N10-005 Topic 1, Networking Concepts
QUESTION NO: 4 Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues? A. Faulty cable B. Remote management disabled C. Improper VLAN assignment D. Mismatched duplex
Answer: C Explanation: Finance Server is placed insame VLAN which is assigned to finance users if they are able to access internet that's means connectivity to switch is good, so we have to check the VLANassigned to users.
QUESTION NO: 46 A network where all traffic feeds through a centralized gateway uses which of the following topologies? A. Peer-to-peer B. Ring C. Bus D. Star
Answer: D Explanation: A bus topology is a type of network setup where each computer and network device is connected to a single cable or backbone.
QUESTION NO: 27 Companies trying to cut down on constant documentation of IP addresses could use which of the following? A. Longer lease times B. More reservations C. Larger scopes D. Dynamic IP addressing
Answer: D Explanation: In Dynamic IP addressing all the hosts with private ip address will be patted to the same ip so the administrator will not have to keep track of each and every host with private ip mapped to a static public ip address.
QUESTION NO: 34 Which of the following uses port 23 by default? A. TELNET B. IMAP C. FTP D. SNMP
Answer: A Explanation: Telnetis a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).
QUESTION NO: 55 The APIPA address 169.254.10.123 falls into which of the following class of addresses? A. A B. B C. C D. D
Answer: B Explanation: As the range for class B is from 128.0.0.0 to 191.255.255.255
QUESTION NO: 45 Which of the following is a Class A IP address? A. 10.4.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 254.200.0.1
Answer: A Explanation: Class A ip address ranges from 10.0.0.0 to 10.255.255.255
QUESTION NO: 9 A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following? A. Latency B. Attenuation C. Crosstalk D. Frequency hopping
Answer: A Explanation: During the high ping time users are using most of the bandwidth that causes latency so signal strength get affected by this.
QUESTION NO: 30 An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection? A. RDP B. RTP C. RIP D. RAS
Answer: A Explanation: Explanation:Remote Desktop Protocol(RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.
QUESTION NO: 2 The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO). A. Network B. Session C. Transport D. Physical E. Data link
Answer: D,E Explanation: Explanation: The network layer is responsible for packet forwarding includingroutingthrough intermediate routers, whereas thedata link layeris responsible for media access control, flow control and error checking.
QUESTION NO: 17 Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released? A. DHCP lease B. DNS suffix C. Subnet mask D. DHCP reservation
Answer: A Explanation: By default, each IP address assigned by a DHCP Server comes with a one-day lease, which is the amount of time that the address is valid.
QUESTION NO: 44 Which of the following features can BEST be used to facilitate authorized remote access to a network? A. VPN concentrator B. Proxy server C. Content filter D. Load balancer
Answer: A Explanation: Explanation:The VPN Concentrator is used for Remote Access VPN's. In typical use, a Remote Access VPN allows users to use an encrypted tunnel to securely access a corporate or other network via the Internet.
QUESTION NO: 24 Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification? A. ping B. netstat C. route D. arp
Answer: A Explanation: Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. QUESTION NO:
QUESTION NO: 13 Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options
Answer: A Explanation: Reservationsare permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured
QUESTION NO: 29 Which of the following protocols works at the LOWEST layer of the OSI model? A. L2TP B. PPTP C. ISAKMP D. IPSec
Answer: A Explanation: Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet.
QUESTION NO: 25 Which of the following is the FASTEST Ethernet technology? A. 10GBaseSR B. 10BaseT C. 100BaseFX D. 1000BaseT
Answer: A Explanation: 10GBASE-SR ("short range") is a port type for multi-mode fiber and uses 850 nm lasers. Its Physical Coding Sublayer 64b/66b PCS is defined in IEEE 802.3 Clause 49 and its Physical Medium Dependent PMD in Clause 52. It delivers serialized data at a line rate of 10.3125 Gbit/s.
QUESTION NO: 16 A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task? A. Media convertor B. Switch C. Firewall D. Bridge
Answer: B Explanation: They connect multiple PCs, printers, servers and other hardware. Switches allow you to send information, such as email, and access shared resources, including printers, in a smooth, efficient, and transparent manner.
QUESTION NO: 15 A technician wants to separate networks on a switch. Which of the following should be configured to allow this? A. VLAN B. Trunking C. Spanning tree D. Traffic filtering
Answer: A Explanation: A VLAN is a group of end stations in a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment.
QUESTION NO: 21 Which of the following network protocols is used to resolve FQDNs to IP addresses? A. DNS B. FTP C. DHCP D. APIPA
Answer: A Explanation: an Internet service that translatesdomain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain namewww.example.commight translate to 198.105.232.4
QUESTION NO: 53 Which of the following BEST describes the definition of DHCP? A. DHCP is utilized to dynamically lease IP addresses to hosts. B. DHCP is utilized to statically lease IP address to hosts. C. DHCP is utilized to permanently lease IP address dynamically to hosts. D. DHCP is utilized to permanently lease IP address statically to hosts.
Answer: A Explanation: Because DHCP server maintains a database of available IP addresses and configuration information. When the server receives a request from a client, the DHCP server determines the network to which the DHCP client is connected, and then allocates an IP address or prefix that is appropriate for the client, and sends configuration information appropriate for that client
QUESTION NO: 51 Which of the following routing protocols utilizes the DUAL algorithm for determining best path? A. EIGRP B. RIPv2 C. OSPF D. RIP
Answer: A Explanation: Diffusing Update Algorithm guarantees loop-free operation and provides a mechanism for fast convergence.
QUESTION NO: 39 Which of the following TCP ports are used by FTP? (Select TWO). A. 20 B. 21 C. 22 D. 23 E. 25 F. 80
Answer: A,B Explanation: FTP uses two ports by default: 21 for sending commands, and 20 for sending data. For instance if you said "FTP <ServerName>" it would make the attempt using port 21. If the session was established, port 20 would be using for the data. Note: These are the default ports which is what I assume you were asking. A server administrator can however configure FTP to use whatever port he defines.
QUESTION NO: 36 At which of the following layers do frames exist? (Select TWO). A. OSI model Data link layer B. TCP/IP model Network Interface layer C. OSI model Physical layer D. OSI model Network layer E. TCP/IP model Internet layer
Answer: A,B Explanation: The data link layer is concerned with local delivery of frames between devices on the same LAN. Data-link frames, as these protocol data units are called, do not cross the boundaries of a local network. Inter-network routing and global addressing are higher layer functions, allowing data-link protocols to focus on local delivery, addressing, and media arbitration. In this way, the data link layer is analogous to a neighborhood traffic cop; itendeavors to arbitrate between parties contending for access to a medium, without concern for their ultimate destination.
QUESTION NO: 40 Which of the following protocols is MOST commonly used for the transfer of router configuration files? A. SSL B. TFTP C. DNS D. IMAP
Answer: B Explanation: Trivial File Transfer Protocol(TFTP) is a file transfer protocol notable for its simplicity. It is generally used for automated transfer of configuration or boot files between machines in a local environment. Compared to FTP, TFTP is extremely limited, providing no authentication, and is rarely used interactively by a user.
QUESTION NO: 22 Which of the following network protocols is used to transport email between servers? A. IMAP4 B. POP3 C. SNMP D. SMTP
Answer: D Explanation: While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying
QUESTION NO: 49 Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO). A. Switch B. Cable C. Repeater D. Router E. Bridge F. Hub
Answer: A,D Explanation: A Multilayer Switch and Router work from OSI layer 2, 3 or 4 to IP DSCP (if IP packet) and/or VLAN IEEE 802.1p.
QUESTION NO: 28 Which of the following DHCP properties defines the size of the pool of available IP addresses? A. Options B. Scope C. Leases D. Reservations
Answer: B Explanation: A range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service.
QUESTION NO: 41 Which of the following protocols resolves IP addresses to MAC addresses? A. DNS B. ARP C. RARP D. NTP
Answer: B Explanation: ARP is used to convert an IP address to a physical address such as an Ethernet address. ARP has been implemented with many combinations of network and data link layer technologies, such as IPv4,Chaosnet,DECnetand XeroxPARC Universal Packet(PUP) usingIEEE 802standards,FDDI,X.25,Frame RelayandAsynchronous Transfer Mode(ATM). IPv4 overIEEE 802.3andIEEE 802.11is the most common case.
QUESTION NO: 43 Which of the following is the definition of a DNS server? A. Hosts proprietary business applications B. Translates FQDN's to IP addresses C. Provides network IDS/IPS security D. Assigns IP addresses to network devices
Answer: B Explanation: Domain Name System (DNS) is the name resolution protocol for TCP/IP networks, such as the Internet. Client computers query a DNS server to resolve memorable, alphanumeric DNS names to the IP addresses that computers use to communicate with each other.
QUESTION NO: 23 Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected.
Answer: B Explanation: Due to wrong subnet entered user is unable to communicate with anyone so to communicate he needs to be in right subnet.
QUESTION NO: 7 On which of the following OSI model layers would a MAC address be used? A. Network B. Data Link C. Transport D. Physical
Answer: B Explanation: Explanation:The ITU-TG.hnstandard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of aselective repeatSliding Window Protocol.
QUESTION NO: 6 Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet? A. 250 B. 254 C. 255 D. 256
Answer: B Explanation: TheSubnet Maskhowever, determines the "class" of a Network. 255.255.255.0 is a "Class C" network.A class c network can host up to 254 pc's
QUESTION NO: 32 Which of the following commands displays the routing table on a server or workstation? A. nbtstat B. route C. traceroute D. nmap
Answer: B Explanation: Theroute commandallows you to make manual entries into the network routing tables. Theroute commanddistinguishes between routes to hosts ...
QUESTION NO: 19 Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann's workstation is as follows: IP address: 192.168.0.124 Subnet Mask: 255.255.255.128 Default Gateway: 192.168.0.254 Which is MOST likely preventing the user from accessing the Internet? A. Duplicate IP address B. Incorrect gateway C. Incorrect VLAN D. Bad switch port
Answer: B Explanation: We usually give default gateway as an end device which is directly connected with ISP so in this case user has lost his connectivity with due to wrong default gateway configured.
QUESTION NO: 26 Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective? A. Content filtering B. Port filtering C. MAC filtering D. IP filtering
Answer: B Explanation: Explanation:TCP/IPport filteringis the practice of selectively enabling or disabling Transmission Control Protocol (TCP) ports and User Datagram Protocol (UDP) ports on computers or network devices. When used in conjunction with other security practices, such as deploying firewall software at your Internet access point, applying port filters to intranet and Internet servers insulates those servers from many TCP/IP-based security attacks, including internal attacks by malicious users.
QUESTION NO: 5 A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic? A. Duplex settings B. SNMP string C. VLAN assignments D. Spanning tree
Answer: C Explanation: A VLAN is a group of end stations with a common set of requirements, independent of physical location. VLANs have the same attributes as a physical LAN but allow you to group end stations even if they are not located physically on the same LAN segment.
QUESTION NO: 38 Which of the following DNS records is used to identify a domain's SMTP server? A. CNAME B. PTR C. MX D. A
Answer: C Explanation: Amail exchanger record(MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).
QUESTION NO: 47 In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented? A. Scope options B. Leases C. Reservations D. DNS suffixes
Answer: C Explanation: DHCP Reservation is used to assign a fixed IP Address to a device that always requires the same IP Address every time it is in use. This feature can be used for a print server, IP Camera, Network storage device as well as a computer
QUESTION NO: 42 Which of the following port numbers is used for SNMP? A. 61 B. 151 C. 161 D. 1611
Answer: C Explanation: Explanation:Simple Network Management Protocol(SNMP) is an "Internet-standard protocol for managing devices on IP networks". Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, UPSes and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention.
QUESTION NO: 11 A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address? A. VLANs B. PoE C. PAT D. VPN
Answer: C Explanation: Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.
QUESTION NO: 14 Spanning-Tree Protocol is used with which of the following network devices? A. Router B. NIC C. Switch D. DHCP server
Answer: C Explanation: Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. Loops are deadly to a network.
QUESTION NO: 3 In which of the following layers of the OSI model would MAC addressing be found? A. Network B. Application C. Data Link D. Transport
Answer: C Explanation: The ITU-TG.hnstandard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of aselective repeatSliding Window Protocol.
QUESTION NO: 20 Which of the following is the common port used for IMAP? A. 25 B. 53 C. 143 D. 443
Answer: C Explanation: The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server. The current version, IMAP version 4 revision 1 (IMAP4rev1), is defined by RFC 3501. An IMAP server typically listens on well-known port 143
QUESTION NO: 33 At which of the following layers of the OSI model does ASCII work? A. Session B. Transport C. Presentation D. Application
Answer: C Explanation: The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file.
QUESTION NO: 57 Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE? A. Layer 3 B. Layer 5 C. Layer 6 D. Layer 7
Answer: C Explanation: The presentation level is translator between the application and network format. Unlike the lower layers, its concern is with the syntax and semantics of the information transmitted. Most user programs do not exchange random binary bit strings. They exchange data such as names, addresses, dates, etc. Different computers store the data in a different way. In order to allow these computers to transmit the data to each other the presentation layer translates the data into a standard form to be used on the network. Another function is data compression which can be used to reduce the number of bits needed to send the packet of information. Security is also added at this layer by using data encryption and decryption. This prevents others from intercepting the data and being able to decipher the meaning of the bits.
QUESTION NO: 10 Which of the following TCP/IP model layers does the OSI model Presentation layer map to? A. Transport B. Internet C. Application D. Network Interface
Answer: C Explanation: TheApplication layerprovides applications the ability to access the services of the other layers and defines the protocols that applications use to exchange data. There are many Application layer protocols and new protocols are always being developed.
QUESTION NO: 56 A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue? A. The DHCP lease pool was not large enough B. DHCP lease times were set too low C. The router is not the only DHCP server D. DHCP was not enabled on the replacement router
Answer: C Explanation: This happens when there are multiple DHCP servers in the same LAN subnet. Here some machines are getting ip address from the router while some are getting ip address from another DHCP server present in the same domain.
QUESTION NO: 18 Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party? A. Ping B. Protocol analyzer C. Tracert D. Dig
Answer: C Explanation: Tracet command will tell the administrator which route is not present or which is present so he will come to knowwhetherhe has appropriate route or not.
QUESTION NO: 35 Assigning the same IP address to a network device is which of the following? A. SSID B. Scope C. Reservation D. Lease
Answer: C Explanation: You might want to assign network printers and certain servers DHCP reservations to ensure that they always have the same IP address, but continue to receive updated configuration information from the DHCP server. For example, create reservations for servers that mustalways have the same IP address.
QUESTION NO: 31 Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols? A. DNS B. DOS C. DHCP D. DSL
Answer: C Explanation: when we install a dhcp server into our network then dhcp server works on the basis of dora process first dhcp server sends a hello message in to the network to discover the clients pc and when any client pc found in thenetwork then, dhcp server offers the IP to client pc. When client pc selects any IP from dhcp server then client pc request for selected IP to dhcp server then dhcp server provide that IP to client pc and both send ackonledgement to each other.
QUESTION NO: 1 A user's laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured? A. SSID name B. WAP encryption strength C. WAP radio power D. Channel overlay
Answer: C Explanation: WAP radio power is the signal strength through which you can specify the range from which you can stay connected to the network and access internet. Here, when the user is not able to maintain a stable connection then it is a problem with the signal strength for sure so you can try to increase the signal strength by increasing the radio power.
QUESTION NO: 54 Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations? A. The administrator should create exclusions for the workstations IP addresses. B. The administrator should change the servers to utilize DHCP to obtain IP addresses. C. The administrator should change the workstations to utilize static IP addresses. D. The administrator should create exclusions for the servers IP addresses.
Answer: D Explanation: Whenever you define the ip pool from which IP addresses are to be dynamically assigned to the users then in order to avoid assignment of static ip address we can create exclusion for the static ip addresses so that they are not assigned to any other host and this is how we can avoid ip address conflict on the network.
QUESTION NO: 48 Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO). A. 200.200.100.0/28 B. 200.200.100.32/27 C. 200.200.100.63/27 D. 200.200.100.79/27 E. 200.200.100.95/27 F. 200.200.100.254/30
Answer: C,E Explanation: A broadcast address is a logical address at which all devices connected to a multiple-access communications network are enabled to receive datagrams. A message sent to a broadcast address is typically received by all network-attached hosts, rather than by a specific host. Reference:http://www.wikihow.com/Calculate-Network-and-Broadcast-Address
QUESTION NO: 58 Which of the following provides secure access to a network device? A. SNMPv2 B. FTP C. RSH D. SSH
Answer: D Explanation: Secure Shell(SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channelover an insecure network, a server and a client (running SSH server and SSH client programs, respectively).
QUESTION NO: 12 Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber? A. 10GBaseLR B. 100BaseFX C. 100BaseTX D. 1000BaseX
Answer: D Explanation: 1000BaseX identifies various Gigabit Ethernet physical layer standards as defined in IEEE802.3z, such as 1000BaseLX, 1000BaseSX, 1000BaseCX and 1000BaseLH. Basically, all standards included in 1000BaseX uses 8B/10B coding scheme with 8 bits of data and 2 bits of errorcorrection data. Each specification allows various cable (fiber or copper)lengths, and uses different cable media.
QUESTION NO: 8 Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue? A. Faulty GBIC B. Faulty SFP C. Cable is a crossover D. VLAN mismatch
Answer: D Explanation: As user has link light on NIC that means he has connectivity with switch so he need to check his vlan assignment.
QUESTION NO: 37 A user is unable to access any network resources. The IP configuration of the workstation is as follows: IP Address: 192.168.10.32 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.10.46 Which of the following would allow the user to connect to network resources? A. Change the default gateway to 192.168.10.1 B. Change the default gateway to 192.168.10.254 C. Change the IP address to 192.168.10.31 D. Change the IP address to 192.168.10.33
Answer: D Explanation: The given ip address is network id which we don't assign to the host so the next ip is applicable to this.
QUESTION NO: 52 The network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model? (Select TWO). A. Transport layer B. Network layer C. Session layer D. Physical layer E. Presentation layer F. Data link layer
Answer: D,F Explanation: The lowest layer of the OSI Reference Model is the physical layer, which is responsible for the "nitty gritty" details of transmitting information from one place to another on a network. The layer just above the physical layer is the data link layer, called the network interface layer or just the link layer in the TCP/IP architectural model. Its primary job is to implement networks at the local level, and to interface between the hardware-oriented physical layer, and the more abstract, softwareoriented functions of the network layer and those above it.
QUESTION NO: 50 Which of the following is a path vector routing protocol? A. RIP B. EIGRP C. ISIS D. OSPF E. BGP
Answer: E Explanation: Explanation:BecauseBGPinvolves a table of IP networks or "prefixes" which designate network reachability among autonomous systems (AS).