Preview

Business Data Networks and Security

Powerful Essays
Open Document
Open Document
2552 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Data Networks and Security
Business Data Networks and Security, 9e (Panko)
Chapter 9 TCP/IP Internetworking II

1) In IP subnet planning, having a large subnet part allows more hosts per subnet.
Answer: FALSE

2) When the subnet part is made larger, the host part must be smaller.
Answer: TRUE

3) If your subnet part is 8 bits long, you can have ________ subnets.
A) 64
B) 128
C) 256
D) None of the above
Answer: D

4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
A) 6
B) 7
C) 8
D) None of the above
Answer: B

5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have?
A) 8
B) 16
C) 254
D) 65,534
Answer: D

6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 14
B) 16
C) 256
D) None of the above
Answer: D

7) ________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.
A) DNS
B) NAT
C) DHCP
D) None of the above
Answer: B

8) In NAT, the ________ creates new external source IP addresses and port numbers.
A) router
B) firewall
C) source host
D) destination host
Answer: B

9) NAT operates transparently to the two hosts.
Answer: TRUE

10) NAT provides security.
Answer: TRUE

11) NAT enhances security by preventing ________.
A) sniffers from learning internal IP addresses
B) encryption
C) Both A and B
D) Neither A nor B
Answer: A

12) NAT can multiply the number of IP addresses available to the firm by over a thousand.
Answer: TRUE

13) Private IP address ranges are only used within a firm.
Answer: TRUE

14) Which of the following can be used within a firm?
A) Private IP addresses.
B) Public IP addresses.
C) Both A and B
D) Neither A nor B
Answer: C

15) Which of the following is a private IP address range?
A) 10.x.x.x.
B) 128.171.x.x.
C) Both A and B
D) Neither A nor B
Answer: A

16) Which of the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1. Research the following organizations and explain their involvement with the internet public IP addresses.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Theres 4 bits for hosts and 4 for network numbers. Each set = 16 then just subtract one address for the network number and broadcast number for the hosts per.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The scenario is I am an IT Administrator for a newly founded company and have been tasked with designing am IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth in the next 2 years.…

    • 530 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Ipv6 Addressing

    • 309 Words
    • 2 Pages

    5. How long do you think it will take before the Ipv4 addresses are completely exhausted? Ipv4 is gone…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. What is seen in each of the three panes that display the packets seen on a local area network?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use the network diagram below and the additional information provided to answer the corresponding questions. [13 points]…

    • 668 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    6) The use of digital technology and the Internet to execute the major business processes in the enterprise is called:…

    • 671 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    11231

    • 551 Words
    • 3 Pages

    7. Which three features are commonly supported at the distribution layer of the Cisco hierarchical network model? (Choose three.)…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Trick to ACE IP portion

    • 2810 Words
    • 17 Pages

    subnetting concepts elsewhere. This white paper does not teach subnetting, it teaches useful methods for…

    • 2810 Words
    • 17 Pages
    Good Essays
  • Better Essays

    The acronym subnet refers to sub - networking. This is the process of logically dividing an IP network into various divisions or sections within a network. Therefore, sub-netting is the technique and practice of dividing a network into two or more logical networks (Narten, Nordmark, Simpson & Soliman 2007). Within a subnet, all computers connected to it are identifiable by their almost identical IP addresses. The use of IP addresses is in order to identify uniquely computers in a subnet by the use of a router or network IP prefix followed by a host or rest field identifier. This IP address composition makes it easy to trace the network within which the sub network is located. Additionally, the second part helps identify the computer on the host sub network. Normally the expression of the network or routing prefix is in a CIDR notation. This is whereby it is annotated as the first address within the network, followed by the slash character, and then ending in the form of the bit - length of the IP prefix. An example of this case would be such as the IPv4 address - 192.168.10.0/24, which is a prefix of the IP address. From it, we get to know that the first IP address in the network is 192.168.10.0 and that it has 24 bits for the network prefix allocated to it. The remaining 8 bits of the 32 are reserved for the host sub network addressing. It must be noted that the network or data traffic between all sub networks of a network are channeled via routers which act as gateways, as well as the logical boundaries, between the various sub networks within the entire network (Singh, Beebee, & Nordmark 2010)..…

    • 1956 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Feb 2013. Question 1 Workstation A has been assigned an IP address of 192.0.10.24/28. Workstation B has been assigned an IP address of 192.0.10.100/28. The two workstations are connected with a straightthrough cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? (Choose two) A. Replace the straight-through cable with a crossover cable. B. Change the subnet mask of the hosts to /25. C. Change the subnet mask of the hosts to /26. D. Change the address of Workstation A to 192.0.10.15. E. Change the address of Workstation B to 192.0.10.111. Answer: A B Explanation If you remember the last post: Group 1: Router, Host, Server Group 2: Hub, Switch…

    • 2027 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Essentials to Subnetworking

    • 3284 Words
    • 14 Pages

    All computers that belong to a subnet are addressed with a common, identical, most-significant bit-group in their IP address. This results in the logical division of an IP address into two fields, a network or routing prefix and the rest field or host identifier. The rest field is an identifier for a specific host or network interface.…

    • 3284 Words
    • 14 Pages
    Powerful Essays