Modul 11-13 Flashcards

1
Q

What is the prefix length notation for the subnet mask 255.255.255.224?
- /25
- /26
- /27
- /28

A

What is the prefix length notation for the subnet mask 255.255.255.224?
- /25
- /26
- /27
- /28

Explanation: The binary format for 255.255.255.224 is 11111111.11111111.11111111.11100000. The prefix length is the number of consecutive 1s in the subnet mask. Therefore, the prefix length is /27.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?
- 254
- 190
- 192
- 62
- 64

A

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?
- 254
- 190
- 192
- 62
- 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which subnet mask would be used if 5 host bits are available?
- 255.255.255.0
- 255.255.255.128
- 255.255.255.224​
- 255.255.255.240

A

Which subnet mask would be used if 5 host bits are available?
- 255.255.255.0
- 255.255.255.128
- 255.255.255.224​
- 255.255.255.240

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?
- 1
- 2
- 4
- 8
- 16
- 64

A

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?
- 1
- 2
- 4
- 8
- 16
- 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?
- subnetwork 192.168.1.64
subnet mask 255.255.255.192
- subnetwork 192.168.1.32
subnet mask 255.255.255.240
- subnetwork 192.168.1.64
subnet mask 255.255.255.240
- subnetwork 192.168.1.128
subnet mask 255.255.255.192
- subnetwork 192.168.1.8
subnet mask 255.255.255.224

A

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?
- subnetwork 192.168.1.64
subnet mask 255.255.255.192
- subnetwork 192.168.1.32
subnet mask 255.255.255.240
- subnetwork 192.168.1.64
subnet mask 255.255.255.240
- subnetwork 192.168.1.128
subnet mask 255.255.255.192
- subnetwork 192.168.1.8
subnet mask 255.255.255.224

Explanation: The number of bits that are borrowed would be two, thus giving a total of 4 useable subnets:
192.168.1.0
192.168.1.64
192.168.1.128
192.168.1.192
Because 2 bits are borrowed, the new subnet mask would be /26 or 255.255.255.192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?
- two
- three
- four
- five

A

How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?
- two
- three
- four
- five

Explanation: Each network that is directly connected to an interface on a router requires its own subnet. The formula 2n, where n is the number of bits borrowed, is used to calculate the available number of subnets when borrowing a specific number of bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many host addresses are available on the 192.168.10.128/26 network?

  • 30
  • 32
  • 60
  • 62
  • 64
A

How many host addresses are available on the 192.168.10.128/26 network?

  • 30
  • 32
  • 60
  • 62
  • 64

Explanation: A /26 prefix gives 6 host bits, which provides a total of 64 addresses, because 26 = 64. Subtracting the network and broadcast addresses leaves 62 usable host addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

  • 510
  • 512
  • 1022
  • 1024
  • 2046
  • 2048
A

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

  • 510
  • 512
  • 1022
  • 1024
  • 2046
  • 2048

Explanation: A mask of 255.255.252.0 is equal to a prefix of /22. A /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion. The 10 bits in the host portion will provide 1022 usable IP addresses (210 – 2 = 1022).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)

  • 10.0.0.0/8
  • 172.16.0.0/12
  • 192.168.0.0/16
  • 100.64.0.0/14
  • 169.254.0.0/16
  • 239.0.0.0/8
A

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)

  • 10.0.0.0/8
  • 172.16.0.0/12
  • 192.168.0.0/16
  • 100.64.0.0/14
  • 169.254.0.0/16
  • 239.0.0.0/8

Explanation: RFC 1918, Address Allocation for Private Internets, defines three blocks of IPv4 address for private networks that should not be routable on the public Internet.

10.0.0.0/8
172.16.0.0/12
192.168.0.0/16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A site administrator has been told that a particular network at the site must accommodate 126 hosts. Which subnet mask would be used that contains the required number of host bits?

  • 255.255.255.0
  • 255.255.255.128
  • 255.255.255.224
  • 255.255.255.240
A

A site administrator has been told that a particular network at the site must accommodate 126 hosts. Which subnet mask would be used that contains the required number of host bits?

  • 255.255.255.0
  • 255.255.255.128
  • 255.255.255.224
  • 255.255.255.240

Explanation: The subnet mask of 255.255.255.0 has 8 host bits. The mask of 255.255.255.128 results in 7 host bits. The mask of 255.255.255.224 has 5 host bits. Finally, 255.255.255.240 represents 4 host bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the usable number of host IP addresses on a network that has a /26 mask?

  • 256
  • 254
  • 64
  • 62
  • 32
  • 16
A

What is the usable number of host IP addresses on a network that has a /26 mask?

  • 256
  • 254
  • 64
  • 62
  • 32
  • 16

Explanation: A /26 mask is the same as 255.255.255.192. The mask leaves 6 host bits. With 6 host bits, 64 IP addresses are possible. One address represents the subnet number and one address represents the broadcast address, which means that 62 addresses can then be used to assign to network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which address prefix range is reserved for IPv4 multicast?

  • 240.0.0.0 – 254.255.255.255
  • 224.0.0.0 – 239.255.255.255
  • 169.254.0.0 – 169.254.255.255
  • 127.0.0.0 – 127.255.255.255
A

Which address prefix range is reserved for IPv4 multicast?

  • 240.0.0.0 – 254.255.255.255
  • 224.0.0.0 – 239.255.255.255
  • 169.254.0.0 – 169.254.255.255
  • 127.0.0.0 – 127.255.255.255

Explanation: Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?

  • This is a loopback address.
  • This is a link-local address.
  • This is a private IP address.
  • There is an IP address conflict.
A

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?

  • This is a loopback address.
  • This is a link-local address.
  • This is a private IP address.
  • There is an IP address conflict.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which three addresses are valid public addresses? (Choose three.)

  • 198.133.219.17
  • 192.168.1.245
  • 10.15.250.5
  • 128.107.12.117
  • 172.31.1.25
  • 64.104.78.227
A

Which three addresses are valid public addresses? (Choose three.)

  • 198.133.219.17
  • 192.168.1.245
  • 10.15.250.5
  • 128.107.12.117
  • 172.31.1.25
  • 64.104.78.227

Explanation: The ranges of private IPv4 addresses are as folllows:
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A message is sent to all hosts on a remote network. Which type of message is it?

  • limited broadcast
  • multicast
  • directed broadcast
  • unicast
A

A message is sent to all hosts on a remote network. Which type of message is it?

  • limited broadcast
  • multicast
  • directed broadcast
  • unicast

Explanation: A directed broadcast is a message sent to all hosts on a specific network. It is useful for sending a broadcast to all hosts on a nonlocal network. A multicast message is a message sent to a selected group of hosts that are part of a subscribing multicast group. A limited broadcast is used for a communication that is limited to the hosts on the local network. A unicast message is a message sent from one host to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

  • 192.168.1.16/28
  • 192.168.1.64/27
  • 192.168.1.128/27
  • 192.168.1.96/28
  • 192.168.1.192/28
A

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

  • 192.168.1.16/28
  • 192.168.1.64/27
  • 192.168.1.128/27
  • 192.168.1.96/28
  • 192.168.1.192/28

Explanation: Subnet 192.168.1.64 /27 has 5 bits that are allocated for host addresses and therefore will be able to support 32 addresses, but only 30 valid host IP addresses. Subnet 192.168.1.96/28 has 4 bits for host addresses and will be able to support 16 addresses, but only 14 valid host IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which address is a valid IPv6 link-local unicast address?

  • FEC8:1::FFFF
  • FD80::1:1234
  • FE80::1:4545:6578:ABC1
  • FE0A::100:7788:998F
  • FC90:5678:4251:FFFF
A

Which address is a valid IPv6 link-local unicast address?

  • FEC8:1::FFFF
  • FD80::1:1234
  • FE80::1:4545:6578:ABC1
  • FE0A::100:7788:998F
  • FC90:5678:4251:FFFF

Explanation: IPv6 LLAs are in the fe80::/10 range. The /10 indicates that the first 10 bits are 1111 1110 10xx xxxx. The first hextet has a range of 1111 1110 1000 0000 (fe80) to 1111 1110 1011 1111 (febf).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?

  • 3FFE:1044::AB::57
  • 3FFE:1044::00AB::0057
  • 3FFE:1044:0:0:AB::57
  • 3FFE:1044:0:0:00AB::0057
  • 3FFE:1044:0000:0000:00AB::57
  • 3FFE:1044:0000:0000:00AB::0057
A

Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?

  • 3FFE:1044::AB::57
  • 3FFE:1044::00AB::0057
  • 3FFE:1044:0:0:AB::57
  • 3FFE:1044:0:0:00AB::0057
  • 3FFE:1044:0000:0000:00AB::57
  • 3FFE:1044:0000:0000:00AB::0057

Explanation: The rules for reducing the notation of IPv6 addresses are:
1. Omit any leading 0s (zeros) in any hextet.
2. Replace any single, contiguous string of one or more 16-bit hextets consisting of all zeros with a double colon (::) .
3. The double colon (::) can only be used once within an address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

  • 16
  • 256
  • 4096
  • 65536
A

A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

  • 16
  • 256
  • 4096
  • 65536

Explanation: With a network prefix of 48, there will be 16 bits available for subnetting because the interface ID starts at bit 64. Sixteen bits will yield 65536 subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?

  • 2001:db8:0:f00::/52
  • 2001:db8:0:8000::/52
  • 2001:db8:0:f::/52
  • 2001:db8:0:f000::/52
A

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?

  • 2001:db8:0:f00::/52
  • 2001:db8:0:8000::/52
  • 2001:db8:0:f::/52
  • 2001:db8:0:f000::/52

Explanation: Prefix 2001:db8::/48 has 48 network bits. If we subnet to a /52, we are moving the network boundary four bits to the right and creating 16 subnets. The first subnet is 2001:db8::/52 the last subnet is 2001:db8:0:f000::/52.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Consider the following range of addresses:

  • 2001:0DB8:BC15:00A0:0000::
  • 2001:0DB8:BC15:00A1:0000::
  • 2001:0DB8:BC15:00A2:0000::
  • 2001:0DB8:BC15:00AF:0000::

The prefix-length for the range of addresses is ???

A

Consider the following range of addresses:

  • 2001:0DB8:BC15:00A0:0000::
  • 2001:0DB8:BC15:00A1:0000::
  • 2001:0DB8:BC15:00A2:0000::
  • 2001:0DB8:BC15:00AF:0000::

The prefix-length for the range of addresses is /60 .

Explanation: All the addresses have the part 2001:0DB8:BC15:00A in common. Each number or letter in the address represents 4 bits, so the prefix-length is /60.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of IPv6 address is FE80::1?

  • loopback
  • link-local
  • multicast
  • global unicast
A

What type of IPv6 address is FE80::1?

  • loopback
  • link-local
  • multicast
  • global unicast

Explanation: Link-local IPv6 addresses start with FE80::/10, which is any address from FE80:: to FEBF::. Link-local addresses are used extensively in IPv6 and allow directly connected devices to communicate with each other on the link they share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

  • the MAC address of the IPv6 enabled interface
  • a randomly generated 64-bit hexadecimal address
  • an IPv6 address that is provided by a DHCPv6 server
  • an IPv4 address that is configured on the interface
A

What is used in the EUI-64 process to create an IPv6 interface ID on an IPv6 enabled interface?

  • the MAC address of the IPv6 enabled interface
  • a randomly generated 64-bit hexadecimal address
  • an IPv6 address that is provided by a DHCPv6 server
  • an IPv4 address that is configured on the interface

Explanation: The EUI-64 process uses the MAC address of an interface to construct an interface ID (IID). Because the MAC address is only 48 bits in length, 16 additional bits (FF:FE) must be added to the MAC address to create the full 64-bit interface ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?

  • 2001:DB8:BC15
  • 2001:DB8:BC15:A
  • 2001:DB8:BC15:A:1
  • 2001:DB8:BC15:A:12
A

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?

  • 2001:DB8:BC15
  • 2001:DB8:BC15:A
  • 2001:DB8:BC15:A:1
  • 2001:DB8:BC15:A:12

Explanation: The network portion, or prefix, of an IPv6 address is identified through the prefix length. A /64 prefix length indicates that the first 64 bits of the IPv6 address is the network portion. Hence the prefix is 2001:DB8:BC15:A.

25
Q

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

  • the one IPv6 device on the link that has been uniquely configured with this address
  • all IPv6 enabled devices on the local link or network
  • only IPv6 DHCP servers
  • only IPv6 configured routers
A

An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?​

  • the one IPv6 device on the link that has been uniquely configured with this - address
  • all IPv6 enabled devices on the local link or network
  • only IPv6 DHCP servers
  • only IPv6 configured routers

Explanation: This address is one of the assigned IPv6 multicast addresses. Packets addressed to FF02::1 are for all IPv6 enabled devices on the link or network. FF02::2 is for all IPv6 routers that exist on the network.

26
Q

Which IPv6 prefix is reserved for communication between devices on the same link?

  • FC00::/7
  • 2001::/32
  • FE80::/10
  • FDFF::/7
A

Which IPv6 prefix is reserved for communication between devices on the same link?

  • FC00::/7
  • 2001::/32
  • FE80::/10
  • FDFF::/7

Explanation: IPv6 link-local unicast addresses are in the FE80::/10 prefix range and are not routable. They are used only for communications between devices on the same link.

27
Q

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

  • unique local
  • global unicast
  • link-local
  • anycast
A

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

  • unique local
  • global unicast
  • link-local
  • anycast

Explanation: The IPv6 specifications include anycast addresses. An anycast address is any unicast IPv6 address that is assigned to multiple devices.

28
Q

What are two types of IPv6 unicast addresses? (Choose two.)

  • multicast
  • loopback
  • link-local
  • anycast
  • broadcast
A

What are two types of IPv6 unicast addresses? (Choose two.)

  • multicast
  • loopback
  • link-local
  • anycast
  • broadcast

Explanation: Multicast, anycast, and unicast are types of IPv6 addresses. There is no broadcast address in IPv6. Loopback and link-local are specific types of unicast addresses.

29
Q

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?

  • stateful DHCPv6
  • SLAAC
  • static IPv6 addressing
  • stateless DHCPv6
A

Which service provides dynamic global IPv6 addressing to end devices without using a server that keeps a record of available IPv6 addresses?

  • stateful DHCPv6
  • SLAAC
  • static IPv6 addressing
  • stateless DHCPv6

Explanation: Using stateless address autoconfiguration (SLAAC), a PC can solicit a router and receive the prefix length of the network. From this information the PC can then create its own IPv6 global unicast address.

30
Q

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?

  • ARPv6
  • DHCPv6
  • ICMPv6
  • UDP
A

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?

  • ARPv6
  • DHCPv6
  • ICMPv6
  • UDP

Explanation: SLAAC uses ICMPv6 messages when dynamically assigning an IPv6 address to a host. DHCPv6 is an alternate method of assigning an IPv6 addresses to a host. ARPv6 does not exist. Neighbor Discovery Protocol (NDP) provides the functionality of ARP for IPv6 networks. UDP is the transport layer protocol used by DHCPv6.

31
Q

A technician uses the ping 127.0.0.1 command. What is the technician testing?

  • the TCP/IP stack on a network host
  • connectivity between two adjacent Cisco devices
  • connectivity between a PC and the default gateway
  • connectivity between two PCs on the same network
  • physical connectivity of a particular PC and the network
A

A technician uses the ping 127.0.0.1 command. What is the technician testing?

  • the TCP/IP stack on a network host
  • connectivity between two adjacent Cisco devices
  • connectivity between a PC and the default gateway
  • connectivity between two PCs on the same network
  • physical connectivity of a particular PC and the network
32
Q

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

  • SNMP
  • ICMP
  • Telnet
  • TCP
A

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies?

  • SNMP
  • ICMP
  • Telnet
  • TCP

Explanation: Traceroute uses the ICMP (Internet Control Message Protocol) to send and receive echo-request and echo-reply messages.

33
Q

Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?

  • network unreachable
  • time exceeded
  • protocol unreachable
  • port unreachable
A

Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded?

  • network unreachable
  • time exceeded
  • protocol unreachable
  • port unreachable

Explanation: ICMPv6 uses the hop limit field in the IPv6 packet header to determine if the packet has expired. If the hop limit field has reached zero, a router will send a time exceeded message back towards the source indicating that the router cannot forward the packet.

34
Q

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?

  • when the value of the Hop Limit field reaches 255
  • when the value of the Hop Limit field reaches zero
  • when the router receives an ICMP time exceeded message
  • when the target host responds with an ICMP echo reply message
A

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet?

  • when the value of the Hop Limit field reaches 255
  • when the value of the Hop Limit field reaches zero
  • when the router receives an ICMP time exceeded message
  • when the target host responds with an ICMP echo reply message

Explanation: When a traceroute is performed, the value in the Hop Limit field of an IPv6 packet determines how many router hops the packet can travel. Once the Hop Limit field reaches a value of zero, it can no longer be forwarded and the receiving router will drop the packet.

35
Q

What is the purpose of ICMP messages?

  • to inform routers about network topology changes
  • to ensure the delivery of an IP packet
  • to provide feedback of IP packet transmissions
  • to monitor the process of a domain name to IP address resolution
A

What is the purpose of ICMP messages?

  • to inform routers about network topology changes
  • to ensure the delivery of an IP packet
  • to provide feedback of IP packet transmissions
  • to monitor the process of a domain name to IP address resolution

Explanation: The purpose of ICMP messages is to provide feedback about issues that are related to the processing of IP packets

36
Q

What source IP address does a router use by default when the traceroute command is issued?

  • the highest configured IP address on the router
  • a loopback IP address
  • the IP address of the outbound interface
  • the lowest configured IP address on the router
A

What source IP address does a router use by default when the traceroute command is issued?

  • the highest configured IP address on the router
  • a loopback IP address
  • the IP address of the outbound interface
  • the lowest configured IP address on the router

Explanation: When sending an echo request message, a router will use the IP address of the exit interface as the source IP address. This default behavior can be changed by using an extended ping and specifying a specific source IP address.

37
Q

A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1. What does this code represent?

  • host unreachable
  • protocol unreachable
  • port unreachable
  • network unreachable
A

A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1. What does this code represent?

  • host unreachable
  • protocol unreachable
  • port unreachable
  • network unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

38
Q

Which subnet would include the address 192.168.1.96 as a usable host address?

  • 192.168.1.64/26
  • 192.168.1.32/27
  • 192.168.1.32/28
  • 192.168.1.64/29
A

Which subnet would include the address 192.168.1.96 as a usable host address?

  • 192.168.1.64/26
  • 192.168.1.32/27
  • 192.168.1.32/28
  • 192.168.1.64/29

Explanation: For the subnet of 192.168.1.64/26, there are 6 bits for host addresses, yielding 64 possible addresses. However, the first and last subnets are the network and broadcast addresses for this subnet. Therefore, the range of host addresses for this subnet is 192.168.1.65 to 192.168.1.126. The other subnets do not contain the address 192.168.1.96 as a valid host address.

39
Q

A host is transmitting a broadcast. Which host or hosts will receive it?

  • all hosts in the same subnet
  • a specially defined group of hosts
  • the closest neighbor on the same network
  • all hosts on the Internet
A

A host is transmitting a broadcast. Which host or hosts will receive it?

  • a specially defined group of hosts
  • the closest neighbor on the same network
  • all hosts in the same subnet
  • all hosts on the Internet

Explanation: A broadcast is delivered to every host that has an IP address within the same network.

40
Q

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 3. What does this code represent?

  • address unreachable
  • network unreachable
  • host unreachable
  • protocol unreachable
A

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 3. What does this code represent?

  • network unreachable
  • host unreachable
  • protocol unreachable
  • address unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

41
Q

A host is transmitting a multicast. Which host or hosts will receive it?

  • a specially defined group of hosts
  • the closest neighbor on the same network
  • one specific host
  • directly connected network devices
A

A host is transmitting a multicast. Which host or hosts will receive it?

  • the closest neighbor on the same network
  • a specially defined group of hosts
  • one specific host
  • directly connected network devices
42
Q

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

  • 2001:db8::a0b0:8:1
  • 2001:db8::ab8:1:0:1000
  • 2001:db80:0:1::80:1
  • 2001:db80:::1::80:1
A

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

  • 2001:db8::ab8:1:0:1000
  • 2001:db80:0:1::80:1
  • 2001:db8::a0b0:8:1
  • 2001:db80:::1::80:1
43
Q

Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

  • fe80:9ea:0:2200::fe0:290
  • fe80:9:20::b000:290
  • fe80:9ea0::2020:0:bf:e0:9290
  • fe80:9ea0::2020::bf:e0:9290
A

Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

  • fe80:9:20::b000:290
  • fe80:9ea0::2020:0:bf:e0:9290
  • fe80:9ea0::2020::bf:e0:9290
  • fe80:9ea:0:2200::fe0:290
44
Q

Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

  • 2002:42:10:c400::909
  • 200:420:110:c4b::910:0:90
  • 2002:4200::25:1090:0:99
  • 2002:42::25:1090:0:99
A

Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

  • 200:420:110:c4b::910:0:90
  • 2002:42:10:c400::909
  • 2002:4200::25:1090:0:99
  • 2002:42::25:1090:0:99
45
Q

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?

  • 2001:db8::ab8:1:0:1000
  • 2001:db8::a0b0:8:1
  • 2001:db8:1::ab8:0:1
  • 2001:db8:0:1::8:1
A

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0ab8:0001:0000:1000?

  • 2001:db8::a0b0:8:1
  • 2001:db8:1::ab8:0:1
  • 2001:db8::ab8:1:0:1000
  • 2001:db8:0:1::8:1
46
Q

Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?

  • 2002:420:c4:1008:25:190::990
  • 2002:42:10:c400::909
  • 2002:4200::25:1090:0:99
  • 2002:42::25:1090:0:99
A

Which is the compressed format of the IPv6 address 2002:0420:00c4:1008:0025:0190:0000:0990?

  • 2002:420:c4:1008:25:190::990
  • 2002:42:10:c400::909
  • 2002:4200::25:1090:0:99
  • 2002:42::25:1090:0:99
47
Q

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

  • 2001:db8::a0b0:8:1
  • 2001:db8:1::ab8:0:1
  • 2001:db8::ab8:1:0:1000
  • 2001:db8:0:1::8:1
A

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

  • 2001:db8:1::ab8:0:1
  • 2001:db8::ab8:1:0:1000
  • 2001:db8::a0b0:8:1
  • 2001:db8:0:1::8:1
48
Q

Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?

  • fe80::220:b3f:f0e0:29
  • fe80:9ea:0:2200::fe0:290
  • fe80:9ea0::2020:0:bf:e0:9290
  • fe80:9ea0::2020::bf:e0:9290
A

Which is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?

  • fe80:9ea:0:2200::fe0:290
  • fe80::220:b3f:f0e0:29
  • fe80:9ea0::2020:0:bf:e0:9290
  • fe80:9ea0::2020::bf:e0:9290
49
Q

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

  • 2001:db8::a0b0:8:1
  • 2001:db8::ab8:1:0:1000
  • 2001:db80:0:1::80:1
  • 2001:db8:0:1::8:1
A

Which is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:a0b0:0008:0001?

  • 2001:db8::a0b0:8:1
  • 2001:db8::ab8:1:0:1000
  • 2001:db80:0:1::80:1
  • 2001:db8:0:1::8:1
50
Q

Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

  • 2002:42:10:c400::909
  • 2002:4200::25:1090:0:99
  • 2002:420:c4:1008:25:190::990
  • 2002:42::25:1090:0:99
A

Which is the compressed format of the IPv6 address 2002:0042:0010:c400:0000:0000:0000:0909?

  • 2002:4200::25:1090:0:99
  • 2002:420:c4:1008:25:190::990
  • 2002:42:10:c400::909
  • 2002:42::25:1090:0:99
51
Q

Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

  • fe80:9ea:0:2200::fe0:290
  • fe80:9ea0::2020:0:bf:e0:9290
  • fe80::220:b3f:f0e0:29
  • fe80::0220:0b3f:f0e0:0029
A

Which is the compressed format of the IPv6 address fe80:09ea:0000:2200:0000:0000:0fe0:0290?

  • fe80:9ea0::2020:0:bf:e0:9290
  • fe80:9ea:0:2200::fe0:290
  • fe80::220:b3f:f0e0:29
  • fe80::0220:0b3f:f0e0:0029
52
Q

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?

  • beyond scope of the source address
  • communication with the destination administratively prohibited
  • address unreachable
  • no route to destination
A

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2 . What does this code represent?

  • beyond scope of the source address
  • communication with the destination administratively prohibited
  • address unreachable
  • no route to destination

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

53
Q

A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1 . What does this code represent?

  • host unreachable
  • beyond scope of the source address
  • address unreachable
  • communication with the destination administratively prohibited
A

A user issues a ping 192.135.250.103 command and receives a response that includes a code of 1 . What does this code represent?

  • beyond scope of the source address
  • address unreachable
  • communication with the destination administratively prohibited
  • host unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

54
Q

A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 3 . What does this code represent?

  • address unreachable
  • communication with the destination administratively prohibited
  • beyond scope of the source address
  • no route to destination
A

A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 3 . What does this code represent?

  • communication with the destination administratively prohibited
  • address unreachable
  • beyond scope of the source address
  • no route to destination

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

55
Q

A user issues a ping 10.10.14.67 command and receives a response that includes a code of 0 . What does this code represent?

  • network unreachable
  • protocol unreachable
  • port unreachable
  • host unreachable
A

A user issues a ping 10.10.14.67 command and receives a response that includes a code of 0 . What does this code represent?

  • protocol unreachable
  • port unreachable
  • network unreachable
  • host unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

56
Q

A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 4 . What does this code represent?

  • port unreachable
  • host unreachable
  • protocol unreachable
  • network unreachable
A

A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 4. What does this code represent?
A user issues a ping fe80:65ab:dcc1::100 command and receives a response that includes a code of 4 . What does this code represent?

  • port unreachable
  • host unreachable
  • protocol unreachable
  • network unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

57
Q

A user issues a ping 198.133.219.8 command and receives a response that includes a code of 0 . What does this code represent?

  • network unreachable
  • protocol unreachable
  • port unreachable
  • host unreachable
A

A user issues a ping 198.133.219.8 command and receives a response that includes a code of 0 . What does this code represent?

  • protocol unreachable
  • network unreachable
  • port unreachable
  • host unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

58
Q

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 4 . What does this code represent?

  • port unreachable
  • host unreachable
  • protocol unreachable
  • network unreachable
A

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 4 . What does this code represent?

  • host unreachable
  • protocol unreachable
  • network unreachable
  • port unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long

59
Q

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2. What does this code represent?

  • beyond scope of the source address
  • host unreachable
  • protocol unreachable
  • network unreachable
A

A user issues a ping 2001:db8:FACE:39::10 command and receives a response that includes a code of 2. What does this code represent?

  • host unreachable
  • beyond scope of the source address
  • protocol unreachable
  • network unreachable

0 no route to destination
1 communication with destination administratively prohibited
2 beyond scope of source address
3 address unreachable
4 port unreachable
5 source address failed ingress/egress policy
6 reject route to destination
7 Error in Source Routing Header
8 Headers too long