- 1. The subnet mask for 172.16.20.35/27 is:
A) 255.255.255.224 B) 224.0.255.255 C) 255.255.0.224 D) 255.255.224.255
- 2. To expand a network, new subnets are created by borrowing ________ bits.
A) server B) domain C) user D) host
- 3. The formula to calculate the number of subnets is: 2 to the power of X, where X is the number of ________ ________.
A) bits given B) super domains C) bits borrowed D) super hosts
- 4. The formula to calculate the number of hosts is: (2 to the power of X) -2, where X is the number of bits _______ ___ _________.
A) left for the network B) left for the domain C) left for hosts D) left for the server
- 5. The first step in subnetting is to determine the needed number of:
A) addresses B) networks C) domains D) users
- 6. Subnets (L 6.5.3) also can be subnetted using VLSM or Variable Length Subnet ___________.
A) match B) mark C) map D) mask
- 7. Standard subnetting, or subnetting based on the number of networks, oftentimes results in the wastes of unused host ______________.
A) gateways B) servers C) routers D) addresses
- 8. In the field, to prevent wasting addressing, subnetting is usually done not by networks but by ______________.
A) hosts B) routers C) servers D) gateways
- 9. If the range of a network is 10.0.0.1 to 10.0.0.63, the network ID is most likely:
A) 10.0.0.64 B) 10.0.0.0 C) 10.0.0.255 D) 10.0.0.1
- 10. If the range of a network is 10.0.0.1 to 10.0.0.63, the broadcast address is most likely:
A) 10.0.0.1 B) 10.0.0.255 C) 10.0.0.0 D) 10.0.0.64
- 11. The ANDing process is used to verify the ___________ address of a host.
A) gateway B) network C) router D) domain
- 12. The Ping utility is for testing IP connectivity between ___________.
A) routers B) servers C) users D) hosts
- 13. The Layer 3 protocol used by the PING utility to send out requests for responses is:
A) IMAP B) ISMTP C) IPOP D) ICMP
- 14. Using the PING utility with the local loopback address, 127.0.0.1, helps us determine if _________ is properly installed on the host.
A) ICMP B) Appletalk C) POP3 D) TCP/IP
- 15. The Traceroute utility is executed on a host by using the _________ command.
A) tracker B) tracert C) ipconfig /tracert D) ipconfig /traceroute
- 16. The traceroute utility allows us to observe the path taken by a packet between two ________.
A) users B) hosts C) servers D) domains
- 17. The TTL field of the traceroute utility limits the number of ________ that a packet can cross.
A) hops B) servers C) gateways D) switches
- 18. Servers, network printers, and routers are always recommended to have _____________ IP addresses.
A) static B) dynamic C) domain D) server
- 19. The main reason IPv6 was implemented was for:
A) expanded addressing B) cheaper prices C) larger servers D) faster networks
- 20. An ICMP packet is sent with a TTL of 2, but the router is over 2 hops away, the packet will most likely be dropped and the host will receive a _______ ____________ message.
A) need more hops B) time for extra request C) time exceeded D) need more time
- 21. An IPv4 address is made up of _____ bits.
A) 32 B) 128 C) 4 D) 16
- 22. If NAT is active on a router, the private addresses within that LAN will be ____________ from public internet.
A) routed B) blocked C) broadcasted D) forwarded
|