CCNA Semester 1 - Chapter 6B
  • 1. The subnet mask for 172.16.20.35/27 is:
A) 224.0.255.255
B) 255.255.255.224
C) 255.255.224.255
D) 255.255.0.224
  • 2. To expand a network, new subnets are created by borrowing ________ bits.
A) server
B) user
C) host
D) domain
  • 3. The formula to calculate the number of subnets is: 2 to the power of X, where X is the number of ________ ________.
A) bits borrowed
B) super hosts
C) bits given
D) super domains
  • 4. The formula to calculate the number of hosts is: (2 to the power of X) -2, where X is the number of bits _______ ___ _________.
A) left for the network
B) left for the domain
C) left for the server
D) left for hosts
  • 5. The first step in subnetting is to determine the needed number of:
A) users
B) addresses
C) domains
D) networks
  • 6. Subnets (L 6.5.3) also can be subnetted using VLSM or Variable Length Subnet ___________.
A) mark
B) map
C) match
D) mask
  • 7. Standard subnetting, or subnetting based on the number of networks, oftentimes results in the wastes of unused host ______________.
A) gateways
B) addresses
C) servers
D) routers
  • 8. In the field, to prevent wasting addressing, subnetting is usually done not by networks but by ______________.
A) gateways
B) servers
C) routers
D) hosts
  • 9. If the range of a network is 10.0.0.1 to 10.0.0.63, the network ID is most likely:
A) 10.0.0.255
B) 10.0.0.64
C) 10.0.0.0
D) 10.0.0.1
  • 10. If the range of a network is 10.0.0.1 to 10.0.0.63, the broadcast address is most likely:
A) 10.0.0.64
B) 10.0.0.0
C) 10.0.0.255
D) 10.0.0.1
  • 11. The ANDing process is used to verify the ___________ address of a host.
A) domain
B) gateway
C) router
D) network
  • 12. The Ping utility is for testing IP connectivity between ___________.
A) servers
B) hosts
C) routers
D) users
  • 13. The Layer 3 protocol used by the PING utility to send out requests for responses is:
A) IMAP
B) IPOP
C) ICMP
D) ISMTP
  • 14. Using the PING utility with the local loopback address, 127.0.0.1, helps us determine if _________ is properly installed on the host.
A) ICMP
B) TCP/IP
C) POP3
D) Appletalk
  • 15. The Traceroute utility is executed on a host by using the _________ command.
A) ipconfig /tracert
B) tracker
C) ipconfig /traceroute
D) tracert
  • 16. The traceroute utility allows us to observe the path taken by a packet between two ________.
A) users
B) servers
C) domains
D) hosts
  • 17. The TTL field of the traceroute utility limits the number of ________ that a packet can cross.
A) servers
B) hops
C) switches
D) gateways
  • 18. Servers, network printers, and routers are always recommended to have _____________ IP addresses.
A) domain
B) dynamic
C) server
D) static
  • 19. The main reason IPv6 was implemented was for:
A) larger servers
B) faster networks
C) expanded addressing
D) cheaper prices
  • 20. An ICMP packet is sent with a TTL of 2, but the router is over 2 hops away, the packet will most likely be dropped and the host will receive a _______ ____________ message.
A) time exceeded
B) time for extra request
C) need more time
D) need more hops
  • 21. An IPv4 address is made up of _____ bits.
A) 32
B) 4
C) 16
D) 128
  • 22. If NAT is active on a router, the private addresses within that LAN will be ____________ from public internet.
A) broadcasted
B) forwarded
C) routed
D) blocked
Students who took this test also took :

Created with That Quiz — a math test site for students of all grade levels.