Preview

chapter 1.1 review

Good Essays
Open Document
Open Document
368 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
chapter 1.1 review
Fill in the Blank:

1). The most widely used IP addressing scheme is IPv4.
2). The most recent and largest address space IP addressing scheme is IPv6.
3). To distribute IP addresses automatically, a network administrator would configure the DHCP service.
4). The first attempt at breaking up IP address space used 4 bytes to provide address ranges of different sizes.
5). Prior to introduction of the Domain Name System, computers used Host to map human-readable names to IP address.
6). A 192.68.50.20 is used to separate the host address portion of an IP address from the network.
7). The subnet mask within the TCP/IP configuration is used to distinguish the Network address from the host address.
8). In dotted-decimal notation, each IPv4 address is broken up into four Octets.
9). Server computer and other systems that need to be accessed reliably by network clients should be configured with a Static IP.
10). The method of breaking up IP address space into address ranges of flexible size is called CIDR.

Multiple Choice:

1). What must each host on a TCP/IP network be configured with in order to communicate with other hosts? C. IP Address
2). What is the process of transmitting TCP/IP traffic from one IP subnet to another? B. Routing
3). An IP network that is formatted such as 192.168.1.1/24 id referred to as what type of notation? A. CIDR notation
4). What is the default network protocol of the internet and most modern corporate networks?
D. TCP/IP
5). What was used by TCP/IP networks to perform anem resolution prior to introduction of the domain name system? A. HOSTS files
6). What is the process of dividing a large TCP/IP address space into multiple smaller network is called? C. Subnetting
7). What technology is used by private network ranges that has extended the useful life of IPv4 addressing and slowed the adoption rate of IPv6? B. NAT
8). Which TCP/IP configuration item allows client computers to communicate with other computers that are

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1430 U2G1

    • 433 Words
    • 2 Pages

    2. Defines the size of the host part of the addresses in the subnet. is an identifiably separate part of an organization's network.…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the Lab manual,…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Theres 4 bits for hosts and 4 for network numbers. Each set = 16 then just subtract one address for the network number and broadcast number for the hosts per.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1. Which of the following is true about a TCP/IP network? The network uses standards defined in TCP/IP RFC's plus other standards.…

    • 1038 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2640 U3 A1

    • 292 Words
    • 2 Pages

    As part of your assigned readings and material covered in your class lecture, you have learned about IP subnetting including the math involved. For this assignment, you will answer questions relating to IP subnetting.…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Research the following organizations and explain their involvement with the Internet public IP addresses…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Good Essays

    6.) A program to run/see if Windows 7 is compatible with an upgrade is called?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    3. The process of HTTP asking TCP to send some data and make sure that it is received correctly is an example of what?…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Unit 9 Assg 1

    • 2071 Words
    • 7 Pages

    1. IP hosts in two different company TCP/IP networks send IP packets to each other through the…

    • 2071 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 1210

    • 401 Words
    • 2 Pages

    IP Routing – The process of forwarding an IP packet from end to end through a TCP/ICP network, as well as the logic used on an individual host or router as its part of the forwarding of the packet to its end destination.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ccna

    • 2689 Words
    • 11 Pages

    2. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?…

    • 2689 Words
    • 11 Pages
    Powerful Essays

Related Topics