Network + Prep Quiz - IP Routing/Addressing

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Spaz072184
S
Spaz072184
Community Contributor
Quizzes Created: 1 | Total Attempts: 639
| Attempts: 639 | Questions: 70
Please wait...
Question 1 / 70
0 %
0/100
Score 0/100
1.  Which of the following IPv4 addresses is the loopback address?

Explanation

By convention, 127.0.0.1 is the loopback address in IP. Packets sent to this address do not actually travel onto the network, they automatically get routed to a receive queue on the local device. The loopback address is useful for testing network software when a working network connection is not present.

Submit
Please wait...
About This Quiz
Network Plus Quizzes & Trivia

This Network + Prep Quiz focuses on IP Routing and Addressing, assessing knowledge on the creators of IP, IPv4 and IPv6 address sizes, the OSI layer for IP, and related protocols. It's designed for learners preparing for network certifications, enhancing understanding of fundamental networking concepts.

Personalize your quiz and earn a certificate with your name on it!
2. The default network mask for Class C IP addresses is -

Explanation

The default network mask for Class A networks is 255.0.0.0, for Class B networks 255.255.0.0, for Class C networks 255.255.255.0

Submit
3. What are the smallest and largest possible values for an IP octet?

Explanation

Each octet of an IP address ranges in value from 0 to 255. Although not all octets are byte-long quantities, IP octets are always 8 bits in length, and each bit can be set to either 0 or 1.

Submit
4. What is the size of the next-generation (IPv6) IP address?

Explanation

An IPv6 address contains 16 bytes (128 bits). IPv6 addresses are written in a hexadecimal format. The eight, two-byte segments of the address are separated by colons (:). For example - E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420

Submit
5. Which of these shell commands supplies the IP address of a computer running the Windows operating system?

Explanation

The ipconfig command displays the IP address, network mask, and gateway address for each adapter. It can also be used to release and renew address settings, such as those made through DHCP.

Submit
6. Each of the four numeric fields of an IP address written in dotted-decimal notation is also known as -

Explanation

Each of the four bytes of an IP address is also known as an octet.

Submit
7. What is the size of today's standard (IPv4) IP address?

Explanation

An IPv4 address contains 4 bytes (32 bits). IP addresses are usually written in dotted-decimal notation where a period (.) separates each byte (for example, 10.0.0.255). With 32 bits, a total of 4,294,967,296 IPv4 addresses are possible.

Submit
8. What Open Systems Interconnection (OSI) layer does IP belong to?

Explanation

IP belongs to the network layer of the OSI model.

Submit
9. Which utility program is designed to report whether a networked computer is responding at a given IP address, and how long these responses take?

Explanation

The ping utility sends network packets using a special protocol to determine the responsiveness of remote addresses.

Submit
10. A traditional Class C network can handle a maximum of how many hosts?

Explanation

Using the default network mask 255.255.255.0, eight bits remain for host addressing. A total of 256 possible addresses can fit within the lower eight bits. However, traditional IP prohibits a host being assigned the all-zeros (.0) and all-ones (.255) host address, so network administrators configure no more than 254 hosts on a typical Class C network.

Submit
11. Which of the following higher-level protocols runs over IP?

Explanation

File Transfer (FTP), Hypertext Transfer Protocol (HTTP), Simple Mail Transport Protocol (SMTP), and many other popular protocols run at higher levels of the OSI model, utilizing IP as their foundation.

Submit
12. What mechanism does ARP use to resolve IP addresses?

Explanation

The ARP cache of IP address to MAC address mappings functions as a lookup table.

Submit
13. Which of the following IP address ranges are considered part of the Class B network?

Explanation

In a Class B network, the first three bits of the first octet are set to '110'. Therefore, the Class B range includes 128.0.0.0 through 191.255.255.255.

Submit
14. As the Nerwork administrator, you decide to blcok port 80. Which of the following services will be unavailable for network users?

Explanation

If the network administrator decides to block port 80, the service that will be unavailable for network users is HTTP. Port 80 is specifically used for HTTP (Hypertext Transfer Protocol) which is the protocol used for transmitting web pages and other web content. Blocking this port means that users will not be able to access websites or any web-based services that rely on HTTP for communication.

Submit
15. Which of the following IP address ranges are considered part of the Class C network?

Explanation

The Class C network range includes 192.0.0.0 through 223.255.255.255. This is the range of addresses most commonly used on the Internet today.

Submit
16. CIDR stands for -

Explanation

CIDR stands for Classless Inter-Domain Routing. CIDR was developed in the 1990s as a standard scheme for routing IP addresses.

Submit
17. You ask your ISP to assign a public IP address for the External interface of your Windows 2000 server, which is running a proxy server application. In the emal message you get that contains the information, the ISP tells you that you have been assigned the IP 203.15.226.12/24. When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use?

Explanation

The correct subnet mask to use in this scenario is 255.255.255.0. This is because the IP address 203.15.226.12/24 indicates that the first 24 bits of the IP address are the network portion, and the remaining 8 bits are the host portion. A subnet mask of 255.255.255.0 represents 24 bits set to 1, indicating that the first 24 bits are the network portion and the last 8 bits are available for host addresses.

Submit
18. What is the difference between static and dynamic routing?

Explanation

Dynamic routing protocols, like RIP, EIGRP and OSPF automatically add route updates
to the routing table. Static routes must be added by hand.

Submit
19. Which of these shell commands supplies the IP address of a computer running the Linux operating system?

Explanation

The ifconfig command can be used to display and change IP settings for all network adapters on a Linux system.

Submit
20. You have been tasked with temporarily disabling telnet access for external users. What is the best way to accomplish this?

Explanation

Blocking port 23 on the corporate firewall is the best way to temporarily disable telnet access for external users. Telnet typically uses port 23 for communication, so by blocking this port, external users will not be able to establish telnet connections to the network. This effectively prevents external access to telnet services without completely uninstalling the telnet service or affecting other network services.

Submit
21. Which of the following describes routing convergence?

Explanation

Convergence time happens in many protocols, for many devices, by routing convergence
is the time for all routers to update their routing tables (forwarding tables).

Submit
22. Which of the following IP address ranges are reserved for use on private networks?

Explanation

10.0.0.0 - 10.255.255.255 is the private network range within Class A, 172.16.0.0 - 172.31.255.255 in Class B, and 192.168.0.0 - 192.168.255.255 in Class C.

Submit
23. Which of the following best describes the function of the default gateway?

Explanation

The default gateway is responsible for routing network traffic between different networks. It acts as an intermediary device that connects the local network to other networks, such as the internet. When a device on the local network wants to communicate with a destination outside of its own network, it sends the traffic to the default gateway. The default gateway then determines the appropriate route for the traffic to reach its destination outside the local network. Therefore, the statement "It provides the route for destinations outside the local network" best describes the function of the default gateway.

Submit
24. Which of the following is a Class B address?

Explanation

The given IP address 129.16.12.200 is a Class B address. In Class B, the first two octets represent the network portion of the address, while the remaining two octets represent the host portion. In this case, the first octet is 129, which falls within the range of 128 to 191, indicating a Class B address. Therefore, the given IP address is a Class B address.

Submit
25. Why would you want to use a dynamic routing protocol instead of using static routes?

Explanation

Dynamic routing is typically used in today’s networks because it scales to larger networks
and takes less administrative work.

Submit
26. Which routing protocol has a maximum hop count of 15?

Explanation

The distance-vector protocols RIPv1 and RIPv2 both have a maximum hop count of
15 (remember, 16 is unreachable). IGRP and EIGRP have a hop count of 255, and OSPF
doesn’t have a maximum hop count.

Submit
27. The Class D network range is reserved on the Internet for?

Explanation

The Class D address range, from 224.0.0.0 through 239.255.255.255, is reserved on the Internet for multicast. Multicast is the ability to define an arbitrary group of IP nodes and address messages just to that collective rather than broadcast to all nodes on the network or send point-to-point to each node individually.
The Class E address range, from 240.0.0.0 through 255.255.255.255 is reserved on the Internet and not to be used for any purpose.

Submit
28. Which of the following are considered distance-vector routing protocols? (Choose two.)

Explanation

RIP and RIPv2 are distance-vector routing protocols. OSPF and IS-IS are link state.

Submit
29. Which central authority is responsible for allocating IP addresses on the Internet?

Explanation

The Internet Assigned Numbers Authority (IANA) centrally coordinates the use of IPv4 address space on the Internet.

Submit
30. Which of the following uses only hop count as a metric to find the best path to a remote network?

Explanation

RIP and RIPv2 uses only hop count as a metric, with a maximum of 15 hops, to find the
best path to a remote network.

Submit
31. What function does Address Resolution Protocol (ARP) perform?

Explanation

Address Resolution Protocol (ARP) converts IP addresses to Media Access Control (MAC) addresses. ARP is usually implemented in the operating system network device driver.

Submit
32. RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so   more efficiently.  What type of transmission does RIPv2 use to accomplish this task?

Explanation

RIPv1 sends broadcasts every 30 seconds and has an AD of 120. RIPv2 sends multicasts
(224.0.0.9) every 30 seconds and also has an AD of 120. RIPv2 sends subnet-mask information
with the route updates, which allows it to support classless networks and discontiguous
networks. RIPv2 also supports authentication between routers; RIPv1 does not.

Submit
33. You decide to move your network from NetBEUI to TCP/IP. For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the internal network, you choose to configure systems by using one of the private address ranges. Of the following address ranges, which one would you not consider?

Explanation

The address range 131.16.0.0 to 131.16.255.255 would not be considered for the internal network because it is not one of the private address ranges specified by the Internet Assigned Numbers Authority (IANA). The private address ranges are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. These address ranges are reserved for private networks and are not routable on the internet. Using the 131.16.0.0 range internally could result in conflicts or connectivity issues with external networks.

Submit
34. Who invented IP and some related Internet protocols?

Explanation

In a research paper published in 1974, Vinton Cerf and Robert Kahn proposed a protocol they called "TCP". Cerf and Kahn didn't realize it at the time, but the protocol they invented would later become IP, the official network-layer protocol of the Internet.

Submit
35. Which of the following IP addresses is not from a private address range?

Explanation

The IP address 127.45.112.16 is not from a private address range because it falls within the range of public IP addresses. Private IP addresses are reserved for use within private networks and are not routable over the internet. The address 127.45.112.16 is a valid public IP address that can be used to communicate over the internet.

Submit
36. Can IP run over any other physical networks besides Ethernet?

Explanation

IP runs over Ethernet and several other hardware interfaces including ATM.

Submit
37. Which of the following are considered link-state routing protocols? (Choose two.)

Explanation

RIP and RIPv2 are distance-vector routing protocols. OSPF and IS-IS are link state.

Submit
38. Which of the following IPv6 addresses is the loopback address?

Explanation

The IPv6 address 0:0:0:0:0:0:0:1, written in shorthand notation as 0::1, is the loopback address in IPv6, equivalent to 127.0.0.1 in the IPv4 scheme.

Submit
39. The maximum size of an IP datagram (including the header) is -

Explanation

The datagram length field in an IP header is 16 bits in length. Therefore, the maximum datagram size an IP datagram can support is 2^16 - 1 = 65,535 bytes

Submit
40. In IPv6, the anycast feature allows -

Explanation

Anycast is a feature of Internet Protocol new in IPv6. Anycast allows senders to direct messages to a node group with the expectation that any single arbitrary node in the group can receive and act on the message. Anycast is similar to load balancing and other redundancy concepts implemented elsewhere in communications architectures. Anycast can be used to implement broadcasts, but anycast is a more generalized concept

Submit
41. What is the IPv6 equivalent of 127.0.0.1? (Choose two)

Explanation

The IPv6 equivalent of 127.0.0.1 is 0:0:0:0:0:0:0:1 and ::01. IPv6 addresses are represented as eight groups of four hexadecimal digits separated by colons. In this case, both 0:0:0:0:0:0:0:1 and ::01 represent the loopback address in IPv6, which is equivalent to 127.0.0.1 in IPv4.

Submit
42. Computers configured with more than one IP address are often called

Explanation

A multi-homed device contains multiple network adapters. Multi-homed computers are often used as proxy servers, firewalls, and other types of gateways. A proxy server often has one adapter with an external Web address (assigned by an ISP) and another adapter to use a private intranet address (such as 192.168.0.1).
Some Web servers like Apache support a feature called virtual hosting. Virtual hosting allows a computer to act as if it possesses multiple IP addresses. Virtual hosting is not the same as multi-homing, that refers to multiple network interfaces of a device.

Submit
43. What routing protocol is typically used to connect AS’s on the Internet?

Explanation

BGP is the routing protocol used to connect autonomous systems together on the Internet
for its ability to make classless routing and summarization possible. These capabilities help
to keep routing tables smaller and more efficient at the ISP core.

Submit
44. What is the administrative distance of OSPF?

Explanation

The administrative distance (AD) is a very important parameter in a routing protocol.
The lower the AD, the more trusted the route. If you have IGRP and OSPF running, by
default IGRP routes would be placed in the routing table because IGRP has a lower AD of
100. OSPF has an AD of 110. RIPv1 and RIPv2 both have an AD of 120, and EIGRP is the
lowest, at 90.

Submit
45. Which routing protocols have an administrative distance of 120? (Choose two.)

Explanation

Both RIPv1 and RIPv2 have an AD of 120. EIGRP has an AD of 90.

Submit
46. The destination IP address for an IPv4 datagram is stored where in the header?

Explanation

The length of an IP datagram header is technically measured in longwords. The header length field is 4 bits long and, along with the protocol version number, makes up the first byte of an IP header. In a normal 20-byte long IP header, the header length field therefore normally contains the value '5' (0x1001).

Submit
47. The datagram length field in an IPv4 datagram contains which numeric value?

Explanation

The length of an IP datagram itself is technically measured in bytes. The length field represents the size of both the header and the data portions of the datagram

Submit
48. In DNS, requests to obtain the IP address of a given host name are issued by -

Explanation

DNS resolvers issue host name/address conversion requests. Resolvers effectively work like clients, issuing requests to and within the hierarchy of DNS servers.

Submit
49. In CIDR notation, which of the following Class C networks contains host 192.168.14.2?

Explanation

CIDR notation uses the format xxx.xxx.xxx.xxx/n, where 'n' is the number of '1' bits in the network mask. This means the network 192.168.11.0/21 actually contains all addresses in the range 192.168.8.0 - 192.168.15.255. Conversely,
• the network 192.168.10.0/22 only contains addresses in the range 192.168.8.0 - 192.168.11.255
• the network 192.168.12.0/23 only contains addresses in the range 192.168.12.0 - 192.168.13.255, and
• the network 192.168.13.0/24 only contains addresses in the range 192.168.13.0 - 192.168.13.255.

Submit
50. Which of the following is considered a hybrid routing protocol?

Explanation

RIP and RIPv2 are distance-vector routing protocols. OSPF and IS-IS are link state.
EIGRP uses qualities from both distance vector and link state to create a hybrid routing
protocol.

Submit
51. Which of the following protocols will advertise routed IPv6 networks?

Explanation

The routing protocols that have been upgraded to advertise IPv6 routes are RIPng, OSPFv3,
and EIGRPv6. IS-IS can advertise IPv6 routes as well, but no upgrade was needed for IS-IS.

Submit
52. The source IP address for an IPv4 datagram is stored where in the header?

Explanation

The full 32-bit IP address for a datagram's source device is always stored in the 4th longword (bytes 13-16) of an IP header. A longword in TCP/IP networking is a 4-byte quantity aligned on a 32-bit boundary.

Submit
53. Which of the following IP address ranges are considered part of the Class A network?

Explanation

Technically, the Class A address range runs from IP address 1.0.0.0 through address 126.255.255.255. By rule, the 0.x.x.x network is reserved, and 127.x.x.x is considered the broadcast network and also unavailable for general-purpose uses.

Submit
54. The IP delivery service is -

Explanation

The IP protocol is routable but connectionless. This means IP provides no support for a sender to establish a connection with a receiver other before communicating. Instead, IP (and UDP) simply transmit packets and assume that the destination application will be listening on the appropriate port to receive them. TCP adds connection semantics on top of IP.

Submit
55. You are the administrator for a network with two Windows Server systems and 65 Windows Vista systems. At 10 a.m., three users call to report that they are experiencing network connectivity problems. Upon investigation, you determine that the DHCP server has failed. How can you tell the DHCP server failure is the cause of the connectivity problems experienced by three users?

Explanation

When the users' systems have an IP address from the 169.254.x.x range, it indicates that the DHCP server has failed. This is because the 169.254.x.x range is reserved for Automatic Private IP Addressing (APIPA), which is used when a DHCP server is not available to assign an IP address. Therefore, the presence of these IP addresses suggests that the DHCP server failure is the cause of the connectivity problems experienced by the three users.

Submit
56. Which of the following routing protocols uses AS-Path as one of the methods to build the routing tables?

Explanation

Border Gateway Protocol (BGP) attributes include the IP address to get to the next AS
(the next-hop attribute) as well as an indication of how the networks at the end of the path
were introduced into BGP (the origin code attribute). The AS path information is useful to
construct a graph of loop-free autonomous systems and is used to identify routing policies
so that restrictions on routing behavior can be enforced based on the AS path.

Submit
57. RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP has to reconverge. Which can you implement to improve convergence time on the network?

 

Explanation

Static routes may be a good solution, but remember they are not dynamic and if a piece
of equipment goes down, new routes to remote networks will not automatically update, so
OSPF is the best answer. It dynamically will update the routing tables with faster convergence
then RIP.

Submit
58. Which IPv6 routing protocol uses UDP port 521?

Explanation

RIPng has many of the same features as RIPv2: It’s a distance-vector protocol; it has a
max hop count of 15; and it uses split horizon, poison reverse, and other loop-avoidance
mechanisms. And it still uses multicast to send its updates too; but in IPv6, it uses FF02::9
for the transport address. For RIPv2, the multicast address was 224.0.0.9, so the address
still has a 9 at the end in the new IPv6 multicast range.

Submit
59. Which of the following address types are associated with IPv6? (Choose three)

Explanation

A key difference between IPv4 and IPv6 is in the address types. IPv6 addressing has three main types of addresses: unicast,multicast, and anycast. IPv4 uses broadcast addressing, but IPv6 doesn't.

Submit
60. The length of an IP datagram header can vary depending on the options used. What is the smallest possible IP header size?

Explanation

An IP header is usually 20 bytes in length, and this is its minimum size. The size of the header can vary, however, if a special options flag is used to send additional information such as a time stamp. An IP header can be as large as 60 bytes.

Submit
61. How does CIDR benefit the Internet?

Explanation

CIDR frees up additional IP address space on the Internet by allowing supernetting. Subnetting with CIDR allows, for example, networks larger than Class C (256 nodes) but smaller than Class B (65,536 nodes) to be allocated. Increased granularity minimizes waste. CIDR was not a part of the original Internet Protocol but was added during the 1990s. To make CIDR work, modifications to several popular routing protocols were required. CIDR has nothing to do with Network Address Translation (NAT), another technology that saves public IP address space by managing a mapping of multiple private IP addresses to one public one.

Submit
62. The IP checksum feature supports integrity checking for -

Explanation

By itself, IP only supports checksums on the header. TCP adds its own, separate checksum to packets in addition to the IP checksum.

Submit
63. Which is true regarding EIGRP successor routes?

Explanation

A successor route is used by EIGRP to forward traffic to a destination and is stored in
the routing table. It is backed up by a feasible successor route that is stored in the topology
table—if one is available. Remember that all routes are in the topology table.

Submit
64. In CIDR notation, which of the following Class B networks contains host 172.18.1.1?

Explanation

Using CIDR notation, the network 172.22.0.0/13 actually contains all addresses in the range 172.16.0.0 - 172.23.255.255. Conversely,
• the network 172.11.0.0/12 only contains addresses in the range 172.0.0.0 - 172.15.255.255
• the network 172.15.0.0/12 also only contains addresses in the range 172.0.0.0 - 172.15.255.255, and
• the network 172.26.0.0/13 only contains addresses in the range 172.24.0.0 - 172.31.255.255.

Submit
65. Which Request For Comments (RFC) documentation describes the Internet Protocol?

Explanation

The first RFC for Internet Protocol, RFC 760, was published in January 1980. RFC 791, published in September 1981, superceded the original document.

Submit
66. In CIDR notation, which of the following Class A networks contains host 10.1.7.129?

Explanation

Using CIDR notation, the network 10.1.4.0/22 actually contains all addresses in the range 10.1.4.0 - 10.1.7.255. Conversely,
• the network 10.1.6.0/24 only contains addresses in the range 10.1.6.0 - 10.1.6.255
• the network 10.1.5.0/23 only contains addresses in the range 10.1.4.0 - 10.1.5.255, and
• the network 10.1.8.0/21 only contains addresses in the range 10.1.8.0 - 10.1.15.255.

Submit
67. Which of the following is a vendor-specific routing protocol?

Explanation

EIGRP is called a hybrid routing protocol because it uses the characteristics of both
distance-vector and link-state routing protocols. However, EIGRP can be run only on
Cisco routers and is not vendor neutral.

Submit
68. Which of the following technologies manage the conversion between IP addresses and host names?

Explanation

Domain Name System (DNS), Windows Internet Naming Service (WINS), and Network Information System (NIS) each support a form of name-adddress mapping on computer networks. WINS was designed for Microsoft Windows networks and NIS was designed for Unix networks. DNS supports overall name resolution and mapping on the Internet.

Submit
69. What EIGRP information is held in RAM and maintained through the usage of hello and update packets? (Select all that apply.)

Explanation

EIGRP holds three tables in RAM: neighbor, topology, and routing. The neighbor
and topology tables are built and also maintained with the use of hello packets.

Submit
70. Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.)

Explanation

RIPv1 and IGRP are true distance-vector routing protocols and can’t do much,
really—except build and maintain routing tables and use a lot of bandwidth! RIPv2, EIGRP,
and OSPF build and maintain routing tables, but they also provide classless routing, which
allows for VLSM, summarization, and discontiguous networking.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 25, 2010
    Quiz Created by
    Spaz072184
Cancel
  • All
    All (70)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
 Which of the following IPv4 addresses is the loopback address?
The default network mask for Class C IP addresses is -
What are the smallest and largest possible values for an IP octet?
What is the size of the next-generation (IPv6) IP address?
Which of these shell commands supplies the IP address of a computer...
Each of the four numeric fields of an IP address written in...
What is the size of today's standard (IPv4) IP address?
What Open Systems Interconnection (OSI) layer does IP belong to?
Which utility program is designed to report whether a networked...
A traditional Class C network can handle a maximum of how many hosts?
Which of the following higher-level protocols runs over IP?
What mechanism does ARP use to resolve IP addresses?
Which of the following IP address ranges are considered part of the...
As the Nerwork administrator, you decide to blcok port 80. Which of...
Which of the following IP address ranges are considered part of the...
CIDR stands for -
You ask your ISP to assign a public IP address for the External...
What is the difference between static and dynamic routing?
Which of these shell commands supplies the IP address of a computer...
You have been tasked with temporarily disabling telnet access for...
Which of the following describes routing convergence?
Which of the following IP address ranges are reserved for use on...
Which of the following best describes the function of the default...
Which of the following is a Class B address?
Why would you want to use a dynamic routing protocol instead of using...
Which routing protocol has a maximum hop count of 15?
The Class D network range is reserved on the Internet for?
Which of the following are considered distance-vector routing...
Which central authority is responsible for allocating IP addresses on...
Which of the following uses only hop count as a metric to find the...
What function does Address Resolution Protocol (ARP) perform?
RIPv2 sends out its routing table every 30 seconds just like RIPv1,...
You decide to move your network from NetBEUI to TCP/IP. For the...
Who invented IP and some related Internet protocols?
Which of the following IP addresses is not from a private address...
Can IP run over any other physical networks besides Ethernet?
Which of the following are considered link-state routing protocols?...
Which of the following IPv6 addresses is the loopback address?
The maximum size of an IP datagram (including the header) is -
In IPv6, the anycast feature allows -
What is the IPv6 equivalent of 127.0.0.1? (Choose two)
Computers configured with more than one IP address are often called
What routing protocol is typically used to connect AS’s on the...
What is the administrative distance of OSPF?
Which routing protocols have an administrative distance of 120?...
The destination IP address for an IPv4 datagram is stored where in the...
The datagram length field in an IPv4 datagram contains which numeric...
In DNS, requests to obtain the IP address of a given host name are...
In CIDR notation, which of the following Class C networks contains...
Which of the following is considered a hybrid routing protocol?
Which of the following protocols will advertise routed IPv6 networks?
The source IP address for an IPv4 datagram is stored where in the...
Which of the following IP address ranges are considered part of the...
The IP delivery service is -
You are the administrator for a network with two Windows Server...
Which of the following routing protocols uses AS-Path as one of the...
RIP has a long convergence time and users have been complaining of...
Which IPv6 routing protocol uses UDP port 521?
Which of the following address types are associated with IPv6? (Choose...
The length of an IP datagram header can vary depending on the options...
How does CIDR benefit the Internet?
The IP checksum feature supports integrity checking for -
Which is true regarding EIGRP successor routes?
In CIDR notation, which of the following Class B networks contains...
Which Request For Comments (RFC) documentation describes the Internet...
In CIDR notation, which of the following Class A networks contains...
Which of the following is a vendor-specific routing protocol?
Which of the following technologies manage the conversion between IP...
What EIGRP information is held in RAM and maintained through the usage...
Which of the following protocols support VLSM, summarization, and...
Alert!

Advertisement