D IP address values * Non-routable devices are not allowed any Internet access * Use network address translation * Restrict IP range to 10.0.0.0 -> 10.255.255.255
Use network address translation
45
**To which class does the IP address 236.128.192.140 belong?** * Class A * Class D * Class B * Class E
Class D
46
**Why are addresses important in networking?** They are used to establish the network layer of the operating environment. They identify the layers in the TCP/IP Stack. They are used to reveal the name of the device. They are used to identify both the network to which the device is connected to as well as the device itself.
They are used to identify both the network to which the device is connected to as well as the device itself.
47
**Why is it necessary for computer systems (hosts) to have a hostname or domain name?** * It is necessary because it is an international standard which must be followed. * It is necessary because it differentiates it from other people's computer systems. * It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed. * It is necessary because every device has a name and so this should not be different.
It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
48
**What range of addresses can be issued to a class C network?** * 172.10.0.0-191.255.255.255 * 10.0.0.0-126.0.0.0 * 192.0.0.0-223.255.255.255 * 0.0.0.0-255.255.255.255
192.0.0.0-223.255.255.255
49
**Which of the following is NOT a component of a router?** * NVRAM * RAM * Graphics card * Ports
Graphics card
50
**Which of the following actions is allowed because of a switch?** * An HR specialist being able to access employee information from a department located in another building. * Sending a photo from your office computer to your home computer. * Being able to send a document from your office computer to a printer several offices away. * Accessing a website on the internet.
Being able to send a document from your office computer to a printer several offices away.
51
**When it comes to home networks, how is the primary IP address generated for all devices?** The router brand you have gives you a unique address. The modem generates one by default. All of these answers are correct. The ISP assigns a static address to the location, which is translated through a NAT.
The ISP assigns a static address to the location, which is translated through a NAT
52
**Select the term that best completes the sentence.** **A(n) _____ is a network that is closed off from the Internet and only accessible from within a company.** intranet router Internet switch
intranet
53
**Where is the subnet address contained?** in the host ID in the Subnet Mask in the Subnet Mask and is extracted via the IP Address in the IP Address and is extracted via the Subnet Mask
in the IP Address and is extracted via the Subnet Mask
54
**NAT serves which two main purposes?** * Protecting the private network from the public domain and conserving the dynamic public IP addresses. * Protecting the public network from the private domain and conserving the availability of static IP addresses. * Protecting the public network from the Internet and conserving the availability of public IP addresses. * Protecting the private network from the public domain and conserving the availability of public IP addresses.
Protecting the private network from the public domain and conserving the availability of public IP addresses.
55
**What is a risk of the current addressing used in IPv4 addresses?** Decreases in values on the suffixes Increase of values to the prefixes Running out of addresses Additional address classes being added
Running out of addresses
56
How many bits are present in an octet? 8 5 4 16
8
57
**A class A network has how many network bits set to on?** 24 16 3 8
8
58
**Select the term that best completes the sentence.** **RIP routers contain _____, a dynamic list of destinations that it can send data to.** classful routing hops routing tables routes
routing tables
59
**What is one of the most significant benefits that IPv6 has in comparison to IPv4?** IPv6 encrypts all packets, paving the way for increased security. IPv6 can have almost unlimited IP addresses. IPv6 does not need to rely on a NAT. All of these answers are correct.
All of these answers are correct.
60
**How does OSPF find the shortest path for a payload to go?** None of these Through vector tables that maintain a series of informational pieces that determine the best course dynamically. Through communication with neighbors to build route tables, then by going to the shortest number of nodes for a destination. Through advertisements to neighbors every 30 seconds
Through communication with neighbors to build route tables, then by going to the shortest number of nodes for a destination.
61
**What protocol do computer systems (hosts) use when communicating with each other on a network?** IP Servers OSI Models URLs IP Addresses
IP Addresses
62
**What does a Subnet Mask provide?** The number of hosts connected to the computer network The full IP address The host ID A way to extract the portion of an IP Address indicating the subnet and the part referring to the specific host
A way to extract the portion of an IP Address indicating the subnet and the part referring to the specific host
63
**The main difference between Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP) is _____.** * IGPs operate between ISPs & EGPs operate between LANs * IGPs operate similar routing tables on the same network & EGPs operate between different routing tables of the same network. * IGPs operate between nodes on the same network & EGPs operate between nodes of different networks * IGPs operate between hops on the same network & EGPs operate between distances of different networks
IGPs operate between nodes on the same network & EGPs operate between nodes of different networks
64
**Which type of address is assigned by an ISP to the computing device?** multicast address private IP address public IP address logical address
public IP address
65
**IP Addresses operate within the _____ layer of the TCP/IP protocol.** Network Layer Physical Layer Data Link Layer Application Layer
Network Layer
66
**Which of the following refers to the path a data packet travels through to reach each router?** Routes Jumps Hops Skips
hops
67
**What information is carried in the IP Address?** subnet and single trunk address door number and group color host ID and subnet address host ID and performance
host ID and subnet address
68
**Given the following IP address, which numbers represent the network?** **227.21.6.173** Report an Error 6.173 227. 6. 227.21
227.21
69
**Which two components enable a switch fabric to operate?** CPU and Controller Forwarding and Replication Engines ROM and RAM Controller and Buffers
Controller and Buffers
70
How many bits does an IPv6 address contain before it gets translated into a hexadecimal code for use in a network? Report an Error 20 128 16 8
128
71
**What is a routing protocol?** It's the way in which a router, connected to a network, routes traffic among nodes in the network. It's the protocol used by the internet to determine router addresses. The rules that govern the number of hops in a routing transmission. It's the protocol used to transmit information over a network.
It's the way in which a router, connected to a network, routes traffic among nodes in the network.
72
**An IP address consists of the following two parts:** Machine address and internet address Network address and subnet address Network address and node address Virtual address and network address
Network address and node address
73
A class C has how many bits on in its subnet? Report an Error 32 4 24 8
24
74
**What is zero compression?** An algorithm that reduces a file to zero bytes. The ability to compress down zeros to a smaller size in bits. The ability to reduce zeros in an address in an Ipv6 address. None of these.
The ability to reduce zeros in an address in an Ipv6 address.
75
**Which switch component allows for devices to be connected to the switch?** Switch Fabric Ports RAM Forwarding Engine
Ports
76
**The three distance protocols that route information to other nodes that aren't on the same subnet are?** DHCP, DNS, RFC RIP, OSPF, EIGRP All of these RPC, IETF, HTTP
RIP, OSPF, EIGRP
77
**What is a hostname or domain name used for?** It is a name given to a website and the server. It is a security requirement. It is used for naming a device or computer system. It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
78
**What does DHCP do for computer nodes?** None of these. It issues numeric IP addresses to nodes that request them. It produces numbers and stores them for future use. It changes the numeric addresses into names for easier identification.
It issues numeric IP addresses to nodes that request them.
79
A subnet mask____. indicates a secondary 32-bit binary address indicates the network address within IP address is a shadow 32-bit binary address of the IP represents the network address of a node
indicates the network address within IP address