Networking Chapter 2 Internet Does Not Reveal The Address Structure The Internal Network Outsiders Loopback

subject Type Homework Help
subject Pages 9
subject Words 2368
subject Authors Ed Tittel, James Pyles, Jeffrey L. Carrell

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 1
Indicate whether the statement is true or false.
1. Class D addresses are used strictly for unicast applications.
a.
True
b.
False
2. IP addresses can be represented as domain names to make it possible for users to identify and access
resources on a network.
a.
True
b.
False
3. When a host uses a service that employs a multicast address, it registers itself to "listen" on that address, as
well as on its own unique host address (and the broadcast address).
a.
True
b.
False
4. As a frame moves from interface to interface, the IP source and destination address information is preserved.
a.
True
b.
False
5. Providing a narrower address space is the primary design goal for IPv6.
a.
True
b.
False
Indicate the answer choice that best completes the statement or answers the question.
6. In which subnetting technique can a single address to be subdivided into multiple subnets, in which subnets
need not all be the same size?
a.
IP gateway
b.
constant-length subnet masking
c.
variable-length subnet masking
d.
IP renumbering
7. Which of the following technologies is used to permit computers to translate numeric IP addresses to MAC
layer addresses?
a.
ARP
b.
RARP
c.
Reverse proxying
d.
Subnet masking
8. When a computer on one subnet wishes to communicate with a computer on another subnet, traffic must be
forwarded from the sender to which of the following devices?
a.
broadcast server
b.
IP gateway
page-pf2
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 2
c.
firewall
d.
proxy server
9. Which of the following allows IPv4 addresses from Class A, B, or C to be combined and treated as a larger
address space, or subdivided arbitrarily, as needed?
a.
Supernetting
b.
Classless Inter-Domain Routing
c.
Subnet masking
d.
Address masquerading
10. To be valid, any domain name must correspond to at least one of which of the following?
a.
loopback address
b.
unique numeric IP address
c.
firewall
d.
IP gateway
11. What type of address is a six-byte numeric address, burned into firmware (on a chip) by network interface
manufacturers?
a.
symbolic address
b.
logical numeric address
c.
reverse proxy address
d.
physical numeric address
12. What name is given to a device that interconnects multiple IP networks or subnets?
a.
subnet mask
b.
IP gateway
c.
layer-3 switch
d.
network address
13. What protocol is used to translate MAC layer addresses into numeric IP addresses?
a.
ARP
b.
RARP
c.
RIP
d.
IP
14. What technology gets its name from the notion that it ignores the traditional A, B, and C class designations
for IP addresses?
a.
Route aggregation
b.
Address masquerading
c.
NAT
d.
Classless Inter-Domain Routing
page-pf3
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 3
15. Which of the following represents a network address that all hosts on a network must read?
a.
loopback
b.
hop
c.
broadcast address
d.
dot squad
16. What technique may be performed by boundary devices that include proxy server capabilities to replace
private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace
such public addresses with their proper private equivalents as incoming traffic passes through the server?
a.
IP renumbering
b.
Supernetting
c.
Address masquerading
d.
Subnetting
17. Multicast addresses in IPv6 use which of the following to define the portion of the Internet to which the
multicast group pertains?
a.
scope identifier
b.
interface identifier
c.
loopback identifier
d.
aggregatable global unicast address
18. A special bit pattern that "blocks off " the network portion of an IPv4 address with an all-ones pattern is
known as which of the following?
a.
reverse proxy
b.
summary address
c.
broadcast address
d.
subnet mask
19. Which term is used to describe the data frame crossing a router?
a.
firewall
b.
hop
c.
loopback
d.
dot squad
20. Which technique is known as the simplest form of subnet masking in which each subnet includes the same
number of stations and represents a simple division of the address space made available by subnetting into
multiple equal segments?
a.
constant-length subnet masking
b.
firewall
c.
dot squad
d.
anycast
page-pf4
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 4
21. In IPv6, which address contains all zeros and can be represented as two colon characters (::) in normal
notation?
a.
anycast
b.
broadcast
c.
multicast
d.
unspecified
22. Which technology allows networks use multiple private IPv4 addresses internally and maps them to one or
more public IPv4 addresses externally?
a.
DNS
b.
IP gateway
c.
NAT
d.
VoIP
23. Previously, IPv6 specified that interface identifiers followed which format, which specifies a unique 64-bit
interface identifier for each interface?
a.
RFC 4941
b.
EUI-64
c.
EULA-64
d.
IEEE 802.64v6
24. Which of the following can be used to replace internal network addresses with one or more different
addresses so the traffic that actually travels over the public Internet does not reveal the address structure of the
internal network to outsiders?
a.
loopback
b.
proxy server
c.
subnet mask
d.
layer-3 switch
25. Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-
10.255.255.255), 16 Class Bs (172.16.0.0-172.31.255.255), and 256 Class Cs (192.168.0.0-192.168.255.255)?
a.
1517
b.
1518
c.
1878
d.
1918
26. Which class of IP addresses are used for multicast communications, in which a single address may be
associated with more than one network host machine?
a.
Class A
b.
Class B
c.
Class C
d.
Class D
page-pf5
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 5
Enter the appropriate word(s) to complete the statement.
27. The physical numeric address functions at a sublayer of the Data Link layer in the OSI network reference
model, called the ____________________.
28. In IPv6, _________________________ addresses are used to send an identical message to multiple hosts.
29. The activity of stealing (borrowing) bits from the host portion to further subdivide the network portion of an
address is called ____________________.
30. ____________________ combines contiguous network addresses by stealing bits from the network portion
and using them to create a single, larger contiguous address space for host addresses.
31. ____________________ informs the network interface card to pass packets sent to that address to the IP
stack so their contents can be read, and tells the IP gateway to forward such traffic onto the physical network,
where the listening network interface resides.
Match each item with a statement below.
a.
interface identifier
b.
anycast address
c.
scope identifier
d.
loopback address
e.
aggregatable global unicast address
f.
link-local address
g.
route aggregation
h.
application-specific integrated circuits
i.
Layer 3 switch
32. in IPv6 addressing, a bit string that uniquely identifies a particular interface
33. packets goes to the nearest single instance of this address
34. a 4-bit field limiting the valid range for a multicast address
35. an IPv6 address that is all zeros except for the very last bit, which is set to 1 and may be represented as ::1 in
compact notation
36. an address that can be combined with other addresses into a single entry in the router table
37. an addressing scheme that is designed to be used only on a single segment of a local network
38. a way of reducing the number of individual routing table entries that routers must manage
39. allows internetwork devices to perform complex address recognition and management functions that can
keep up with data volumes and time-sensitive processing needs
page-pf6
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 6
40. a type of networking device that combines switch, router, and network management functions within a
single box
41. Briefly discuss IPs three-part addressing scheme.
42. Why are concepts such as subnets and supernets important for TCP/IP networks?
43. List the constraints that determine the number and size of networks.
44. Briefly describe how to calculate subnet masks.
45. What are some of the design goals for IPv6?
46. Give two reasons why you should use binary boundaries.
47. What are the disadvantages of using private IP addresses?
48. How can you express native IPv6 addresses in URLs?
49. Most organizations need public IP addresses only for two classes of equipment. Briefly describe each of
these classes.
50. What are the limitations of creating a CIDR address?
page-pf7
Name:
Class:
Date:
Copyright Cengage Learning. Powered by Cognero.
Page 7
page-pf8
Name:
Class:
Date:
page-pf9
Name:
Class:
Date:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.