Alcatel-lucent Scalable IP Networks Exam - B

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Temi
T
Temi
Community Contributor
Quizzes Created: 2 | Total Attempts: 3,846
| Attempts: 2,878 | Questions: 35
Please wait...
Question 1 / 35
0 %
0/100
Score 0/100
1. Which of the following is not true about an IP packet?        

Explanation

The current version is IPv4, and the next version is IPv6.

Submit
Please wait...
About This Quiz
Alcatel-lucent Scalable IP Networks Exam - B - Quiz

Preparing for the Network Routing Specialist I (NRS I) Certifications Exam (4A0-100)

2.  An IP address has a first octet represented in binary as 11000001; the equivalent in decimal is ______.        

Explanation

Calculate this as 28 + 27 + 20 = 128 + 64 + 1 = 193.

Submit
3. 1. When a frame with an unknown destination MAC address enters a switch, the switch will forward it out which ports?        

Explanation

This is how switches work until they build up their FDB.

Submit
4. A network with a /30 mask allows you to have how many usable host addresses?        

Explanation

The key here is “usable” host addresses. A /30 leaves 2 bits for hosts, which would
translate into 22 = 4. However, the 0 host is the subnet address and the “all 1s”
host is the broadcast, so those addresses cannot be used. This leaves only two
usable host addresses.

Submit
5. 5. The advantage of using VLANs is ______.    

Explanation

VLANs do not provide routing between broadcast domains although they do
create separate broadcast domains.

Submit
6. Which of the following is true about Layer 3 addressing?        

Explanation

This is one of the main reasons that IP can support global networks—the use of
hierarchical addressing.

Submit
7. Which of the following is not a private address?        

Explanation

The private address ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

Submit
8. 6. Which of the following statements is false?      

Explanation

Hubs simply forward all frames out all ports and so do not provide collision
domain separation.

Submit
9. 4. Which of the following is not true of the STP protocol?      

Explanation

STP cannot provide load-sharing because only a single path exists between each
segment and the root bridge to avoid loops.

Submit
10. 13. Which of the following is false regarding VLANs?        

Explanation

This is not true if a VLAN trunk is used between the switches.

Submit
11.  The address 224.100.1.1 under traditional classful addressing would be ______.        

Explanation

This is a Class D or multicast address. You can tell this by examining the first
octet in binary: 224 = 128 + 64 + 32 = 11100000. The first 3 bits are 1, so this
indicates that it is a Class D address.

Submit
12. The concept of allowing a single route entry to represent many network addresses is known as ______.        

Explanation

CIDR is a technology that implements route aggregation, but the question asks
what the “concept” is called, and the concept is route aggregation.

Submit
13. 3. Which of the following is not true about Link Aggregation Groups?          

Explanation

This is a description of STP, not LAG.

Submit
14. 11. What determines how the root bridge is elected?          

Explanation

This is an accurate description of how a root bridge is selected. Answer D is wrong

because the BID is always used to determine the root bridge (note the unless

qualifier). In fact, answer C describes what the BID is: bridge priority plus MAC

address.

Submit
15. Which of the following is a valid host IP address?        

Explanation

10.254.1.1 is the only valid host address. The other addresses are either out of supported
IP address ranges, are in the broadcast range (255), or are multicast (224).

Submit
16. 10. The mechanism that STP uses to prevent loops in an Ethernet switched network is ______.            

Explanation

This is an accurate description of the way STP functions to prevent loops.

Submit
17. If your network address is 10.1.0.0/16 and you have subnetworks that all support at least 300 hosts, how many subnets do you have?        

Explanation

The trick here is recognizing that if you need 300 hosts per subnet, then you need
to use more than 8 bits of the IP address for hosts because you can only have 255
max hosts for an 8-bit octet. If you borrow one of the bits from the third octet,
this gives you a maximum of 510 hosts, and leaves 7 bits of the third octet for subnets.
27 = 128, so you can have 128 subnets.

Submit
18.  Which of the following is not a reason that subnetting is superior to class-based addressing?       .

Explanation

This is true for classful addressing, but not for classless addressing. Using classless
addressing, you need the subnet mask to determine how many bits are used for the
subnet and how many for the host.

Submit
19. Which of the following is the correct representation of mask 255.192.0.0?        

Explanation

The key here is to remember that 255 means “all 1s,” so you know that the first
octet has all the bits used and therefore the mask is at least /8. 192 translates into
the highest 2 bits of the next octet: 27 + 26 = 128 + 64 + 192, so this means that
10 bits are used so the subnet mask is /10.

Submit
20. Given network 135.100.0.0/16, you need nine subnets, and of these nine, one subnet needs to be split into 13 additional subnets. Choose the most likely masks you would create for this.        

Explanation

Because nine subnets are needed, we need to use 4 bits of the host address in the
third octet because 24 = 16 possible subnets (3 bits would only yield eight subnets).
Then we need 13 more subnets, which means we need to take another 4 bits to
give us 16 more possible subnets (24 = 16). This means we need 16 + 4 = /20 for
the first eight subnets and 16 + 4 + 4 = /24 for the remaining 13 subnets.

Submit
21. 14. Which STP port state is characterized by the port accepting and recording MAC address information, but not forwarding any frames out the port?        

Explanation

In this state, the bridge learns information about MAC addresses but does not yet
forward frames.

Submit
22. 15. The technology that allows multiple customers with the same VLANs to use the same provider backbone for their Ethernet traffic is known as ______.        

Explanation

VLAN stacking allows a provider to stack its own VLAN information in front of
the customer’s VLAN information to support customers with overlapping VLANs.

Submit
23.  Given a network address of 192.168.100.0/24, what is the maximum number of subnets you can create if each subnet must support at least seven hosts?        

Explanation

If you need seven hosts per subnet, this means that you need to leave at least 4 bits
for each subnet because 24 – 2 = 14 available hosts. This leaves 4 bits (8 – 4 = 4)
for the subnet, which means you can have 24 = 16 subnets. 3 bits for each subnet is
not sufficient because two addresses (all zeros and all ones) cannot be used.

Submit
24. 2. The primary difference in the way Ethernet hubs and Ethernet switches handle traffic is ______.        

Explanation

This is opposed to hubs that act like a “wire in a box” and forward frames out
every port. Both hubs and switches forward broadcast traffic out all ports.

Submit
25. What is the correct "all hosts" broadcast address for subnet 10.15.0.0/17?        

Explanation

Using a /17 means that we have used 1 bit for the subnet, leaving 7 bits in the
third octet. The “all 1s” means to set all of those bits to 1 and all the bits in the
last octet to 1. This means that the last octet is 255 (8 bits set to 1) and the 3rd
octet is 127 (highest bit is 27 = 128, so 255 – 128 = 127).

Submit
26. Given network 176.200.0.0/16 and a subnet that supports 4,387 hosts, what is the most likely mask for the subnet?        

Explanation

We need to determine how many bits are needed to support 4,387 hosts. We know
that using 8 bits gives us 255 hosts (all 1s for a single octet). If we double this by
using an additional bit, that gives us 510 hosts; double again gives 1,020; double
again gives us 2,040; double again gives us 4,080; and double again gives us 8,160.
We had to double five times to get the desired number of hosts, which means we
had to take 5 bits + original 8 bits = 13 total bits for hosts from the available 16
(/16 was the original network). This leaves 3 bits left for subnetting (16 – 13 = 3),
so /16 + 3 bits = /19 subnet mask.

Submit
27. 9. What is the primary reason that Ethernet switched networks require STP?        

Explanation

This describes the problem of loops in a switched network, which is the primary
reason to use STP.

Submit
28. Given network 175.100.0.0/16, if you create four subnets, how many addresses are available on each subnet?        

Explanation

If there are four subnets, that means we have used 2 of the available host bits
because 22 = 4. This leaves 16 – 2 = 14 bits for subnets, and 214 – 2 = 16,382.

Submit
29. 8. Given the following code: Config> lag 1 Config>lag# description "LAG from PE1 to PE2" Config>lag# port 1/1/1 1/1/2 1/1/3 1/1/4 1/1/5 1/1/6 Config>lag# port-threshold 2 action down Config>lag# dynamic-cost Config>lag# no shutdown Which answer correctly describes what happens when Ports 1/1/5 and 1/1/6 fail?

Explanation

This is because the “dynamic-cost” option is configured on the bundle so that
each time a link fails, the OSPF cost is updated. No other action is taken because
the threshold is 2 and there are still four out of six active links functioning.

Submit
30. 12. What distinguishes an alternate port from a back-up port in STP?      

Explanation

The alternate port is on a non-designated switch on the same segment.

Submit
31. Given the address 10.1.1.0/24, the most correct description of 10.1.1.0 is ______.        

Explanation

B is not as correct because technically 10.1.1.0 is a subnet of network 10.0.0.0.

Submit
32. Which of the following is not allowed?          

Explanation

This value cannot be used as a subnet address since the host portion is not all
zeros. The other network addresses given all have the host portion all zeros. Any
valid address can be used as a host address.

Submit
33. 7. The method that LAGs use to provide load balancing is best described as:          

Explanation

This method is used to ensure that there is no frame reordering as required by the
802.3ad standard.

Submit
34. Which of the following is not a reason networks built on Ethernet alone cannot scale to a global?        

Explanation

Ethernet switches, in fact, do build FDB tables of MAC addresses. The other
answers are all factors that prevent Ethernet from creating global networks.

Submit
35. How many subnets can be created from network 10.0.0.0/8 if each subnet must support at least 31 hosts?        

Explanation

The key is to determine how many bits are available for subnetting. We know we
need 31 hosts, so we know we need at least 5 bits because 25 = 32. However, we
lose 2 bits for each subnet for the subnet and broadcast address, so we actually
need 6 bits for the hosts because using 5 bits would only give us 30 hosts per subnet.
Since there are 24 total available bits for subnets on network 10.0.0.0/8,
24 – 6 host bits = 18 subnet bits, and 218 = 262,144 available subnets.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 14, 2011
    Quiz Created by
    Temi
Cancel
  • All
    All (35)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is not true about an IP packet? ...
 An IP address has a first octet represented in binary as...
1. When a frame with an unknown destination MAC address enters a...
A network with a /30 mask allows you to have how many usable host...
5. The advantage of using VLANs is ______.    
Which of the following is true about Layer 3 addressing? ...
Which of the following is not a private address? ...
6. Which of the following statements is false? ...
4. Which of the following is not true of the STP protocol? ...
13. Which of the following is false regarding VLANs? ...
 The address 224.100.1.1 under traditional classful addressing...
The concept of allowing a single route entry to represent many network...
3. Which of the following is not true about Link Aggregation Groups? ...
11. What determines how the root bridge is elected? ...
Which of the following is a valid host IP address? ...
10. The mechanism that STP uses to prevent loops in an Ethernet...
If your network address is 10.1.0.0/16 and you have subnetworks that...
 Which of the following is not a reason that subnetting is...
Which of the following is the correct representation of mask...
Given network 135.100.0.0/16, you need nine subnets, and of these...
14. Which STP port state is characterized by the port accepting and...
15. The technology that allows multiple customers with the same VLANs...
 Given a network address of 192.168.100.0/24, what is the maximum...
2. The primary difference in the way Ethernet hubs and Ethernet...
What is the correct "all hosts" broadcast address for subnet...
Given network 176.200.0.0/16 and a subnet that supports 4,387 hosts,...
9. What is the primary reason that Ethernet switched networks require...
Given network 175.100.0.0/16, if you create four subnets, how many...
8. Given the following code: ...
12. What distinguishes an alternate port from a back-up port in STP? ...
Given the address 10.1.1.0/24, the most correct description of...
Which of the following is not allowed? ...
7. The method that LAGs use to provide load balancing is best...
Which of the following is not a reason networks built on Ethernet...
How many subnets can be created from network 10.0.0.0/8 if each subnet...
Alert!

Advertisement