worksheet

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Exercise Questions

1. Which IP addresses are network addresses? (Choose two.)

A. 64.104.3.7 /28 B. 192.168.12.64 /26 C. 192.135.12.191 /26

D. 198.18.12.16 /28 E. 209.165.200.254 /27 F. 220.12.12.33/27


2. A network administrator is building a network for a small business that has 22 hosts. The
ISP has assigned only one Internet routable IP address. Which IP address block can the
network administrator use to address the network?

A. 10.11.12.16 /28 B. 172.31.255.128 /27 C. 192.168.1.0 /28 D. 172.31.255.128 /30

3. What subnet mask would be used with the hosts in the 128.107.176.0 /22 Network?

A. 255.0.0.0 B. 255.248.0.0 C. 255.255.252.0 D. 255.255.255.0 E. 255.255.255.252

4. You have been assigned the address block 10.255.255.224 /28 to create the network
addresses for point-to-point WAN links. How many of these WANs can you support with
this address block?
A. 1 B. 4 C. 7 D. 14
5. A network administrator needs to create a new network that has 14 computers and two
router interfaces. What subnet mask will provide the appropriate number of IPv4
addresses for this network with minimal wasted addresses?
A. 255.255.255.128 B. 255.255.255.192 C. 255.255.255.224
D. 255.255.255.240 E. 255.255.255.248 F. 255.255.255.252
6. In an IPv4 environment, what information is used by the router to forward data packets
from one interface of a router to another?
A. Destination network address C. Source network address
B. Source MAC address D. well Known port destination address
7. What information is added during encapsulation at OSI Layer 3?
A. Source and destination MAC C. Source and destination port number
B. Source and destination application protocol D. Source and destination IP address

8. In a connectionless system, which of the following is correct?


A. The destination is contacted before a packet is sent.
B. The destination is not contacted before a packet is sent.
C. The destination sends an acknowledgement to the source that indicates the
packet was received.
D. The destination sends an acknowledgement to the source that requests the
next packet to be sent.
9. Which portion of the network layer address does a router use to forward packets?
A. host portion C. network portion
B. broadcast address D. gateway address

10. Refer to the exhibit above. Using the network in the exhibit, what would be the
default gateway address for host A in the 192.133.219.0 network?

A. 192.135.250.1 B. 192.31.7.1

C. 192.133.219.0 D.192.133.219.1

11. If the default gateway is configured incorrectly on the host, what is the impact on
communications?
A. The host is unable to communicate on the local network.
B. The host can communicate with other hosts on the local network, but is
unable to communicate with hosts on remote networks.
C. The host can communicate with other hosts on remote networks, but is
unable to communicate with hosts on the local network.
D. There is no impact on communications.

12. What is the purpose of a default gateway?


A. provides a permanent address to a computer
B. identifies the network to which a computer is connected
C. identifies the logical address of a networked computer and uniquely identifies
it to the rest of the network
D. identifies the device that allows local network computers to communicate with
devices on other networks

13. What type of routing uses information that is manually entered into the routing
table?
A. Dynamic C. Static
B. Interior D. Standard
14. When the destination network is not listed in the routing table of a router, what are
two possible actions that the router might take? (Choose two.)
A. The router discards the packet.
B. The router forwards the packet toward the next hop indicated in the ARP table.
C. The router forwards the packet to the interface indicated by the source address.
D. The router forwards the packet out the interface indicated by the default route
entry.
15. What is a component of a routing table entry?
A. The MAC address of the interface of the router
B. The destination Layer 4 port number
C. The destination host address
D. The next-hop address
16. What two characteristics are commonly associated with dynamic routing protocols?
(Choose two.)
A. require no device configuration
B. require less processing power than static routes require
C. consume bandwidth to exchange route information
D. prevent manual configuration and maintenance of the routing table
17. What statement describes the purpose of a default route?
A. A host uses a default route to transfer data to another host on the same network
segment.
B. A host uses a default route to forward data to the local switch as the next hop to
all destinations.
C. A host uses a default route to identify the Layer 2 address of an end device on the
local network.
D. A host uses a default route to transfer data to a host outside the local network
when no other route to the destination exists.

18. What are two advantages of static routing over dynamic routing?

A. The configuration is less error prone.

B. Static routing is more secure because routers do not advertise routes.

C. Growing the network usually does not present a problem.

D. No computing overhead is involved.

E. The administrator has less work maintaining the configuration.

19. Which statement best describes convergence on a network?


A. The amount of time required for routers to share administrative configuration

changes, such a password changes, from one end of a network to the other end

B. The time required for the routers in the network to update their routing tables
after a topology change has occurred

C. The time required for the routers in one autonomous system to learn routes to
destinations in another autonomous system

D. The time required for routers running disparate routing protocols to update
their routing tables

20. Explain why static routing might be preferred over dynamic routing.

21. What are the most common metrics used in IP dynamic routing protocols?

22. Which three statements are true about routes and their use? (Choose three.)

A. If no route to the destination network is found, the packet is returned to the


previous router.

B. If the destination network is directly connected, the router forwards the packet
to the destination host.

C. If multiple network entries exist for the destination network, the most general
route is used to forward the packet.

D. If no route exists for the destination network and a default route is present, the
packet is forwarded to the next-hop router.
E. If the originating host has a default gateway configured, the packet for a remote
network can be forwarded using that route.

23. Refer to the exhibit below. The network in the exhibit is fully operational. What two
statements correctly describe the routing for the topology that is shown? (Choose
two.)

A. 192.168.0.2 is the next-hop address that is used by R3 to route a packet from


the 10.0.0.0 network to the 172.16.0.0 network.

B. 10.0.0.1 is the next-hop address that is used by R1 to route a packet from the
192.168.12.0 network to the 10.0.0.0 network.

C. 192.168.0.1 is the next-hop address that is used by R1 to route a packet from


the 192.168.12.0 network to the 172.16.0.0 network.

D. 172.16.0.1 is the next-hop address that is used by R3 to route a packet from


the 10.0.0.0 to the 172.16.0.0 network.

E. 192.168.0.1 is the next-hop address that is used by R2 to route a packet from


the 172.16.0.0 network to the 192.168.12.0 network.

F. 192.168.0.2 is the next-hop address that is used by R2 to route a packet from


the 172.16.0.0 network to the 192.168.12.0 network.

24. Refer to the exhibit. A network administrator has to develop an IP addressing


scheme that uses the 192.168.1.0 /24 address space. The network that contains the
serial link has already been addressed out of a separate range. Each network will be
allocated the same number of host addresses. Which network mask will be
appropriate to address the remaining networks?

A. 255.255.255.248 C. 255.255.255.224

B. 255.255.255.192 D.255.255.255.240
A. 255.255.255.252

25. Which of the following network devices are recommended to be assigned static IP
addresses?

A. LAN workstations B. servers C. network printers D. routers E workstations

26. Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)

A. 172.16.4.127 /26 B.172.16.4.155 /26 C 172.16.4.193 /26

D. 172.16.4.95 /27 E.172.16.4.159 /27 F. 172.16.4.207 /27

30. Which statements are true regarding IP addressing? (Choose two.)

A. NAT translates public addresses to private addresses destined for the Internet.

B. Only one company is allowed to use a specific private network address space.

C. Private addresses are blocked from public Internet by router.

D. Network 172.32.0.0 is part of the private address space.

F. IP address 127.0.0.1 can be used for a host to direct traffic to itself.

31. A router interface has been assigned an IP address of 172.16.192.166 with a mask
of 255.255.255.248. To which subnet does the IP address belong?

A.172.16.0.0 B. 172.16.192.0 C. 172.16.192.128 D. 172.16.192.160

32. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which
of the following would describe this address?

A. This is a usable host address. B. This is a broadcast address.

C. This is a network address. D. This is not a valid address.


33. Refer to the exhibit. The network administrator has assigned the internetwork of
LBMISS an address range of 192.168.10.0. This address range has been subnetted
using a /29 mask. In order to accommodate a new building, the technician has
decided to use the fifth subnet for configuring the new network (subnet zero is the
first subnet). By company policies, the router interface is always assigned the first
usable host address and the workgroup server is given the last usable host address.
Which configuration should be entered into the workgroup server’s properties to
allow connectivity to the network?

A. IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway:


192.168.10.39

B. IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway:


192.168.10.33

C. IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway:


192.168.10.33

D.IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway:


192.168.10.31

34. Refer to the exhibit below. Which network prefix will work with the IP addressing
scheme shown in the graphic.

A. /24 B. /16 C. /20 D./27


35. Compare and contrast link-state and distance-vector routing algorithms

36. Consider the following network. With the indicated link costs, use Dijkstra’s shortest-
path algorithm to compute the shortest path from x to all network nodes. Show how the
algorithm works by computing a table similar to the example on the chapter slide

37. Compare the frame structures for 10BASE-T, 100BASE-T, and Gigabit Ethernet. How do
they differ?

38. What are the contents of the data field in a frame?

A. 64 byte B. The network layer PDU C. The Layer 2 source address D. Layer 1 PDU

39. Which of the following is a characteristic of contention-based MAC?

A. Used on nonshared media. B. Nodes compete for the use of the medium.

C. Leaves MAC to the upper layer. D. Each node has a specific time to use the medium.

40. Which of the following are common data link sub-layers used in LANs? (Choose two.)

A. Logic Link Control B. MAC C. Network interface card D. Carrier access multi access

Physical layer
41. What is the purpose of encoding?
A. To identify the start and stop bits in a frame
B. To denote the physical layer’s connectors of computers in relation to the way they
connect to network media
C. To control the way frames are placed on the media at the data link layer
D. To represent the data bits by using different voltages, light patterns, or
electromagnetic waves as they are placed onto the physical media
42. Which field of an Ethernet frame is used for error detection?
A. Type B. Preamble C. Frame Check Sequence D. Destination MAC Address
43. How many bits are in an Ethernet MAC address?
A. 12 B. 32 C. 48 D. 256
44. Which of the following addresses is used as a destination address for an Ethernet
broadcast frame?
A. 0.0.0.0 B. 255.255.255.255 C. FF-FF-FF-FF-FF-FF D. 0C-FA-94-24-EF-00
45. Which of the following describes a connection to a switch port?
A. Isolates broadcasts B. Is a separate collision domain C. Uses the MAC
address of the switch port as the destination D. Regenerates every bit that arrives out
every port on the switch
47 .If a frame arrives at a switch that contains a destination MAC address that is not listed
in the MAC table, what process will occur?

A. Aging B. Filtering C. Flooding D. Learning

48. The devices in Figure 10-27 have been configured with a static IP address from the net-
work 192.168.102.0. All hosts can communicate with each other but cannot communicate
with the server. What is causing this problem?

A. The IP address assigned to the server is outside the subnet.

B. The IP address assigned to the server is a broadcast address.

C. The IP address assigned to the server is a network address.

D. The switch that the server is connected to has not been assigned an IP address.

E. The route connected to the 192.168.102.96 network is configured for the


192.168.102.64 network.
47. Which of the following statement is true about the network given below is (choose two)

A. There are two broadcast domains in the network.


B. There are six broadcast domains in the network.
C. There are four broadcast domains in the network.
D. There are five collision domains in the network
48. Routing Information Protocol (RIP) by default has_____________ number of hops.
A.15 B.16 C.10 D.12

49. Refer to the exhibit. Assume that the routing protocol referenced in each choice below is
configured with its default settings and the given routing protocol is running on all the routers. Which
two conditional statements accurately state the path that will be chosen between networks 10.1.0.0
and 10.3.2.0 for the routing protocol mentioned? Assume T1=1.544Mbps (Choose two)

A. If OSPF is the routing protocol, the path will be from R1 to R3 to R4 to R5


B. If OSPF is the routing protocol, the path will be from R1 to R2 to R5.
C. If OSPF is the routing protocol, the path will be from R1 to R5.
D. If RIPv2 is the routing protocol, the path will be from R1 to R3 to R4 to R5.
E. If RIPv2 is the routing protocol, the path will be from R1 to R5.

You might also like