Midterm Exam Reviewer Flashcards
Module 5
Which organization publishes and manages the Request for Comments (RFC) documents?
◯ ISO
◯ IETF
◯ IEEE
◯ TIA/EIA
IETF
Match the TCP/IP model layer to the function.
▢ application
▢ transport
▢ internet
▢ network access
///
▢ represents data to the user, data encoding, and dialog control.
▢ supports communication between diverse devices across networks.
▢ controls hardware devices and media that make up the network.
▢ determines the best path to forward data through the network.
application
represents data to the user, data encoding, and dialog control.
transport
supports communication between diverse devices across networks.
internet
determines the best path to forward data through the network.
network access
controls hardware devices and media that make up the network.
What identifier is used at the data link layer to uniquely identify an Ethernet device?
◯ UDP port number
◯ MAC address
◯ TCP port number
◯ IP address
◯ sequence number
MAC address
Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
▢ physical
▢ application
▢ transport
▢ network
▢ data link
▢ session
▢ presentation
application
session
presentation
Explanation: The TCP/IP model consists of four layers: application, transport, internet, and network access. The OSI model consists of seven layers: application, presentation, session, transport, network, data link, and physical. The top three layers of the OSI model: application, presentation, and session map to the application layer of the TCP/IP model.
Which term refers to the set of rules that define how a network operates?
◯ protocol
◯ domain
◯ model
◯ standard
standard
Which standards organization publishes current Ethernet standards?
◯ IEEE
◯ CCITT
◯ EIA/TIA
◯ ANSI
IEEE
Explanation: The IEEE standards describe current Ethernet features. The IEEE standard for Ethernet is 802.3.
Which statement describes a MAC address?
◯ It contains two portions, the network portion and the host portion.
◯ It identifies the source and destination addresses of hosts on the Internet.
◯ It is a physical address assigned to an Ethernet NIC by the manufacturer.
◯ It is 128-bits in length.
It is a physical address assigned to an Ethernet NIC by the manufacturer.
Which three elements do all communication methods have in common? (Choose three.)
▢ message data
▢ message destination
▢ message type
▢ message priority
▢ message source
▢ transmission medium
message destination
message source
transmission medium
Which two layers of the OSI model specify protocols that are associated with Ethernet standards? (Choose two.)
▢ network layer
▢ physical layer
▢ transport layer
▢ session layer
▢ data link layer
physical layer
data link layer
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?
◯ network
◯ presentation
◯ transport
◯ application
◯ session
transport
Which statement is true about the TCP/IP and OSI models?
◯ The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.
◯ The OSI Layer 7 and the TCP/IP application layer provide identical functions.
◯ The TCP/IP network access layer has similar functions to the OSI network layer.
◯ The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
Which statement defines a data communications protocol?
◯ a set of product standards for types of network devices
◯ an exchange agreement of network devices among vendors
◯ a set of rules that govern the communication process
◯ an alliance of network device manufacturers
a set of rules that govern the communication process
an alliance of network device manufacturers
Bianka, a Polish traveler in Hanoi, Vietnam, stops and asks Nguyệt for directions to the Ngoc Son Temple. They verbally communicate and determine that they both speak English. After receiving directions in English to the temple, Bianka repeats them to Nguyệt. Nguyệt says, “Yes, that is correct.” Select the order of the communications protocols used in this scenario?
◯ method, language, confirmation
◯ method, confirmation, language
◯ confirmation, method, language
◯ language, method, confirmation
method, language, confirmation
Rory is studying the fields inside an Ethernet frame for an upcoming test and notices that the destination Media Access Control (MAC) address is listed first before the source MAC address. Which of the following protocol characteristics is Rory investigating?
◯ encoding
◯ message pattern
◯ message timing
◯ timing
◯ encapsulation
encapsulation
As Rory continues to study Ethernet, he discovers that a frame can typically be 64 to 1518 bytes of information that is converted into a series of bits before being sent out on the network. Which two protocol characteristics did Rory learn about for Ethernet?
▢ message pattern
▢ encapsulation
▢ encoding
▢ message size
▢ timing
encoding
message size
The rules that govern network communications including the message format, message size, timing, and encapsulation, are known as network:
◯ messaging
◯ protocols
◯ signaling
◯ encoding
protocols
The IETF (Internet Engineering Task Force) records and publishes internet standards in documents known as:
◯ Internet Specification Standards (ISS)
◯ Internet Protocol Standards (IPS)
◯ Request for Comments (RFC)
◯ IETF Standards Documents (ISD)
Request for Comments (RFC)
Which protocol is used by routers to forward messages?
◯ TCP
◯ Ethernet
◯ IP
◯ HTTP
IP
Which two layers of the OSI Model maps directly as the single network access layer in the TCP/IP model? (Choose two)
▢ session
▢ application
▢ data link
▢ network
▢ physical
▢ transport
▢ presentation
data link
physical
IP addressing occurs at what layer of the OSI Model?
◯ transport
◯ network
◯ session
◯ application
◯ data link
◯ physical
◯ presentation
network
What is the purpose of the OSI physical layer?
◯ controlling access to media
◯ transmitting bits across the local media
◯ performing error detection on received frames
◯ exchanging frames between nodes over physical network media
transmitting bits across the local media
Which statement is correct about network protocols?
◯ Network protocols define the type of hardware that is used and how it is mounted in racks.
◯ They define how messages are exchanged between the source and the destination.
◯ They all function in the network access layer of TCP/IP.
◯ They are only required for exchange of messages between devices on remote networks.
They define how messages are exchanged between the source and the destination.
Which three acronyms/initialisms represent standards organizations? (Choose three.)
▢ IANA
▢ TCP/IP
▢ IEEE
▢ IETF
▢ OSI
▢ MAC
IANA
IEEE
IETF
What networking term describes a particular set of rules at one layer that govern communication at that layer?
◯ duplex
◯ encapsulation
◯ error checking
◯ protocol
protocol
What is the purpose of protocols in data communications?
◯ specifying the bandwidth of the channel or medium for each type of communication
◯ specifying the device operating systems that will support the communication
◯ providing the rules required for a specific type of communication to occur
◯ dictating the content of the message sent during communication
providing the rules required for a specific type of communication to occur
Which three layers of the OSI model make up the application layer of the TCP/IP model? (Choose three.)
▢ data link
▢ network
▢ transport
▢ session
▢ presentation
▢ application
session
presentation
application
Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)
▢ data link
▢ network
▢ physical
▢ session
▢ transport
data link
physical
Module 6
Which of the following is NOT a criterion for choosing a network media?
◯ The type of data that can be transmitted
◯ The cost of installing the media
◯ The maximum distance that the media can successfully carry a signal
◯ The environment in which the media is installed
The type of data that can be transmitted
Which two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model? (Choose two.)
▢ Layer 3 device
▢ modular switch
▢ access point
▢ firewall
▢ Layer 2 switch
access point
Layer 2 switch
Which statement is true about broadcast and collision domains?
◯ Adding a router to a network will increase the size of the collision domain.
◯ The more interfaces a router has the larger the resulting broadcast domain.
◯ The size of the collision domain can be reduced by adding hubs to a network.
◯ Adding a switch to a network will increase the size of the broadcast domain.
Adding a switch to a network will increase the size of the broadcast domain.
How much data can be encapsulated into a normal sized Ethernet frame before it is sent over the network?
◯ 0 to 1024 bytes
◯ 64 to 1518 bytes
◯ 32 to 1500 bytes
◯ 46 to 1500 bytes
46 to 1500 bytes
What is the purpose of ARP in an IPv4 network?
◯ to build the MAC address table in a switch from the information that is gathered
◯ to forward data onward based on the destination IP address
◯ to forward data onward based on the destination MAC address.
◯ to obtain a specific MAC address when an IP address is known
to obtain a specific MAC address when an IP address is known
Which destination address is used in an ARP request frame?
◯ 255.255.255.255
◯ the physical address of the destination host
◯ FFFF.FFFF.FFFF
◯ AAAA.AAAA.AAAA
◯ 0.0.0.0
FFFF.FFFF.FFFF
What information does an Ethernet switch examine and use to build its address table?
◯ source MAC address
◯ source IP address
◯ destination MAC address
◯ destination IP address
source MAC address
What is the purpose of the core layer in the Cisco hierarchical network design model?
◯ flow control between networks
◯ aggregation point for smaller networks
◯ high-speed backbone switching
◯ network access to end devices
high-speed backbone switching
Which term refers to the process of placing one message format inside another message format?
◯ segmenting
◯ manipulation
◯ encapsulation
◯ encoding
encapsulation
What is the most common type of wired media used by TV companies to connect and carry signals to a set-top box within a home?
◯ fiber-optic cable
◯ twisted-pair cable
◯ coaxial cable
coaxial cable
Which type of wired media is used to carry digital information at very high speeds over long distances?
◯ fiber-optic cable
◯ twisted-pair cable
◯ coaxial cable
fiber-optic cable
Which is the most common type of wired media to connect end devices to an Ethernet LAN?
◯ fiber-optic cable
◯ coaxial cable
◯ twisted-pair cable
twisted-pair cable
A network technician is extending the network from the main office building over several hundred meters to a new security station. The security station needs a high speed connection to support video surveillance of the main building. What type of cable is best suited to connect the security station to the rest of the main office network?
◯ coax
◯ fiber optic
◯ shielded twisted pair
◯ unshielded twisted pair
fiber optic
What are two common media used in networks? (Choose two.)
▢ copper
▢ water
▢ nylon
▢ fiber
▢ wood
copper
fiber
Which type of network cable is commonly used to connect office computers to the local network?
◯ coaxial cable
◯ twisted-pair cable
◯ glass fiber-optic cable
◯ plastic fiber-optic cable
twisted-pair cable
Which three factors should be considered when choosing the appropriate network media? (Choose three.)
▢ the speed of the CPU and amount of memory in servers
▢ the environment in which the media is installed
▢ the data security and fault tolerance requirement
▢ the amount of data and the data transfer rate desired
▢ the distance between hosts that the media will connect
▢ the operating systems used on network devices in the network
the environment in which the media is installed
the amount of data and the data transfer rate desired
the distance between hosts that the media will connect
Refer to the graphic. What type of cabling is shown?
[Image Description]
The image shows a pair of ___ with ST (Straight Tip) connectors. The cables are yellow, and the ST connectors have a bayonet-style locking mechanism with a metal housing and a white ceramic ferrule at the tip.
◯ STP
◯ UTP
◯ coax
◯ fiber
fiber
What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
▢ greater distances per cable run
▢ lower installation cost
▢ limited susceptibility to EMI/RFI
▢ durable connections
▢ greater bandwidth potential
▢ easily terminated
greater distances per cable run
limited susceptibility to EMI/RFI
greater bandwidth potential
Which type of network media carries data encoded into electrical impulses?
◯ copper cable
◯ wireless media
◯ fiber-optic cable
◯ cellular communication media
copper cable
Which two types of network media carries data encoded into electrical impulses? (Choose two.)
▢ coaxial cable
▢ wireless media
▢ twisted-pair cable
▢ glass fiber-optic cable
▢ plastic fiber-optic cable
coaxial cable
twisted-pair cable
Which type of network media carries data encoded into impulses of light?
◯ coaxial cable
◯ wireless media
◯ fiber-optic cable
◯ twisted-pair cable
fiber-optic cable
A network administrator in a small office is upgrading the local network within the building. New network cables are needed to connect office computers and networking devices. Which network media should the administrator use?
◯ coaxial cable
◯ wireless solution
◯ fiber-optic cable
◯ twisted-pair cable
twisted-pair cable
What is the purpose of using twisted pairs of wires in an Ethernet cable?
◯ to reduce interference
◯ to provide higher bandwidth
◯ to identify paths of data flow
◯ to ensure that the transmission of electrical signals is extended over a longer distance
to reduce interference
Module 7
The process of prepending protocol information with information from another protocol is called
◯ packetizing
◯ framing
◯ encoding
◯ encapsulation
encapsulation
When an Ethernet frame is sent out an interface, the destination MAC address indicates:
◯ The MAC address of the router.
◯ The MAC address of the NIC card that sent the Ethernet frame.
◯ The MAC address of the device, which is on this network, that will receive the Ethernet frame.
◯ The MAC address of the NIC card of a device, which is on this network or another network, that will receive the Ethernet frame.
The MAC address of the device, which is on this network, that will receive the Ethernet frame.
Which Ethernet frame field indicates the beginning of an Ethernet frame?
◯ Destination MAC Address
◯ FCS
◯ Preamble and SFD
◯ Type/Length
Preamble and SFD
The Ethernet protocol is at what layer of the OSI Model?
◯ Layer 2 Data Link
◯ Layer 3 Network
◯ Layer 4 Transport
◯ Layer 1 Physical
Layer 2 Data Link
Ethernet switches make their forwarding decision based on what field of the Ethernet frame?
◯ Type/Length
◯ Source MAC address
◯ FCS
◯ Destination MAC address
◯ SFD (Start Frame Delimiter)
Destination MAC address
Ethernet switches add entries to their MAC address table based on what field of the Ethernet frame?
◯ Type/Length
◯ source MAC address
◯ SFD (Start Frame Delimiter)
◯ FCS
◯ destination MAC address
source MAC address
When a switch receives an Ethernet frame and the destination MAC address of that frame is not in its MAC address table, the switch will:
◯ Add the Source MAC address to the table.
◯ Add the Destination MAC address to the table.
◯ Forward the frame out all ports except in the incoming port.
◯ Drop the frame.
Forward the frame out all ports except in the incoming port.
Ethernet hubs are considered:
◯ a wireless device
◯ a security device
◯ cutting-edge
◯ obsolete
obsolete
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
◯ It initiates an ARP request.
◯ It broadcasts the frame out of all ports on the switch.
◯ It notifies the sending host that the frame cannot be delivered.
◯ It forwards the frame out of all ports except for the port at which the frame was received.
It forwards the frame out of all ports except for the port at which the frame was received.
Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?
◯ hub
◯ router
◯ switch
◯ modem
switch
What addressing information is recorded by a switch to build its MAC address table?
◯ the destination Layer 3 address of incoming packets
◯ the destination Layer 2 address of outgoing frames
◯ the source Layer 3 address of outgoing packets
◯ the source Layer 2 address of incoming frames
the source Layer 2 address of incoming frames
What is the purpose of the FCS field in a frame?
◯ to obtain the MAC address of the sending node
◯ to verify the logical address of the sending node
◯ to compute the CRC header for the data field
◯ to determine if errors occurred in the transmission and reception
to determine if errors occurred in the transmission and reception
What is one function of a Layer 2 switch?
◯ forwards data based on logical addressing
◯ duplicates the electrical signal of each frame to every port
◯ learns the port assigned to a host by examining the destination MAC address
◯ determines which interface is used to forward a frame based on the destination MAC address
determines which interface is used to forward a frame based on the destination MAC address
Which information does a switch use to keep the MAC address table information current?
◯ the destination MAC address and the incoming port
◯ the destination MAC address and the outgoing port
◯ the source and destination MAC addresses and the incoming port
◯ the source and destination MAC addresses and the outgoing port
◯ the source MAC address and the incoming port
the source MAC address and the incoming port
What process is used to place one message inside another message for transfer from the source to the destination?
◯ access control
◯ decoding
◯ encapsulation
◯ flow control
◯ the source MAC address and the incoming port
encapsulation
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
[Image Description]
The image shows a network topology with four computers (PC1, PC2, PC3, and PC4) connected to a switch. The switch’s MAC address table only records PC2 (Port 3) and PC4 (Port 1). Note: PC1 (Port 4) & PC3 (Port 2).
◯ The switch will discard the frame.
◯ The switch will forward the frame only to port 2.
◯ The switch will forward the frame to all ports except port 4.
◯ The switch will forward the frame to all ports.
◯ The switch will forward the frame only to ports 1 and 3.
The switch will forward the frame to all ports except port 4.
Which three fields are found in an 802.3 Ethernet frame? (Choose three.)
▢ source physical address
▢ source logical address
▢ media type identifier
▢ frame check sequence
▢ destination physical address
▢ destination logical address
source physical address
frame check sequence
destination physical address
What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?
◯ It will discard the frame.
◯ It will forward the frame to the next host.
◯ It will remove the frame from the media.
◯ It will strip off the data-link frame to check the destination IP address.
It will discard the frame.
Which statement is correct about Ethernet switch frame forwarding decisions?
◯ Frame forwarding decisions are based on MAC address and port mappings in the MAC Address table.
◯ Frames addressed to unknown MAC addresses are dropped.
◯ Switches build up their MAC Address tables based on the destination MAC address of incoming frames.
◯ Unicast frames are always forwarded regardless of the destination MAC address.
Frame forwarding decisions are based on MAC address and port mappings in the MAC Address table.
Module 8
Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is the network address of Host-A?
◯ 10.0.0.0
◯ 10.5.0.0
◯ 10.5.4.100
◯ 10.5.4.0
10.5.4.0
Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. What is the network address of Host-A?
◯ 172.0.0.0
◯ 172.16.0.0
◯ 172.16.4.0
◯ 172.16.4.100
172.16.0.0
Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)
▢ 10.0.0.98
▢ 10.5.0.1
▢ 10.5.100.4
▢ 10.5.4.99
▢ 10.5.4.1
10.5.4.99
10.5.4.1
Host-A has the IPv4 address and subnet mask 172.16.4.100 255.255.0.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)
▢ 172.18.4.1
▢ 172.16.4.99
▢ 172.17.4.1
▢ 172.17.4.99
▢ 172.16.0.1
172.16.4.99
172.16.0.1
Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply)
▢ 192.168.0.1
▢ 192.168.1.1
▢ 192.168.2.1
▢ 192.168.0.100
▢ 192.168.1.100
192.168.1.1
192.168.1.100
8.3.3 The Internet Protocol Quiz
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
◯ Each IP address must match the address that is assigned to the host by DNS.
◯ Each IP address must be unique within the local network.
◯ Each IP address needs to be compatible with the MAC address.
◯ Each local host should be assigned an IP address with a unique network component.
Each IP address must be unique within the local network.
How many octets exist in an IPv4 address?
◯ 4
◯ 8
◯ 16
◯ 32
4
Which two parts are components of an IPv4 address? (Choose two.)
▢ subnet portion
▢ network portion
▢ logical portion
▢ host portion
▢ physical portion
▢ broadcast portion
network portion
host portion
What is the purpose of the subnet mask in conjunction with an IP address?
◯ to uniquely identify a host on a network
◯ to identify whether the address is public or private
◯ to determine the subnet to which the host belongs
◯ to mask the IP address to outsiders
to determine the subnet to which the host belongs
A technician is setting up equipment on a network. Which three devices will need IP addresses?
(Choose three.)
▢ a printer with an integrated NIC
▢ a web camera that is attached directly to a host
▢ a server with two NICs
▢ an IP phone
▢ a wireless mouse
▢ a PDA that is attached to a networked workstation
a printer with an integrated NIC
a server with two NICs
an IP phone
Which statement describes the relationship of a physical network and logical IPv4 addressed networks?
◯ A local physical network supports one IPv4 logical network.
◯ A physical network can connect multiple devices of different IPv4 logical networks.
◯ All devices connected to a physical network need to belong to the same IPv4 logical network.
◯ End devices on different IPv4 logical networks can communicate with each other if they all connect to the same switch.
A physical network can connect multiple devices of different IPv4 logical networks.
How large are IPv4 addresses?
◯ 8 bits
◯ 16 bits
◯ 32 bits
◯ 64 bits
◯ 128 bits
32 bits
What is the network number for an IPv4 address 172.16.34.10 with the subnet mask of 255.255.255.0?
◯ 10
◯ 34.10
◯ 172.16.0.0
◯ 172.16.34.0
172.16.34.0
What are two features of IPv4 addresses? (Choose two.)
▢ An IPv4 address contains 8 octets.
▢ IPv4 is a logical addressing scheme.
▢ An IPv4 addressing scheme is hierarchical.
▢ IPv4 addresses are only used for communications on the internet.
▢ An IPv4 address is bound to a network interface card to make it unique.
IPv4 is a logical addressing scheme.
An IPv4 addressing scheme is hierarchical.
Consider the group of five IPv4 addresses each with the subnet mask of 255.255.255.0. Which two IPv4 addresses belong to the same local network? (Choose two.)
▢ 192.168.10.2
▢ 193.168.10.16
▢ 192.168.10.56
▢ 192.167.10.74
▢ 192.168.100.62
192.168.10.2
192.168.10.56
The IT group needs to design and deploy IPv4 network connectivity in a new high school computer lab. The network design requires multiple logical networks be deployed on one physical network. Which technology is required to enable computers on different logical networks to communicate with each other?
◯ routing
◯ hosting
◯ mapping
◯ switching
routing
Module 9
Which two statements are correct about private IPv4 addresses? (Choose two).
▢ Any organization (home, school, office, company) can use the 10.0.0.0/8 address.
▢ Private IPv4 addresses are assigned to devices within an organization’s intranet (internal network).
▢ 172.99.1.1 is a private IPv4 address.
▢ Internet routers will typically forward any packet with a destination address that is a private IPv4 address.
▢ Any organization (home, school, office, company) can use the 10.0.0.0/8 address.
▢ Private IPv4 addresses are assigned to devices within an organization’s intranet (internal network).
Which two statements are correct about public IPv4 addresses? (Choose two).
▢ Public IPv4 address exhaustion is a reason why there are private Ipv4 addresses and why organizations are transitioning to IPv6.
▢ 192.168.1.10 is a public IPv4 address.
▢ Public IPv4 addresses are allowed to be assigned to devices within an organization’s intranet (internal network).
▢ To access a device over the internet, the destination IPv4 address must be a public address.
▢ Public IPv4 address exhaustion is a reason why there are private Ipv4 addresses and why organizations are transitioning to IPv6.
▢ To access a device over the internet, the destination IPv4 address must be a public address.
Which organization or group of organizations receives IP addresses from IANA and is responsible for allocating these addresses to ISPs and some organizations?
◯ IETF
◯ Tier 1 ISPs
◯ IEEE
◯ RIRs
RIRs
Which devices will not forward an IPv4 broadcast packet by default?
◯ Ethernet switch
◯ router
◯ Windows PC
◯ None of the above. All devices forward IPv4 broadcast packets by default.
router
Which two situations are the result of excessive broadcast traffic? (Choose two)
▢ when devices on all adjacent networks are affected
▢ slow network operations
▢ when the router has to forward an excessive number of packets
▢ slow device operations
slow network operations
slow device operations
Module 9 Quiz
Which statement describes one purpose of the subnet mask setting for a host?
◯ It is used to describe the type of the subnet.
◯ It is used to identify the default gateway.
◯ It is used to determine to which network the host is connected.
◯ It is used to determine the maximum number of bits within one packet that can be placed on a particular network.
It is used to determine to which network the host is connected.
What is one reason for subnetting an IP network?
◯ to reduce the scope of broadcast flooding
◯ to increase the number of available host addresses on the network
◯ to remove the need for network services that rely on broadcasts, such as DHCP
◯ to ensure that all devices can communicate with each other without requiring a router
to reduce the scope of broadcast flooding
A message is sent to all hosts on a remote network. Which type of message is it?
◯ limited broadcast
◯ multicast
◯ directed broadcast
◯ unicast
directed broadcast
A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this?
◯ private
◯ link-local
◯ loopback
◯ experimental
link-local
Which three IP addresses are private ? (Choose three.)
▢ 10.1.1.1
▢ 172.32.5.2
▢ 192.167.10.10
▢ 172.16.4.4
▢ 192.168.5.5
▢ 224.6.6.6
10.1.1.1
172.16.4.4
192.168.5.5
Match each description with an appropriate IP address.
▢ 240.2.6.255
▢ 127.0.0.1
▢ 198.133.219.2
▢ 169.254.1.5
Options:
▢ an experimental address
▢ a loopback address
▢ a link-local address
▢ a public address
240.2.6.255
an experimental address
127.0.0.1
a loopback address
198.133.219.2
a public address
169.254.1.5
a link-local address
Which network device can serve as a boundary to divide a Layer 2 broadcast domain?
◯ router
◯ Ethernet bridge
◯ Ethernet hub
◯ access point
router
What is the role of IANA?
◯ maintaining standards related to electrical wiring and connectors
◯ documenting developments for new protocols and updating existing protocols
◯ managing the allocation of IP addresses and domain names
◯ promoting the development and evolution of the Internet around the world
managing the allocation of IP addresses and domain names
Which address prefix range is reserved for IPv4 multicast?
◯ 240.0.0.0 - 254.255.255.255
◯ 224.0.0.0 - 239.255.255.255
◯ 169.254.0.0 - 169.254.255.255
◯ 127.0.0.0 - 127.255.255.255
224.0.0.0 - 239.255.255.255
A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?
◯ This is a loopback address.
◯ This is a link-local address.
◯ This is a private IP address.
◯ There is an IP address conflict.
This is a private IP address.
A host is transmitting a broadcast. Which host or hosts will receive it?
◯ all hosts in the same network
◯ a specially defined group of hosts
◯ the closest neighbor on the same network
◯ all hosts on the internet
all hosts in the same network