Question: QUESTION 1 Ping uses ICMP True False 2 points QUESTION 2 IP uses ICMP for error correction. True False 2 points QUESTION 3 Private networks
QUESTION 1
Ping uses ICMP
True
False
2 points
QUESTION 2
IP uses ICMP for error correction.
True
False
2 points
QUESTION 3
Private networks such as 192.158.0.0/16 do not route over the Internet.
True
False
2 points
QUESTION 4
A Class C network is defined as few networks, each with many hosts.
True
False
2 points
QUESTION 5
CIDR block has an IP address and a network mask
True
False
2 points
QUESTION 6
The counterpart of fragmentation is reassembly.
True
False
2 points
QUESTION 7
If dynamic or alternate routing is used the potential exists for a datagram to loop indefinitely through the internet.
True
False
2 points
QUESTION 8
The more fragments flag is set only when the packet is a fragment and when the packet is not the last fragment of a fragmented packet.
True
False
2 points
QUESTION 9
We discard a packet when it's TTL reaches 255.
True
False
2 points
QUESTION 10
Subnetting divides networks into subnetworks and supernetting bundles networks into a larger network.
True
False
2 points
QUESTION 11
For virtually all protocols data are transferred in blocks called ________.
|
| PDUs | |
|
| segments | |
|
| NSAPs | |
|
| datagrams |
5 points
QUESTION 12
The effect of the ________ is to erase the portion of the host field that refers to an actual host on a subnet, leaving the network number and the subnet number.
|
| echo reply | |
|
| checksum | |
|
| subnet mask | |
|
| address mask |
5 points
QUESTION 13
A device attached to one of the networks of an internet that is used to support end user applications or services is ________.
|
| an end system | |
|
| a router | |
|
| a subnet | |
|
| an intermediate system |
5 points
QUESTION 14
The principal feature of ________ is that it can encrypt and/or authenticate all traffic at the IP level.
|
| TCP/UDP | |
|
| IAB | |
|
| VPN | |
|
| IPSec |
5 points
QUESTION 15
In IPv6 ________ may only be performed by source nodes, not by routers, along a packet's delivery path.
|
| bridging | |
|
| reassembly | |
|
| fragmentation | |
|
| ordered delivery |
5 points
QUESTION 16
You are given IP address 192.168.53.196 and subnet mask 255.255.192.0, what is the netid?
|
| 192.168.53.0 | |
|
| 192.168.21.0 | |
|
| 192.168.5.0 | |
|
| 192.168.0.0 |
11 points
QUESTION 17
You are given IP address 200.200.200.234 and netmask 255.255.255.15, what is the netid?
|
| 200.200.200.2 | |
|
| 200.200.0.0 | |
|
| 200.200.200.10 | |
|
| 200.200.200.0 |
11 points
QUESTION 18
You were given IP address 10.0.0.0/8 and told to use 9 bits to subnet the network, how many subnetworks can you create using 9 bits?
11 points
QUESTION 19
You are given IP address 192.234.90.89 and subnet mask 255.0.0.0, what is the netid?
|
| 192.234.90.0 | |
|
| 192.10.0.0 | |
|
| 192.234.0.0 | |
|
| 192.0.0.0 |
11 points
QUESTION 20
You were given IP address 192.168.0.0/16 and told to use 4 bits to subnet the network, how many hosts can you have in such a network?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
