Exam 2: Ip Addressing and Related Topics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the limitations of creating a CIDR address?

(Essay)
4.8/5
(43)

IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network.

(True/False)
4.8/5
(29)

What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?

(Multiple Choice)
4.8/5
(26)

What name is given to a device that interconnects multiple IP networks or subnets?

(Multiple Choice)
4.7/5
(40)

As a frame moves from interface to interface, the IP source and destination address information is preserved.

(True/False)
5.0/5
(37)

In which subnetting technique can a single address to be subdivided into multiple subnets, in which subnets need not all be the same size?

(Multiple Choice)
4.8/5
(36)

Match each item with a statement below. a.interface identifier b.anycast address c.scope identifier d.loopback address e.aggregatable global unicast address f.link-local address g.route aggregation h.application-specific integrated circuits i.Layer 3 switch -an IPv6 address that is all zeros except for the very last bit, which is set to 1 and may be represented as ::1 in compact notation

(Short Answer)
4.9/5
(42)

A special bit pattern that "blocks off " the network portion of an IPv4 address with an all-ones pattern is known as which of the following?

(Multiple Choice)
4.8/5
(34)

Providing a narrower address space is the primary design goal for IPv6.

(True/False)
4.9/5
(34)

The physical numeric address functions at a sublayer of the Data Link layer in the OSI network reference model, called the ____________________.

(Short Answer)
4.7/5
(43)

____________________ combines contiguous network addresses by stealing bits from the network portion and using them to create a single, larger contiguous address space for host addresses.

(Short Answer)
4.8/5
(32)

Class D addresses are used strictly for unicast applications. Indicate the answer choice that best completes the statement or answers the question.

(True/False)
4.8/5
(33)

How can you express native IPv6 addresses in URLs?

(Essay)
4.8/5
(28)

Give two reasons why you should use binary boundaries.

(Essay)
4.9/5
(37)

The activity of stealing (borrowing) bits from the host portion to further subdivide the network portion of an address is called ____________________.

(Short Answer)
4.8/5
(29)

Match each item with a statement below. a.interface identifier b.anycast address c.scope identifier d.loopback address e.aggregatable global unicast address f.link-local address g.route aggregation h.application-specific integrated circuits i.Layer 3 switch -a 4-bit field limiting the valid range for a multicast address

(Short Answer)
4.9/5
(33)

Most organizations need public IP addresses only for two classes of equipment. Briefly describe each of these classes.

(Essay)
4.9/5
(26)

____________________ informs the network interface card to pass packets sent to that address to the IP stack so their contents can be read, and tells the IP gateway to forward such traffic onto the physical network, where the listening network interface resides.

(Short Answer)
4.9/5
(36)

Which of the following technologies is used to permit computers to translate numeric IP addresses to MAC layer addresses?

(Multiple Choice)
4.8/5
(22)

Match each item with a statement below. a.interface identifier b.anycast address c.scope identifier d.loopback address e.aggregatable global unicast address f.link-local address g.route aggregation h.application-specific integrated circuits i.Layer 3 switch -in IPv6 addressing, a bit string that uniquely identifies a particular interface

(Short Answer)
4.8/5
(38)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)