Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
85 views23 pages

Networking

The document discusses several questions related to computer networking concepts: 1) It explains that the Time to Live (TTL) field in an IP datagram is used to prevent packet looping. 2) It analyzes IP network prefixes and determines that a netmask of 255.255.255.224 would incorrectly place two computers with IP addresses 10.105.1.113 and 10.105.1.91 in different networks. 3) It calculates the shortest paths between 6 routers and determines that 2 links in the original network configuration would never be used for data transfer. The second and third summaries are under the 3 sentence limit.

Uploaded by

Star Hostani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views23 pages

Networking

The document discusses several questions related to computer networking concepts: 1) It explains that the Time to Live (TTL) field in an IP datagram is used to prevent packet looping. 2) It analyzes IP network prefixes and determines that a netmask of 255.255.255.224 would incorrectly place two computers with IP addresses 10.105.1.113 and 10.105.1.91 in different networks. 3) It calculates the shortest paths between 6 routers and determines that 2 links in the original network configuration would never be used for data transfer. The second and third summaries are under the 3 sentence limit.

Uploaded by

Star Hostani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

1) One of the header fields in an IP datagram is the Time to Live (TTL) field.

Which of the
following statements best explains the need for this field?
(A) It can be used to priortize packets
(B) It can be used to reduce delays
(C) It can be used to optimize throughput
(D) It can be used to prevent packet looping

Answer (D)
2) Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91
respectively and they both use the same netmask N. Which of the values of N given
below should not be used if A and B should belong to the same network?
(A) 255.255.255.0
(B) 255.255.255.128
(C) 255.255.255.192
(D) 255.255.255.224

Answer (D)
The last octets of IP addresses of A and B are 113 ( 01110001) and 91 (01011011). The netmask
in option (D) has first three bits set in last octet. If netmask has first 3 bits set, then these bits
nmust be same in A and B, but that is not the case. In simple words, we can say option (D) is not
a valid netmask because doing binary ‘&’ of it with addresses of A and B doesn’t give the same
network address. It must be same address as A and B are on same network. See this for more
details.

A socket address is a combination of


__________.
A - Mac address and logical address
B- Mac address and port number
C- User-specific address and logical address
D- None of the choices are correct

Answer (D)

TCP is a(n) ____ subprotocol.


a. connection-oriented correct
b. connectionless
c. indiscriminating
d. open-ended

A UDP header contains ____fields.


a. four correct
b. six
c. eight
d. ten
3) Consider a network with 6 routers R1 to R6 connected with links having weights as shown
in the following diagram

All the routers use the distance vector based routing algorithm to update their routing
tables. Each router starts with its routing table initialized to contain an entry for each
neighbour with the weight of the respective connecting link. After all the routing tables
stabilize, how many links in the network will never be used for carrying any data?
(A) 4
(B) 3
(C) 2
(D) 1
Answer (C)
We can check one by one all shortest distances. When we check for all shortest distances for Ri we don’t need to check its
distances to R0 to Ri-1 because the network graph is undirected.
Following will be distance vectors of all nodes.

Shortest Distances from R1 to R2, R3, R4, R5 and R6


R1 (5, 3, 12, 12, 16)
Links used: R1-R3, R3-R2, R2-R4, R3-R5, R5-R6

Shortest Distances from R2 to R3, R4, R5 and R6


R2 (2, 7, 8, 12)
Links used: R2-R3, R2-R4, R4-R5, R5-R6

Shortest Distances from R3 to R4, R5 and R6


R3 (9, 9, 13)
Links used: R3-R2, R2-R4, R3-R5, R5-R6

Shortest Distances from R4 to R5 and R6


R4 (1, 5)
Links used: R4-R5, R5-R6

Shortest Distance from R5 to R6


R5 (4)
Links Used: R5-R6

If we mark, all the used links one by one, we can see that following links are never used.
R1-R2
R4-R6
4) Suppose the weights of all unused links in the previous question are changed to 2 and
the distance vector algorithm is used again until all routing tables stabilize. How many
links will now remain unused?
(A) 0
(B) 1
(C) 2
(D) 3

Answer (B)
After the weights of unused links () are changed to following graph.

Following will be distance vectors of all nodes


R1 (2, 3, 9, 10, 11)
Links used: R1-R2, R1-R3, R2-R4, R4-R5, R4-R6

R2 (2, 7, 8, 9)
Links used: R2-R3, R2-R4, R4-R5, R4-R6

R3 (9, 9, 11)
Links used: R3-R2, R2-R4, R3-R5, R4-R6

R4 (1, 2)
Links used: R4-R5, R4-R6

R5 (3)
Links Used: R5-R4, R4-R6

If we mark, all the used links one by one, we can see that all links are used except the following link.
R5-R6

1) Packets of the same session may be routed through different paths in:
(a) TCP, but not UDP
(b) TCP and UDP
(c) UDP, but not TCP
(d) Neither TCP nor UDP
Answer (b)

____ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data
already in the ARP table.
a. Temporary
b. Dynamic correct
c. Static
d. On-demand
In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
a. IP correct
b. ARP
c. TCP
d. UDP
In IPv4 addressing, each IP address is a unique ____ number.
a. 12-bit
b. 32-bit correct
c. 64-bit
d. 128-bit
In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
a. A
b. B
c. C
d. D
B
In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ____
network.
a. A
b. B
c. C
d. D
In dotted decimal notation, a(n) ____ separates each decimal.
a. dash
b. slash
c. colon
d. period correct
The default subnet mask for a Class B network is ____.
a. 255.0.0.0
b. 255.255.255.0
c. 255.255.0.0 correct
d. 255.255.255.255
In most cases, BOOTP has been surpassed by the more sophisticated IP addressing utility, ____.
a. APIPA
b. DHCP correct
c. DNS
d. RARP
A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a
transmission.

a. singlecast
b. multicast
c. unicast
d. anycast correct
TCP is a ___________ protocol
A) connection-oriented correct
B) connectionless
C) both a and b
D) none of the above
TCP is a(n) _______ transport protocol.
A) unreliable
B) best-effort delivery
C) reliable correct
D) none of the above

11. Which command displays the configuration register setting?


A. show ip route
B. show boot version
C. show version correct
D. show flash

______________ means accepting items from more than one source.


A) Demultiplexing
B) Multiplexing correct
C) Multiplexing and demultiplexing
D) None of the choices are correct
6 ______________ means delivering items to more than one source.
A) Demultiplexing correct
B) Multiplexing
C) Multiplexing and demultiplexing
D) None of the choices are correct
7 _________ means the producer delivers the items when they are produced without waiting for the
request from the consumer.
A) Pushing correct
B) Pulling
C) Forwarding
D) None of the choices are correct
8 _________ means the consumer takes the items when it is ready to do so.
A) Pushing
B) Pulling correct
C) Forwarding
D) None of the choices are correct

A one-to-all communication between one source and all hosts on a network is classified as a _______
communication.
A) unicast
B) multicast
C) broadcast correct
D) none of the above
A one-to-many communication between one source and a specific group of hosts is classified as a _______
communication.
A) unicast
B) multicast correct
C) broadcast
D) none of the above

A one-to-one communication between one source and one destination is classified as a _______
communication.
A) unicast correct
B) multicast
C) broadcast
D) none of the above

In ______, the router forwards the received packet through only one of its interfaces.
A) unicasting correct
B) multicasting
C) broadcasting
D) none of the above

In _______, the router may forward the received packet through several of its interfaces.
A) unicasting
B) multicasting correct
C) broadcasting
D) none of the above

Emulation of ________ through ___________ is not efficient and may create long delays.
A) unicasting; multiple unicasting
B) multicasting; multiple unicasting correct
C) broadcasting; multicasting
D) none of the above

In unicast routing, each router in the domain has a table that defines a ______ path tree to possible
destinations.
A) average
B) longest
C) shortest correct
D) none of the above
In multicast routing, each involved router needs to construct a ________ path tree for each group.
A)average
B) longest
C) shortest correct
D) none of the above
In the _______ tree approach, each router needs to have one shortest path tree for each group.
A) group-shared
B) source-based correct
C) a or b
D) none of the

Multicast link state routing uses the _______ tree approach.


A) source-based correct
B) group-shared
C) a or b
D) none of the above

The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses
multicast routing to create source-based trees. The protocol is based on _______ routing. A)
distance vector
B) link state correct
C) path vector
D) none of the above

MOSPF is a _______ protocol.


A) data-driven correct
B) command-driven
C) both a and b
D) none of the above

_________ broadcasts packets, but creates loops in the systems.


A) Forwarding
B) Flooding correct
C) Backwarding
D) none of the abov

Normally value of Kmax in pure ALOHA is

A. 5
B. 10
C. 15 correct
D. 20

Answer C
1.HowdoesCSMA/CDreacttocollisions? A.Allsystemsjamthenetwork,andthenallbegintransmittingagain. B.Hosts
involvedinacollisionsendanRTSsignalindicatingatimeframeinwhichtoretransmit. C.Hostsinvolvedinthecollisionsend
ajamsignal,andthenrunanalgorithmbeforeretransmittin. D.CollisionsdonotoccuronCSMA/CD.
Answer : c

3.WhichanswercorrectlyliststheOSIPDUsinorder?
A.Data,Packet,Frame,Segment,Bit
B.Bit,Data,Packet,Segment,Frame
C.Data,Segment,Packet,Frame,Bit Answer : c
D.Bit,Frame,Segment,Packet,Data

4.Whichtransportlayerprotocolprovidesconnection‐oriented,reliabletransport?
A.TFTP B.UDP C.Ethernet D.TCP E.SecureShell
Answer : d

6.InwhichlayeroftheTCP/IPstackisframingfound?
A.Network
B.DataLink
C.Internet
D.NetworkAccess correct

7.WhichofthefollowingWANtechnologiesisconsideredpacketswitched?
A.Framerelay correct
B.T1lines
C.Dial‐up
D.DSL Susan
8.WhichOSIlayerisconcernedwithreliableend‐to‐enddeliveryofdata?
A.Application
B.Transport correct
C.Network
D.DataLink

9.Logicaladdressingisfoundinthe________________layer,whilephysicaladdressingisfoundinthe ________________
layer.
A.Physical,Network
B.Network,Physical
C.DataLink,Network
D.Network,Data correct

10.TheOSIReferenceModellayers,inorderfromtoptobottom,are: A.Application,Physical,Session,Transport,
Network,DataLink,Presentation B.Application,Presentation,Network,Session,Transport,DataLink,Physical C.
Physical,DataLink,Network,Transport,Session,Presentation,Application D.Application,Presentation,Session,
Transport,Network,DataLink,Physical Justification correct
4______________ means accepting items from more than one source. ______________means delivering items to
more than one source.
A) Demultiplexing; Multiplexing
B) Multiplexing; Demultiplexing correct
C) Encapsulation; Decapsulation
D) Pulling; Pushing

5________ means the producer delivers the items when they are produced. _______means the consumer takes the
items when it is ready to do so.
A) Pushing; Pulling correct
B) Pulling; Pushing
C) Forwarding; Accepting
D) None of the choices are correct

A static table is one _______. This is the correct answer.


A) with manual entries correct
B) which is updated automatically
C) either a or b
D) none of the above

A dynamic table is one _______.


A) with manual entries
B) which is updated automatically correct
C) either a or b
D) none of the above

For purposes of routing, the Internet is divided into ___________.


A) wide area networks
B) autonomous networks
C) autonomous systems correct
D) none of the above

____________ is a group of networks and routers under the authority of a single administration.
A) An autonomous system correct
B) An area
C) a and b
D) none of the above

Routing inside an autonomous system is referred to as _______________.


A) interdomain routing
B) intradomain routing correct
C) both a and b
D) none of the above
Routing between autonomous systems is referred to as ____________.
A) interdomain routing correct
B) intradomain routing
C) both a and b
D) none of the above

In _______ routing, the least cost route between any two nodes is the route with the minimum distance.
A) path vector
B) distance vector correct
C) link state
D) none of the above

In _______ delivery, both the deliverer of the IP packet and the destination are on the same network.
A) a connectionless

B) a direct ….

C) an indirect

D) none of the above

In _______ delivery, the deliverer of the IP packet and the destination are on different networks.
A) a connection-oriented

B) a direct

C) an indirect

D) none of the above

In _______ delivery, a packet is not connected to any other packet.


A) a connectionless

B) a connection-oriented

C) a direct

D) none of the above


In classful addressing, when a direct delivery is made, both the deliverer and receiver have the same
_______.
A) IP address

B) hostid

C) netid

D) none of the above

In classful addressing, when an indirect delivery is made, the deliverer and


receiver have _______.

3 A)
B)
the same IP address
different netids correct
C) the same netid
D) none of the above

The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers.
They are called the ________ ports.
A) well-known
B) registered
C) dynamic correct
D) none of the above

In the sending computer, UDP receives a data unit from the _______ layer.
A) application correct
B) transport
C) IP
D) none of the above

Which address could be the beginning address of a block of 16 classless addresses?


A) 2.4.6.5
B) 2.4.6.15
C) 2.4.6.62
D) none of the above correct

Which address could be the beginning address of a block of 256 classless addresses?
A) 2.4.6.5
B) 2.4.6.15
C) 2.4.6.0 correct
D) none of the above

What is the first address of a block of classless addresses if one of the addresses is
12.2.2.76/27?
A) 12.2.2.0
B) 12.2.2.32
C) 12.2.2.64 correct
D) none of the above

What is the first address of a block of classless addresses if one of the addresses is
12.2.2.76/10?

A) 12.0.0.0
B) 12.2.0.0
C) 12.2.2.2
D) none of the abov

What is the first address of a block of classless addresses if one of the addresses is
12.2.2.127/28?

A) 12.2.2.0
B) 12.2.2.96
C) 12.2.2.112 correct
D) none of the above

Find the number of addresses in a block of classless addresses if one of the addresses is
12.2.2.7/24.

A) 32
B) 64
C) 256 correct
D) none of the above

Find the number of addresses in a block of classless addresses if one of the addresses is
12.2.2.7/30.
A) 2
B) 4 correct
C) 8
D) none of the above

An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length
is /28, what is the maximum number of subnets?

A) 2
B) 4
C) 8 correct
D) none of the above

What is the default mask for class A in CIDR notation?

A) /9
B) /8 correct
C) /16
D) none of the above

What is the default mask for class B in CIDR notation?


A) /9
B) /8
C) /16 correct
D) none of the above

In ________ addressing, when an address is given, we can find the beginning address and the range of addresses.
A) classless
B) classful correct
C) both a and b
D) none of the above
In classless addressing, the ______ is another name for the common part of the address range.
A) suffix
B) prefix correct
C) netid
D) none of the above

In classless addressing, the _______ is the varying part (similar to the hostid).
A) suffix correct
B) prefix
C) hostid
D) none of the above
In classless addressing, the prefix length defines the _____________.
A) netid
B) hostid
C) mask correct
D) none of the above
The ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These are the ___________ ports.
A) well-known correct
B) registered
C) dynamic
D) none of the above

The ports ranging from 1,024 to 49,151 are not assigned or controlled by ICANN. They are called ___________
ports.
A) well-known
B) registered correct
C) dynamic
D) none of the above

In a block, the prefix length is /15; what is the mask?


A) 255.254.0.0 correct
B) 255.255.255.0
C) 255.255.255.128
D) none of the above

In a block, the prefix length is /22; what is the mask?


A) 255.255.255.0
B) 255.255.252.0 correct
C) 255.255.0.0
D) none of the above

Which two of the addresses below are available for host addresses on the subnet 192.168.15.19/28? (Select
two answer choices)
A. 192.168.15.17
B. 192.168.15.14
C. 192.168.15.29
D. 192.168.15.16
E. 192.168.15.31
F. None of the above

QUESTION 33:
You have a Class C network, and you need ten subnets. You wish to have as many addresses available for
hosts as possible. Which one of the following subnet masks should you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. None of the above

QUESTION 34:
Which of the following is an example of a valid unicast host IP address?
A. 172.31.128.255./18
B. 255.255.255.255
C. 192.168.24.59/30
D. FFFF.FFFF.FFFF
E. 224.1.5.2
F. All of the above

Explanation
The address 172.32.128.255 /18 is 10101100.00011111.10000000.11111111 in binary, so this is indeed a valid
host address.

QUESTION 35:
How many subnetworks and hosts are available per subnet if you apply a /28 mask to the 210.10.2.0 class
C network?
A. 30 networks and 6 hosts.
B. 6 networks and 30 hosts.
C. 8 networks and 32 hosts.
D. 32 networks and 18 hosts.
E. 16 networks and 14 hosts.
F. None of the above

Explanation:
A 28 bit subnet mask (11111111.11111111.11111111.11110000) applied to a class C network uses a 4 bits for
networks, and leaves 4 bits for hosts. Using the 2n-2 formula, we have 24-2 (or 2x2x2x2-2) which gives us 14
for the number of hosts, and the number of networks is 24 = 16.

QUESTION 36:
The Certkiller network was assigned the Class C network 199.166.131.0 from the ISP. If the
administrator at Certkiller were to subnet this class C network using the 255.255.255.224 subnet mask,
how may hosts will they be able to support on each subnet?
A. 14
B. 16
C. 30
D. 32
E. 62
F. 64

Explanation:
The subnet mask 255.255.255.224 is a 27 bit mask (11111111.11111111.11111111.11100000). It uses 3 bits
from the last octet for the network ID, leaving 5 bits for host addresses. We can calculate the number of hosts
supported by this subnet by using the 2n-2 formula where n represents the number of host bits. In this case it
will be 5. 25-2 gives us 30.

QUESTION 37:
What is the subnet for the host IP address 172.16.210.0/22?
A. 172.16.42.0
B. 172.16.107.0
C. 172.16.208.0
D. 172.16.252.0
E. 172.16.254.0
F. None of the above

Explanation:
This question is much easier then it appears when you convert it to binary and do the Boolean operation as
shown below:
IP address 172.16.210.0 = 10101100.00010000.11010010.00000000
/22 mask = 11111111.11111111.11111100.00000000
AND result = 11111111.11111111.11010000.00000000
AND in decimal= 172 . 16 . 208 . 0

QUESTION 38:
What is the subnet for the host IP address 201.100.5.68/28?
A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31

Explanation:
This question is much easier then it appears when you convert it to binary and do the Boolean operation as
shown below:
IP address 201.100.5.68 = 11001001.01100100.00000101.01000100
/28 mask = 11111111.11111111.11111111.11000000
AND result = 11001001.01100100.00000101.01000000
AND in decimal= 200 . 100 . 5 . 64

QUESTION 39:
Exhibit:

3 addresses are shown in binary form in the exhibit.


Regarding these three binary addresses in the above exhibit; which statements below are correct? (Select
three)
A. Address C is a public Class C address.
B. Address C is a private Class C address.
C. Address B is a public Class B address.
D. Address A is a public Class A address.
E. Address B is a private Class B address.
F. Address A is a private Class A address.

Explanation:
A. Address C converts to 192.167.178.69 in decimal, which is a public class C address.
D. Address A converts to 100.10.235.39, which is a public class A IP address.
E. Address B converts to 172.18.158.15, which is a private (RFC 1918) IP address.

QUESTION 40:
What is the IP address range for the first octet in a class B address, in binary form?
A. 00000111-10001111
B. 00000011-10011111
C. 10000000-10111111
D. 11000000-11011111
E. 11100000-11101111
F. None of the above

Explanation:
The class B address range is 128.0.0.0-191.255.255.255. When looking at the first octet alone, the range is 128-
191. The binary number for 128 is 10000000 and the binary number for 191 is 10111111, so the value rang is
10000000-10111111.

11. You need to configure a server that is on the subnet 192.168.19.24/29. The router has the first
available host address. Which of the following should you assign to the server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
D. 192.168.19.31 255.255.255.248
Answer: Option C
Explanation:
A /29 is 255.255.255.248, which is a block size of 8 in the fourth octet. The subnets are 0, 8, 16, 24, 32, 40,
etc. 192.168.19.24 is the 24 subnet, and since 32 is the next subnet, the broadcast address for the 24 subnet
is 31. 192.168.19.26 is the only correct answer.

12. You have an interface on a router with the IP address of 192.168.192.10/29. What is the broadcast
address the hosts will use on this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
Answer: Option A
Explanation:
A /29 (255.255.255.248) has a block size of 8 in the fourth octet. This means the subnets are 0, 8, 16, 24,
etc. 10 is in the 8 subnet. The next subnet is 16, so 15 is the broadcast address
  13. You have a network with a subnet of 172.16.17.0/22. Which is the valid host address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
D. 172.16.18.255 255.255.252.0
Answer: Option D
Explanation:
A Class B network ID with a /22 mask is 255.255.252.0, with a block size of 4 in the third octet. The network
address in the question is in subnet 172.16.16.0 with a broadcast address of 172.16.19.255. Only option E
even has the correct subnet mask listed, and 172.16.18.255 is a valid host.

14. On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the
waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
Answer: Option D
Explanation:
A point-to-point link uses only two hosts. A /30, or 255.255.255.252, mask provides two hosts per subnet.

15. To test the IP stack on your local host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
127.0.0.255
D.

If a host on a network has the address 172.16.45.14/30, what is the subnetwork this host belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
Answer: Option D
Explanation:
A /30, regardless of the class of address, has a 252 in the fourth octet. This means we have a block size of 4
and our subnets are 0, 4, 8, 12, 16, etc. Address 14 is obviously in the 12 subnet

17.  Using the following illustration, what would be the IP address of E0 if you were using the
eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP
address in the range. The zero subnet should not be considered valid for this question. 

A. 192.168.10.142

B. 192.168.10.66

C. 192.168.100.254

D. 192.168.10.143

E. 192.168.10.126
Answer: Option A
Explanation:
A /28 is a 255.255.255.240 mask. Let's count to the ninth subnet (we need to find the broadcast
address of the eighth subnet, so we need to count to the ninth subnet). Starting at 16 (remember, the
question stated that we will not use subnet zero, so we start at 16, not 0), 16, 32, 48, 64, 80, 96, 112,
128, 144. The eighth subnet is 128 and the next subnet is 144, so our broadcast address of the 128
subnet is 143. This makes the host range 129-142. 142 is the last valid host.

18.  Which configuration command must be in effect to allow the use of 8 subnets if the Class C
subnet mask is 255.255.255.224?
A. Router(config)#ip classless

B. Router(config)#no ip classful

C. Router(config)#ip unnumbered

D. Router(config)#ip subnet-zero
Answer: Option D
Explanation:
A Class C subnet mask of 255.255.255.224 is 3 bits on and 5 bits off (11100000) and provides 8
subnets, each with 30 hosts. However, if the command ip subnet-zero is not used, then only 6
subnets would be available for use.

19.  Using the illustration from the previous question, what would be the IP address of S0 if you
were using the first subnet? The network ID is 192.168.10.0/28 and you need to use the last
available IP address in the range. Again, the zero subnet should not be considered valid for
this question.
A. 192.168.10.24

B. 192.168.10.62

C. 192.168.10.30

D. 192.168.10.127
Answer: Option C
Explanation:
A /28 is a 255.255.255.240 mask. The first subnet is 16 (remember that the question stated not to use
subnet zero) and the next subnet is 32, so our broadcast address is 31. This makes our host range
17-30. 30 is the last valid host.

20.  What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56

B. 200.10.5.32

C. 200.10.5.64

D. 200.10.5.0
Answer: Option C
Explanation:
This is a pretty simple question. A /28 is 255.255.255.240, which means that our block size is 16 in
the fourth octet. 0, 16, 32, 48, 64, 80, etc. The host is in the 64 subnet.

The correct answer for each question is indicated by a  .

In a _______ name space, a name is assigned to an address. A name in this space


1 CORRECT
is a sequence of characters without structure.

A)flat

B)hierarchical

C)organized

D)none of the above


In a _________name space, each name is made of several parts.
2 CORRECT

A)flat

B)hierarchical

C)organized

D)none of the above

To have a hierarchical name space, a ______________ was designed.


3 CORRECT

A)domain space

B)domain name

C)domain name space

D)none of the above

In the DNS, the names are defined in ___________ structure.


4 CORRECT

A)a linear list

B)an inverted-tree

C)a graph

D)none of the above

A full domain name is a sequence of labels separated by ________.


7 CORRECT

A)semicolons
B)dots

C)colons

D)none of the above

If a label is terminated by a null string, it is called a __________.


8 CORRECT

A)PQDN

B)FQDN

C)SQDN

D)none of the above

If a label is not terminated by a null string, it is called a __________.


9 CORRECT

A)PQDN

B)FQDN

C)SQDN

D)none of the above

What are three ways that LAN traffic is transmitted?

 Unicast: Unicasts are the most common type of LAN traffic. A unicast frame is a frame intended for only
one host.
 Broadcast: Broadcast frames are intended for all hosts within a broadcast domain. Stations view broadcast
frames as public service announcements. All stations receive and process broadcast frames.
 Multicast: Multicasts are traffic in which one transmitter tries to reach only a subset, or group, of the entire
segment.

What are the advantages of using full-duplex Ethernet instead of half-duplex?


 Full-duplex provides faster data transfer by being able to send and receive simultaneously and operates without
collisions.

You might also like