1.
Who invented IP and some related Internet protocols?
Correct Answer
B. Vinton Cerf and Robert Kahn
Explanation
In a research paper published in 1974, Vinton Cerf and Robert Kahn proposed a protocol they called "TCP". Cerf and Kahn didn't realize it at the time, but the protocol they invented would later become IP, the official network-layer protocol of the Internet.
2.
What is the size of today's standard (IPv4) IP address?
Correct Answer
A. 4 bytes (32 bits)
Explanation
An IPv4 address contains 4 bytes (32 bits). IP addresses are usually written in dotted-decimal notation where a period (.) separates each byte (for example, 10.0.0.255). With 32 bits, a total of 4,294,967,296 IPv4 addresses are possible.
3.
What is the size of the next-generation (IPv6) IP address?
Correct Answer
C. 16 bytes (128 bits)
Explanation
An IPv6 address contains 16 bytes (128 bits). IPv6 addresses are written in a hexadecimal format. The eight, two-byte segments of the address are separated by colons (:). For example - E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420
4.
What Open Systems Interconnection (OSI) layer does IP belong to?
Correct Answer
A. Network
Explanation
IP belongs to the network layer of the OSI model.
5.
Which of the following higher-level protocols runs over IP?
Correct Answer
D. D) All of the above
Explanation
File Transfer (FTP), Hypertext Transfer Protocol (HTTP), Simple Mail Transport Protocol (SMTP), and many other popular protocols run at higher levels of the OSI model, utilizing IP as their foundation.
6.
Which of the following IPv4 addresses is the loopback address?
Correct Answer
C. 127.0.0.1
Explanation
By convention, 127.0.0.1 is the loopback address in IP. Packets sent to this address do not actually travel onto the network, they automatically get routed to a receive queue on the local device. The loopback address is useful for testing network software when a working network connection is not present.
7.
Which of the following IPv6 addresses is the loopback address?
Correct Answer
B. 0::1
Explanation
The IPv6 address 0:0:0:0:0:0:0:1, written in shorthand notation as 0::1, is the loopback address in IPv6, equivalent to 127.0.0.1 in the IPv4 scheme.
8.
The length of an IP datagram header can vary depending on the options used. What is the smallest possible IP header size?
Correct Answer
C. 20 bytes
Explanation
An IP header is usually 20 bytes in length, and this is its minimum size. The size of the header can vary, however, if a special options flag is used to send additional information such as a time stamp. An IP header can be as large as 60 bytes.
9.
The source IP address for an IPv4 datagram is stored where in the header?
Correct Answer
C. 4th longword (bytes 13-16)
Explanation
The full 32-bit IP address for a datagram's source device is always stored in the 4th longword (bytes 13-16) of an IP header. A longword in TCP/IP networking is a 4-byte quantity aligned on a 32-bit boundary.
10.
The destination IP address for an IPv4 datagram is stored where in the header?
Correct Answer
C. Longwords
Explanation
The length of an IP datagram header is technically measured in longwords. The header length field is 4 bits long and, along with the protocol version number, makes up the first byte of an IP header. In a normal 20-byte long IP header, the header length field therefore normally contains the value '5' (0x1001).
11.
The datagram length field in an IPv4 datagram contains which numeric value?
Correct Answer
A. Total number of bytes in the datagram, including the header
Explanation
The length of an IP datagram itself is technically measured in bytes. The length field represents the size of both the header and the data portions of the datagram
12.
The maximum size of an IP datagram (including the header) is -
Correct Answer
D. 65,535 bytes
Explanation
The datagram length field in an IP header is 16 bits in length. Therefore, the maximum datagram size an IP datagram can support is 2^16 - 1 = 65,535 bytes
13.
Can IP run over any other physical networks besides Ethernet?
Correct Answer
D. Yes
Explanation
IP runs over Ethernet and several other hardware interfaces including ATM.
14.
What function does Address Resolution Protocol (ARP) perform?
Correct Answer
A. Converts IP addresses to Ethernet addresses
Explanation
Address Resolution Protocol (ARP) converts IP addresses to Media Access Control (MAC) addresses. ARP is usually implemented in the operating system network device driver.
15.
What mechanism does ARP use to resolve IP addresses?
Correct Answer
C. Lookup table
Explanation
The ARP cache of IP address to MAC address mappings functions as a lookup table.
16.
Which utility program is designed to report whether a networked computer is responding at a given IP address, and how long these responses take?
Correct Answer
C. Ping
Explanation
The ping utility sends network packets using a special protocol to determine the responsiveness of remote addresses.
17.
Which of these shell commands supplies the IP address of a computer running the Windows operating system?
Correct Answer
C. Ipconfig (or winipcfg)
Explanation
The ipconfig command displays the IP address, network mask, and gateway address for each adapter. It can also be used to release and renew address settings, such as those made through DHCP.
18.
Which of these shell commands supplies the IP address of a computer running the Linux operating system?
Correct Answer
C. Ifconfig
Explanation
The ifconfig command can be used to display and change IP settings for all network adapters on a Linux system.
19.
Each of the four numeric fields of an IP address written in dotted-decimal notation is also known as -
Correct Answer
C. Octet
Explanation
Each of the four bytes of an IP address is also known as an octet.
20.
What are the smallest and largest possible values for an IP octet?
Correct Answer
A. 0 and 255
Explanation
Each octet of an IP address ranges in value from 0 to 255. Although not all octets are byte-long quantities, IP octets are always 8 bits in length, and each bit can be set to either 0 or 1.
21.
Which of the following IP address ranges are considered part of the Class A network?
Correct Answer
B. 1.0.0.0 - 126.255.255.255
Explanation
Technically, the Class A address range runs from IP address 1.0.0.0 through address 126.255.255.255. By rule, the 0.x.x.x network is reserved, and 127.x.x.x is considered the broadcast network and also unavailable for general-purpose uses.
22.
Which of the following IP address ranges are considered part of the Class C network?
Correct Answer
A. 192.0.0.0 - 223.255.255.255
Explanation
The Class C network range includes 192.0.0.0 through 223.255.255.255. This is the range of addresses most commonly used on the Internet today.
23.
Which of the following IP address ranges are considered part of the Class B network?
Correct Answer
B. 128.0.0.0 - 191.255.255.255
Explanation
In a Class B network, the first three bits of the first octet are set to '110'. Therefore, the Class B range includes 128.0.0.0 through 191.255.255.255.
24.
The Class D network range is reserved on the Internet for?
Correct Answer
C. Multicast
Explanation
The Class D address range, from 224.0.0.0 through 239.255.255.255, is reserved on the Internet for multicast. Multicast is the ability to define an arbitrary group of IP nodes and address messages just to that collective rather than broadcast to all nodes on the network or send point-to-point to each node individually.
The Class E address range, from 240.0.0.0 through 255.255.255.255 is reserved on the Internet and not to be used for any purpose.
25.
In IPv6, the anycast feature allows -
Correct Answer
C. senders to address to packets to any member of a group of nodes
Explanation
Anycast is a feature of Internet Protocol new in IPv6. Anycast allows senders to direct messages to a node group with the expectation that any single arbitrary node in the group can receive and act on the message. Anycast is similar to load balancing and other redundancy concepts implemented elsewhere in communications architectures. Anycast can be used to implement broadcasts, but anycast is a more generalized concept
26.
Which of the following IP address ranges are reserved for use on private networks?
Correct Answer
D. All of the above
Explanation
10.0.0.0 - 10.255.255.255 is the private network range within Class A, 172.16.0.0 - 172.31.255.255 in Class B, and 192.168.0.0 - 192.168.255.255 in Class C.
27.
Which of the following technologies manage the conversion between IP addresses and host names?
Correct Answer
D. All of the above
Explanation
Domain Name System (DNS), Windows Internet Naming Service (WINS), and Network Information System (NIS) each support a form of name-adddress mapping on computer networks. WINS was designed for Microsoft Windows networks and NIS was designed for Unix networks. DNS supports overall name resolution and mapping on the Internet.
28.
In DNS, requests to obtain the IP address of a given host name are issued by -
Correct Answer
C. Resolvers
Explanation
DNS resolvers issue host name/address conversion requests. Resolvers effectively work like clients, issuing requests to and within the hierarchy of DNS servers.
29.
The default network mask for Class C IP addresses is -
Correct Answer
C. 255.255.255.0
Explanation
The default network mask for Class A networks is 255.0.0.0, for Class B networks 255.255.0.0, for Class C networks 255.255.255.0
30.
A traditional Class C network can handle a maximum of how many hosts?
Correct Answer
A. 254
Explanation
Using the default network mask 255.255.255.0, eight bits remain for host addressing. A total of 256 possible addresses can fit within the lower eight bits. However, traditional IP prohibits a host being assigned the all-zeros (.0) and all-ones (.255) host address, so network administrators configure no more than 254 hosts on a typical Class C network.
31.
CIDR stands for -
Correct Answer
D. Classless Inter-Domain Routing
Explanation
CIDR stands for Classless Inter-Domain Routing. CIDR was developed in the 1990s as a standard scheme for routing IP addresses.
32.
In CIDR notation, which of the following Class C networks contains host 192.168.14.2?
Correct Answer
B. 192.168.11.0/21
Explanation
CIDR notation uses the format xxx.xxx.xxx.xxx/n, where 'n' is the number of '1' bits in the network mask. This means the network 192.168.11.0/21 actually contains all addresses in the range 192.168.8.0 - 192.168.15.255. Conversely,
• the network 192.168.10.0/22 only contains addresses in the range 192.168.8.0 - 192.168.11.255
• the network 192.168.12.0/23 only contains addresses in the range 192.168.12.0 - 192.168.13.255, and
• the network 192.168.13.0/24 only contains addresses in the range 192.168.13.0 - 192.168.13.255.
33.
In CIDR notation, which of the following Class A networks contains host 10.1.7.129?
Correct Answer
C. 10.1.4.0/22
Explanation
Using CIDR notation, the network 10.1.4.0/22 actually contains all addresses in the range 10.1.4.0 - 10.1.7.255. Conversely,
• the network 10.1.6.0/24 only contains addresses in the range 10.1.6.0 - 10.1.6.255
• the network 10.1.5.0/23 only contains addresses in the range 10.1.4.0 - 10.1.5.255, and
• the network 10.1.8.0/21 only contains addresses in the range 10.1.8.0 - 10.1.15.255.
34.
In CIDR notation, which of the following Class B networks contains host 172.18.1.1?
Correct Answer
C. 172.22.0.0/13
Explanation
Using CIDR notation, the network 172.22.0.0/13 actually contains all addresses in the range 172.16.0.0 - 172.23.255.255. Conversely,
• the network 172.11.0.0/12 only contains addresses in the range 172.0.0.0 - 172.15.255.255
• the network 172.15.0.0/12 also only contains addresses in the range 172.0.0.0 - 172.15.255.255, and
• the network 172.26.0.0/13 only contains addresses in the range 172.24.0.0 - 172.31.255.255.
35.
How does CIDR benefit the Internet?
Correct Answer
A. Frees up more IP address space
Explanation
CIDR frees up additional IP address space on the Internet by allowing supernetting. Subnetting with CIDR allows, for example, networks larger than Class C (256 nodes) but smaller than Class B (65,536 nodes) to be allocated. Increased granularity minimizes waste. CIDR was not a part of the original Internet Protocol but was added during the 1990s. To make CIDR work, modifications to several popular routing protocols were required. CIDR has nothing to do with Network Address Translation (NAT), another technology that saves public IP address space by managing a mapping of multiple private IP addresses to one public one.
36.
Which central authority is responsible for allocating IP addresses on the Internet?
Correct Answer
C. IANA
Explanation
The Internet Assigned Numbers Authority (IANA) centrally coordinates the use of IPv4 address space on the Internet.
37.
Which Request For Comments (RFC) documentation describes the Internet Protocol?
Correct Answer
D. RFC 760 and RFC 791
Explanation
The first RFC for Internet Protocol, RFC 760, was published in January 1980. RFC 791, published in September 1981, superceded the original document.
38.
Computers configured with more than one IP address are often called
Correct Answer
C. Multi-homed
Explanation
A multi-homed device contains multiple network adapters. Multi-homed computers are often used as proxy servers, firewalls, and other types of gateways. A proxy server often has one adapter with an external Web address (assigned by an ISP) and another adapter to use a private intranet address (such as 192.168.0.1).
Some Web servers like Apache support a feature called virtual hosting. Virtual hosting allows a computer to act as if it possesses multiple IP addresses. Virtual hosting is not the same as multi-homing, that refers to multiple network interfaces of a device.
39.
The IP checksum feature supports integrity checking for -
Correct Answer
B. An IP header only
Explanation
By itself, IP only supports checksums on the header. TCP adds its own, separate checksum to packets in addition to the IP checksum.
40.
The IP delivery service is -
Correct Answer
C. Unreliable, connectionless
Explanation
The IP protocol is routable but connectionless. This means IP provides no support for a sender to establish a connection with a receiver other before communicating. Instead, IP (and UDP) simply transmit packets and assume that the destination application will be listening on the appropriate port to receive them. TCP adds connection semantics on top of IP.
41.
What is the IPv6 equivalent of 127.0.0.1? (Choose two)
Correct Answer(s)
A. 0:0:0:0:0:0:0:1
C. ::01
Explanation
The IPv6 equivalent of 127.0.0.1 is 0:0:0:0:0:0:0:1 and ::01. IPv6 addresses are represented as eight groups of four hexadecimal digits separated by colons. In this case, both 0:0:0:0:0:0:0:1 and ::01 represent the loopback address in IPv6, which is equivalent to 127.0.0.1 in IPv4.
42.
As the Nerwork administrator, you decide to blcok port 80. Which of the following services will be unavailable for network users?
Correct Answer
D. HTTP
Explanation
If the network administrator decides to block port 80, the service that will be unavailable for network users is HTTP. Port 80 is specifically used for HTTP (Hypertext Transfer Protocol) which is the protocol used for transmitting web pages and other web content. Blocking this port means that users will not be able to access websites or any web-based services that rely on HTTP for communication.
43.
Which of the following is a Class B address?
Correct Answer
A. 129.16.12.200
Explanation
The given IP address 129.16.12.200 is a Class B address. In Class B, the first two octets represent the network portion of the address, while the remaining two octets represent the host portion. In this case, the first octet is 129, which falls within the range of 128 to 191, indicating a Class B address. Therefore, the given IP address is a Class B address.
44.
You are the administrator for a network with two Windows Server systems and 65 Windows Vista systems. At 10 a.m., three users call to report that they are experiencing network connectivity problems. Upon investigation, you determine that the DHCP server has failed. How can you tell the DHCP server failure is the cause of the connectivity problems experienced by three users?
Correct Answer
D. When you check their systems, they have an IP address from 169.254.x.x
Explanation
When the users' systems have an IP address from the 169.254.x.x range, it indicates that the DHCP server has failed. This is because the 169.254.x.x range is reserved for Automatic Private IP Addressing (APIPA), which is used when a DHCP server is not available to assign an IP address. Therefore, the presence of these IP addresses suggests that the DHCP server failure is the cause of the connectivity problems experienced by the three users.
45.
Which of the following address types are associated with IPv6? (Choose three)
Correct Answer(s)
B. Multicast
C. Unicast
D. Anycast
Explanation
A key difference between IPv4 and IPv6 is in the address types. IPv6 addressing has three main types of addresses: unicast,multicast, and anycast. IPv4 uses broadcast addressing, but IPv6 doesn't.
46.
Which of the following IP addresses is not from a private address range?
Correct Answer
C. 127.45.112.16
Explanation
The IP address 127.45.112.16 is not from a private address range because it falls within the range of public IP addresses. Private IP addresses are reserved for use within private networks and are not routable over the internet. The address 127.45.112.16 is a valid public IP address that can be used to communicate over the internet.
47.
You have been tasked with temporarily disabling telnet access for external users. What is the best way to accomplish this?
Correct Answer
B. Block port 23 on the corporate firewall
Explanation
Blocking port 23 on the corporate firewall is the best way to temporarily disable telnet access for external users. Telnet typically uses port 23 for communication, so by blocking this port, external users will not be able to establish telnet connections to the network. This effectively prevents external access to telnet services without completely uninstalling the telnet service or affecting other network services.
48.
You decide to move your network from NetBEUI to TCP/IP. For the external interfaces, you decide to obtain registered IP addresses from your ISP, but for the internal network, you choose to configure systems by using one of the private address ranges. Of the following address ranges, which one would you not consider?
Correct Answer
B. 131.16.0.0 to 131.16.255.255
Explanation
The address range 131.16.0.0 to 131.16.255.255 would not be considered for the internal network because it is not one of the private address ranges specified by the Internet Assigned Numbers Authority (IANA). The private address ranges are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. These address ranges are reserved for private networks and are not routable on the internet. Using the 131.16.0.0 range internally could result in conflicts or connectivity issues with external networks.
49.
You ask your ISP to assign a public IP address for the External interface of your Windows 2000 server, which is running a proxy server application. In the emal message you get that contains the information, the ISP tells you that you have been assigned the IP 203.15.226.12/24. When you fill out the subnet mask field on the IP configuration dialog box on your system, what subnet mask should you use?
Correct Answer
B. 255.255.255.0
Explanation
The correct subnet mask to use in this scenario is 255.255.255.0. This is because the IP address 203.15.226.12/24 indicates that the first 24 bits of the IP address are the network portion, and the remaining 8 bits are the host portion. A subnet mask of 255.255.255.0 represents 24 bits set to 1, indicating that the first 24 bits are the network portion and the last 8 bits are available for host addresses.
50.
Which of the following best describes the function of the default gateway?
Correct Answer
A. It provides the route for destinations outside the local network.
Explanation
The default gateway is responsible for routing network traffic between different networks. It acts as an intermediary device that connects the local network to other networks, such as the internet. When a device on the local network wants to communicate with a destination outside of its own network, it sends the traffic to the default gateway. The default gateway then determines the appropriate route for the traffic to reach its destination outside the local network. Therefore, the statement "It provides the route for destinations outside the local network" best describes the function of the default gateway.