CCNA IP Addressing


Published on

Published in: Technology, Education
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

CCNA IP Addressing

  1. 1. Chapter 4True/FalseIndicate whether the statement is true or false.____ 1. An IP address has 32 bits divided into four octets (four sets of eight binary digits).____ 2. TCP/IP networks cannot use MAC addresses in communication.____ 3. TCP/IP hosts use the combination of the IP address and the subnet mask to determine if other addresses are local or remote.____ 4. The allocation of network numbers based on CIDR has let to the depletion of IP addresses.____ 5. Basic routing protocols such as RIP version 1 and IGRP support VLSM.Multiple ChoiceIdentify the choice that best completes the statement or answers the question.____ 6. A(n) ____ address identifies both a network and a host, so you can route communications through large networks, including the Internet. a. ARP c. IP b. HMAC d. MAC____ 7. It seems that (decimal) is the highest assignable Class A address, but that particular address range is reserved as the ____ address. a. multicast c. broadcast b. loopback d. unicast____ 8. IP Class ____ addresses (also known as multicast addresses) are reserved for multicasting. a. A c. C b. B d. D____ 9. To determine how many digits are used for the network identifier, you must look at the ____, which is a required component for all IP hosts. a. subnet mask c. network mask b. MAC mask d. TCP/IP mask____ 10. ____ broadcasts are for a specific subnet. a. Flooded c. Half-duplex b. Directed d. Full-duplex____ 11. When the host portion of an IP address is all binary zeros, that address is the ____ identifier. a. subnetwork c. class b. broadcast d. multicast____ 12. When the host portion of an IP address is all binary ones, that address is a ____ address. a. multicast c. subnetwork b. class d. broadcast____ 13. ____ is based on assigning IP addresses on criteria other than octet boundaries.
  2. 2. a. ARIN c. CIDR b. IANNA d. VLSR____ 14. The CIDR addressing method allows the use of a ____ to designate the number of network bits in the mask. a. prefix c. route mask b. suffix d. mask table____ 15. ____ tell the computer or router which part of an IP address is the network portion and which part is the host portion. a. CIDR tables c. Subnet masks b. Summarization tables d. Router masks____ 16. In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets. a. classful c. class-based b. class-dependant d. classless____ 17. The decimal number 192 expressed in binary is ____. a. 10000101 c. 11010010 b. 11000000 d. 11100100____ 18. The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number. a. binary c. hexadecimal b. decimal d. vigesimal____ 19. Although the base ____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC and IPv6 addresses. a. 2 c. 20 b. 16 d. 21____ 20. ____ is the version of IP currently deployed on most systems today. a. IPX c. IPv6 b. IP2 d. IPv4____ 21. ____ was originally designed to address the eventual depletion of IPv4 addresses. a. IPv6 c. IP2 b. IPX d. IPNext____ 22. ____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all sizes. a. IPSec c. ARP b. NAT d. CIDR____ 23. ____ is the most important layer 3 security protocol. a. IPSec c. DNS b. ARP d. NAT____ 24. IPv4 networks rely on ____, which is inefficient because many hosts unnecessarily see and partially process traffic not ultimately destined for them. a. multicasting c. unicasting b. anycasting d. broadcasting____ 25. The ____ transition method involves enabling IPv6 on all routers, switches, and end nodes but not disabling IPv4—so both version 4 and version 6 stacks run at the same time.
  3. 3. a. scheduling c. dual stack b. tunneling d. natting____ 26. ____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets. a. Tunneling c. Natting b. Scheduling d. Dual stackCompletionComplete each statement. 27. The ____________________ devised the hierarchical IP addressing structure. 28. ____________________ is the sending of a stream of data (usually audio and video) to multiple computers simultaneously. 29. ____________________ broadcasts are broadcasts for any subnet and use the IP address 30. The purpose of ____________________ is to allow many IP subnets to be advertised as one. 31. ____________________ solves the design problem of basic subnetting by allowing different masks on the subnets.Matching Match each item with a statement below: a. ARIN f. RIP version 1 b. ICANN g. OSPF c. Subnet mask h. Nibble d. CIDR i. IPv6 e. Summarization____ 32. a classless routing protocol____ 33. the next generation of IP____ 34. indicates how much of the IP address represents the network or subnet____ 35. also known as route aggregation____ 36. a global, government-independent entity with overall responsibility for the Internet____ 37. four bits, which is half of a byte____ 38. manages IP addresses in the United States____ 39. developed to slow the exhaustion of IP addresses____ 40. a classful routing protocolShort Answer 41. Briefly describe the Class A IP addresses.
  4. 4. 42. Briefly describe Class B IP addresses.43. Briefly describe Class C IP addresses.44. Describe private IP ranges.45. What are the standard (default) subnet masks?46. Describe the IP broadcast address.47. What are some reasons to incorporate subnetting into an organization’s network?48. What are the subnetting formulas?49. Briefly describe the hexadecimal numbering system.50. Describe the tunneling transition to IPv6 method.