Network addressing

Ace your homework & exams now with Quizwiz!

5. What logical truth table is used to isolate the network address from IP address using the subnet mask? a) OR b) AND c) XOR d) XAND

Answer: b Section Reference: ANDing Explanation: The computer uses a logical AND truth table to compare the full IP address of the computer to the subnet mask to determine the network address.

8. How many hosts does a Class C network support? a) 126 b) 254 c) 66,536 d) 16,777,216

Answer: b Section Reference: Classful IP addressing Explanation: In total, 2,097,152 Class C networks support up to 254 hosts.

6. Traditional IP networks were divided into a Class A, Class B, and Class C networks. What do you call this type of addressing? a) classful b) classless c) VLSM d) expanded

Answer: a Section Reference: Classful IP addressing Explanation: Originally, a class system was used to determine what part of an IP address was network ID and what part was host. Five classes were created—Class A through Class E—but the general population was allowed to use only the first three classes. This is what is called classful IP addressing.

13. What is the binary equivalent of 180? a) 1011 0111 b) 1011 0100 c) 1011 1100 d) 1111 1100

Answer: b Section Reference: CIDR Explanation: 128+0+32+16+0+4+0+0=180. Therefore, the binary representation is 10110100.

2. An IPv4 address contains how many bits? a) 24 b) 32 c) 48 d) 128

Answer: b Section Reference: Logical Addressing Explanation: IPv4, the oldest version of the IP protocol now in use, is also the most limited. The logical address used in IPv4 is 32 bits long, broken up into four groups of 8 bits (called octets).

3. What do you call taking an IP address range and breaking it into smaller pieces? a) supernetting b) subnetting c) address division d) fractal addressing

Answer: b Section Reference: Subnetting Explanation: In its most basic form, subnetting is taking a given IP address range and breaking it into smaller pieces so that a given range of IP addresses can be used in more than one network. To do this, an IP address is broken into two main parts: the network portion and the host portion.

10. When your system running Windows 7 is configured to receive a DHCP address, what happens when your system cannot contact a DHCP server? a) You are automatically assigned an IP address of 127.0.0.1. b) You are automatically assigned an IP address between 169.254.0.0 to 169.254.255.255. c) You are automatically assigned an IP address of 223.255.255.0 to 223.255.255.255.0. d) You are automatically assigned an IP address of 224.0.0 to 239.255.255.255.

Answer: b Difficulty: Medium Section Reference: Classful IP Addressing Explanation: Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems that automatically assign itself an IP address when there is no DHCP server available. APIPA serves as a DHCP server failover mechanism and makes it easier to configure and support small local area networks (LANs). APIPA assigns address from the Class B private address block 169.255.0.0 to 169.254.255.255.

12. What is the CIDR notation used for the 255.255.255.0 subnet mask? a) /8 b) /16 c) /24 d) /32

Answer: c Section Reference: CIDR Explanation: When you have a subnet mask of 255.255.255.0, you have 24 masked bits. Therefore, the CIDR notation is /24.

7. What is the default subnet mask for the 198.25.4.129 address? a) 255.0.0.0 b) 255.255.0.0 c) 255.255.255.0 d) 255.255.255.255

Answer: c Section Reference: Classful IP Addressing Explanation: Class C addresses begin with 192 to 223. The default subnet mask for a Class C network is 255.255.255.0.

9. Your system is configured to receive DHCP addresses. It is assigned an address of 169.254.34.7. What type address is this? a) loopback address b) multicast address. c) Microsoft Automatic Private IP Addressing d) Experimental

Answer: c Section Reference: Classful IP Addressing Explanation: The Class B private address block 169.255.0.0 to 169.254.255.255 is used by Microsoft Automatic Private IP Addressing. This address is usually assigned when a DHCP server cannot be reached.

14. What is the binary equivalent of 255.255.0.0? a) 11111111.11111111.11111111.11110000 b) 11111111.11111111.11111111.00000000 c) 11111111.11111111.11110000.00000000 d) 11111111.11111111.00000000.00000000

Answer: d Section Reference: Explanation: The binary equivalent of 255 is 1111 1111. Therefore, the binary equivalent of 255.255.0.0 is 11111111.11111111.00000000.00000000.

4. What is used to determine the network portion of an IP address? a) default gateway b) multicast address c) AND address d) subnet mask

Answer: d Section Reference: ANDing Explanation: The subnet mask is a series of 1s and 0s that the computer uses to determine which part of the IP address is the network ID verses which part is the host. The subnet mask is all 1s followed by all 0s.

11. Which of the following is not a private IP address range? a) 10.0.0.0 to 10.255.255.255 b) 172.16.0.0 172.31.255.255 c) 192.168.0.0 to 192.168.255.255 d) 128.0.0.0 to 128.255.255.255

Answer: d Section Reference: Classful IP Addressing Explanation: Private, non-routable addresses are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.

1. What 48-bit-long physical address is used to identify a network device? a) IPv4 address b) IPv6 address c) Subnet mask d) MAC address

Answer: d Section Reference: Physical Addressing Explanation: A manufacturer gives every network device that it makes a physical binary address. In many cases, this address is binding on the device and cannot be changed. This address is also known as the device's MAC address.

15. An IPv6 address contains how many bits? a) 24 b) 32 c) 48 d) 128

Answer: d Section Reference: Logical Addressing Explanation: IPv6 (Internet Protocol version 6) is an updated version of IP. IPv6 uses 128 bits for its addresses and is usually expressed in hexadecimal format.


Related study sets

Prescott's Microbiology Chapter 1

View Set

Electronics Components Bucket Day Questions

View Set

PROP 8. Statement-Level Control Structures

View Set

ITSP 136 A+ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram Chapters 13-16

View Set

Class 11: Insider Trading - Part 1 Classical Theory & Misappropriation Theory

View Set

MGMT Of Human Resources Chapter 10: Building Positive Employee Relations

View Set