Network + Prep Quiz - IP Routing/Addressing

70 Questions | Total Attempts: 391

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Questions and Answers
  • 1. 
    Who invented IP and some related Internet protocols?
    • A. 

      Vinton Cerf and Bob Metcalfe

    • B. 

      Vinton Cerf and Robert Kahn

    • C. 

      Bob Metcalfe and Ivan Sutherland

  • 2. 
    What is the size of today's standard (IPv4) IP address?
    • A. 

      4 bytes (32 bits)

    • B. 

      16 bytes (128 bits)

    • C. 

      12 bytes (96 bits)

    • D. 

      15 bytes (120 bits)

  • 3. 
    What is the size of the next-generation (IPv6) IP address?
    • A. 

      4 bytes (32 bits)

    • B. 

      15 bytes (120 bits)

    • C. 

      16 bytes (128 bits)

    • D. 

      12 bytes (96 bits)

  • 4. 
    What Open Systems Interconnection (OSI) layer does IP belong to?
    • A. 

      Network

    • B. 

      Transport

    • C. 

      Session

    • D. 

      data link

  • 5. 
    Which of the following higher-level protocols runs over IP?
    • A. 

      FTP

    • B. 

      HTTP

    • C. 

      SMTP

    • D. 

      D) All of the above

  • 6. 
     Which of the following IPv4 addresses is the loopback address?
    • A. 

      0.0.0.0

    • B. 

      255.255.255.255

    • C. 

      127.0.0.1

    • D. 

      10.0.0.1

  • 7. 
    Which of the following IPv6 addresses is the loopback address?
    • A. 

      0::0

    • B. 

      0::1

    • C. 

      127::0

    • D. 

      All the above

  • 8. 
    • A. 

      16 bytes

    • B. 

      24 bytes

    • C. 

      20 bytes

    • D. 

      60 bytes

  • 9. 
    The source IP address for an IPv4 datagram is stored where in the header?
    • A. 

      2nd longword (bytes 5-8)

    • B. 

      3rd longword (bytes 9-12)

    • C. 

      4th longword (bytes 13-16)

    • D. 

      5th longword (bytes 17-20)

  • 10. 
    The destination IP address for an IPv4 datagram is stored where in the header?
    • A. 

      Bits

    • B. 

      Bytes

    • C. 

      Longwords

    • D. 

      none of the above

  • 11. 
    The datagram length field in an IPv4 datagram contains which numeric value?
    • A. 

      Total number of bytes in the datagram, including the header

    • B. 

      Total number of longwords in the datagram, including the header

    • C. 

      Total number of bytes in the datagram, excluding the header

    • D. 

      Total number of longwords in the datagram, excluding the header

  • 12. 
    The maximum size of an IP datagram (including the header) is -
    • A. 

      1,024 bytes

    • B. 

      4,096 bytes

    • C. 

      1,500 bytes

    • D. 

      65,535 bytes

  • 13. 
    Can IP run over any other physical networks besides Ethernet?
    • A. 

      No (and IP does not run over Ethernet)

    • B. 

      Yes (but IP does not run over Ethernet)

    • C. 

      No

    • D. 

      Yes

  • 14. 
    What function does Address Resolution Protocol (ARP) perform?
    • A. 

      Converts IP addresses to Ethernet addresses

    • B. 

      Prevents two computers from using the same IP address

    • C. 

      Automatically assigns IP addresses to computers

    • D. 

      None of the above

  • 15. 
    What mechanism does ARP use to resolve IP addresses?
    • A. 

      Mathematical formula

    • B. 

      Central Web site

    • C. 

      Lookup table

    • D. 

      Random number generator

  • 16. 
    Which utility program is designed to report whether a networked computer is responding at a given IP address, and how long these responses take?
    • A. 

      Traceroute

    • B. 

      Ttcp

    • C. 

      Ping

    • D. 

      Netstat

  • 17. 
    Which of these shell commands supplies the IP address of a computer running the Windows operating system?
    • A. 

      Ipshow

    • B. 

      Iplookup

    • C. 

      Ipconfig (or winipcfg)

    • D. 

      Traceroute

  • 18. 
    Which of these shell commands supplies the IP address of a computer running the Linux operating system?
    • A. 

      Ipconfig

    • B. 

      Linuxconf

    • C. 

      Ifconfig

    • D. 

      None of the above

  • 19. 
    Each of the four numeric fields of an IP address written in dotted-decimal notation is also known as -
    • A. 

      Subnet

    • B. 

      Word

    • C. 

      Octet

    • D. 

      Class

  • 20. 
    What are the smallest and largest possible values for an IP octet?
    • A. 

      0 and 255

    • B. 

      0 and 512

    • C. 

      0 and 256

    • D. 

      0 and 999

  • 21. 
    Which of the following IP address ranges are considered part of the Class A network?
    • A. 

      0.0.0.0 - 126.255.255.255

    • B. 

      1.0.0.0 - 126.255.255.255

    • C. 

      0.0.0.0 - 127.255.255.255

    • D. 

      1.0.0.0 - 127.255.255.255

  • 22. 
    Which of the following IP address ranges are considered part of the Class C network?
    • A. 

      192.0.0.0 - 223.255.255.255

    • B. 

      192.0.0.0 - 215.255.255.255

    • C. 

      192.0.0.0 - 219.255.255.255

    • D. 

      192.0.0.0 - 211.255.255.255

  • 23. 
    Which of the following IP address ranges are considered part of the Class B network?
    • A. 

      128.0.0.0 - 159.255.255.255

    • B. 

      128.0.0.0 - 191.255.255.255

    • C. 

      128.0.0.0 - 175.255.255.255

    • D. 

      128.0.0.0 - 207.255.255.255

  • 24. 
    The Class D network range is reserved on the Internet for?
    • A. 

      Broadcast

    • B. 

      Anycast

    • C. 

      Multicast

    • D. 

      None of the above

  • 25. 
    In IPv6, the anycast feature allows -
    • A. 

      Senders to address packets to all nodes in a group

    • B. 

      Receivers to listen for any given packet on the network

    • C. 

      senders to address to packets to any member of a group of nodes

    • D. 

      Receivers to announce their presence to potential senders

  • 26. 
    • A. 

      10.0.0.0 - 10.255.255.255

    • B. 

      172.16.0.0 - 172.31.255.255

    • C. 

      192.168.0.0 - 192.168.255.255

    • D. 

      All of the above

  • 27. 
    Which of the following technologies manage the conversion between IP addresses and host names?
    • A. 

      WINS

    • B. 

      NIS

    • C. 

      DNS

    • D. 

      All of the above

  • 28. 
    In DNS, requests to obtain the IP address of a given host name are issued by -
    • A. 

      Servers

    • B. 

      Translators

    • C. 

      Resolvers

    • D. 

      None of the above

  • 29. 
    The default network mask for Class C IP addresses is -
    • A. 

      255.0.0.0

    • B. 

      255.255.0.0

    • C. 

      255.255.255.0

    • D. 

      255.255.255.255

  • 30. 
    A traditional Class C network can handle a maximum of how many hosts?
    • A. 

      254

    • B. 

      258

    • C. 

      510

    • D. 

      512

  • 31. 
    CIDR stands for -
    • A. 

      Class-Based Internet Domain Routing

    • B. 

      Careful Inter-Domain Routing

    • C. 

      Constant Internet Domain Routing

    • D. 

      Classless Inter-Domain Routing

  • 32. 
    • A. 

      192.168.10.0/22

    • B. 

      192.168.11.0/21

    • C. 

      192.168.12.0/23

    • D. 

      192.168.13.0/24

  • 33. 
    • A. 

      10.1.6.0/24

    • B. 

      10.1.5.0/23

    • C. 

      10.1.4.0/22

    • D. 

      10.1.8.0/21

  • 34. 
    • A. 

      172.11.0.0/12

    • B. 

      172.15.0.0/12

    • C. 

      172.22.0.0/13

    • D. 

      172.26.0.0/13

  • 35. 
    • A. 

      Frees up more IP address space

    • B. 

      Allows a single IP address to be used by multiple hosts

    • C. 

      Maintains backward compatibility with old IP routing protocols

    • D. 

      All of the above

  • 36. 
    Which central authority is responsible for allocating IP addresses on the Internet?
    • A. 

      IETF

    • B. 

      IEEE

    • C. 

      IANA

    • D. 

      None of the above

  • 37. 
    Which Request For Comments (RFC) documentation describes the Internet Protocol?
    • A. 

      RFC 1

    • B. 

      RFC 768 and RFC 1157

    • C. 

      RFC 761

    • D. 

      RFC 760 and RFC 791

  • 38. 
    • A. 

      Routers

    • B. 

      Bridges

    • C. 

      Multi-homed

    • D. 

      Internetworked

  • 39. 
    The IP checksum feature supports integrity checking for -
    • A. 

      An IP packet (header and payload)

    • B. 

      An IP header only

    • C. 

      An IP payload only

    • D. 

      none of the above - IP doesn't use checksums

  • 40. 
    The IP delivery service is -
    • A. 

      Reliable, connection-oriented

    • B. 

      Non-routable

    • C. 

      Unreliable, connectionless

    • D. 

      None of the above

  • 41. 
    What is the IPv6 equivalent of 127.0.0.1? (Choose two)
    • A. 

      0:0:0:0:0:0:0:1

    • B. 

      0:0:0:0:0:0:0:24

    • C. 

      ::01

    • D. 

      ::24

  • 42. 
    As the Nerwork administrator, you decide to blcok port 80. Which of the following services will be unavailable for network users?
    • A. 

      DNS

    • B. 

      POP3

    • C. 

      FTP

    • D. 

      HTTP

  • 43. 
    Which of the following is a Class B address?
    • A. 

      129.16.12.200

    • B. 

      126.15.16.122

    • C. 

      211.244.212.5

    • D. 

      193.17.101.27

  • 44. 
    You are the administrator for a network with two Windows Server systems and 65 Windows Vista systems. At 10 a.m., three users call to report that they are experiencing network connectivity problems. Upon investigation, you determine that the DHCP server has failed. How can you tell the DHCP server failure is the cause of the connectivity problems experienced by three users?
    • A. 

      When you check their systems, they have an IP address of 0.0.0.0

    • B. 

      When you check their systems, they have an IP address in the 192.168.x.x address range.

    • C. 

      When you check their systems, they have a default gateway value of 255.255.255.255.

    • D. 

      When you check their systems, they have an IP address from 169.254.x.x

  • 45. 
    • A. 

      Broadcast

    • B. 

      Multicast

    • C. 

      Unicast

    • D. 

      Anycast

  • 46. 
    Which of the following IP addresses is not from a private address range?
    • A. 

      192.168.200.117

    • B. 

      172.16.3.204

    • C. 

      127.45.112.16

    • D. 

      10.27.100.143

  • 47. 
    You have been tasked with temporarily disabling telnet access for external users. What is the best way to accomplish this?
    • A. 

      Block port 53 on the corporate firewall

    • B. 

      Block port 23 on the corporate firewall

    • C. 

      Unistall the telnet service

    • D. 

      Configure ICS to ignore the client-initiated telnet requests

  • 48. 
    • A. 

      192.168.0.0 to 192.168.255.255

    • B. 

      131.16.0.0 to 131.16.255.255

    • C. 

      10.0.0.0 to 10.255.255.255

    • D. 

      172.16.0.0 to 172.31.255.255

  • 49. 
    • A. 

      255.255.255.255

    • B. 

      255.255.255.0

    • C. 

      255.255.240.0

    • D. 

      255.255.255.240

  • 50. 
    Which of the following best describes the function of the default gateway?
    • A. 

      It provides the route for destinations outside the local network.

    • B. 

      It enables a single Internat connection to be used by several users

    • C. 

      It identifies the local subnet and formulates a routing table

    • D. 

      It is used to communicate in a multiple-platform environment

  • 51. 
    Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.)
    • A. 

      RIPv1

    • B. 

      IGRP

    • C. 

      EIGRP

    • D. 

      OSPF

    • E. 

      BGP

    • F. 

      RIPv2

  • 52. 
    Which of the following are considered distance-vector routing protocols? (Choose two.)
    • A. 

      OSPF

    • B. 

      RIP

    • C. 

      RIPv2

    • D. 

      IS-IS

  • 53. 
    Which of the following are considered link-state routing protocols? (Choose two.)
    • A. 

      OSPF

    • B. 

      RIP

    • C. 

      RIPv2

    • D. 

      IS-IS

  • 54. 
    Which of the following is considered a hybrid routing protocol?
    • A. 

      OSPF

    • B. 

      BGP

    • C. 

      RIPv2

    • D. 

      IS-IS

    • E. 

      EIGRP

  • 55. 
    Why would you want to use a dynamic routing protocol instead of using static routes?
    • A. 

      Less overhead on the router

    • B. 

      Dynamic routing is more secure

    • C. 

      Dynamic routing scales to larger networks

    • D. 

      The network runs faster

  • 56. 
    Which of the following is a vendor-specific routing protocol?
    • A. 

      IGRP

    • B. 

      OSPF

    • C. 

      RIPv1

    • D. 

      EIGRP

    • E. 

      IS-IS

  • 57. 
    RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP has to reconverge. Which can you implement to improve convergence time on the network? 
    • A. 

      Replace RIP with static routes

    • B. 

      Update RIP to RIPv2

    • C. 

      Update RIP to OSPF using Link State

    • D. 

      Replace RIP with BGP as an exterior gateway protocol

  • 58. 
    What is the administrative distance of OSPF?
    • A. 

      90

    • B. 

      100

    • C. 

      110

    • D. 

      120

  • 59. 
    Which of the following protocols will advertise routed IPv6 networks?
    • A. 

      RIP

    • B. 

      RIPng

    • C. 

      OSPFv2

    • D. 

      EIGRPv3

  • 60. 
    What is the difference between static and dynamic routing?
    • A. 

      You use static routing in large, scalable networks

    • B. 

      Dynamic routing is used by a DNS server

    • C. 

      Dynamic routes are added automatically

    • D. 

      Static routes are added automatically

  • 61. 
    Which routing protocol has a maximum hop count of 15?
    • A. 

      RIPv1

    • B. 

      IGRP

    • C. 

      EIGRP

    • D. 

      OSPF

  • 62. 
    Which of the following describes routing convergence?
    • A. 

      The time it takes for your VPN to connect

    • B. 

      The time required by protocols to update their forwarding tables after changes have occurred

    • C. 

      The time required for IDS to detect an attack

    • D. 

      The time required by switches to update their link status and go into forwarding state

  • 63. 
    What routing protocol is typically used to connect AS’s on the Internet?
    • A. 

      IGRP

    • B. 

      RIPv2

    • C. 

      BGP

    • D. 

      OSPF

  • 64. 
    RIPv2 sends out its routing table every 30 seconds just like RIPv1, but it does so   more efficiently.  What type of transmission does RIPv2 use to accomplish this task?
    • A. 

      Broadcasts

    • B. 

      Multicasts

    • C. 

      Telecast

    • D. 

      None of the above

  • 65. 
    Which routing protocols have an administrative distance of 120? (Choose two.)
    • A. 

      RIPv1

    • B. 

      RIPv2

    • C. 

      EIGRP

    • D. 

      OSPF

  • 66. 
    Which of the following routing protocols uses AS-Path as one of the methods to build the routing tables?
    • A. 

      OSPF

    • B. 

      IS-IS

    • C. 

      BGP

    • D. 

      RIP

    • E. 

      EIGRP

  • 67. 
    Which IPv6 routing protocol uses UDP port 521?
    • A. 

      RIPng

    • B. 

      EIGRPv6

    • C. 

      OSPFv3

    • D. 

      IS-IS

  • 68. 
    What EIGRP information is held in RAM and maintained through the usage of hello and update packets? (Select all that apply.)
    • A. 

      DUAL table

    • B. 

      Neighbor table

    • C. 

      Topology table

    • D. 

      Successor route

  • 69. 
    Which is true regarding EIGRP successor routes?
    • A. 

      Successor routes are saved in the neighbor table.

    • B. 

      Successor routes are stored in the DUAL table.

    • C. 

      Successor routes are used only if the primary route fails.

    • D. 

      A successor route is used by EIGRP to forward traffic to a destination.

  • 70. 
    Which of the following uses only hop count as a metric to find the best path to a remote network?
    • A. 

      RIP

    • B. 

      EIGRP

    • C. 

      OSPF

    • D. 

      BGP