Preview

Business Data Networks and Security

Powerful Essays
Open Document
Open Document
2552 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Data Networks and Security
Business Data Networks and Security, 9e (Panko)
Chapter 9 TCP/IP Internetworking II

1) In IP subnet planning, having a large subnet part allows more hosts per subnet.
Answer: FALSE

2) When the subnet part is made larger, the host part must be smaller.
Answer: TRUE

3) If your subnet part is 8 bits long, you can have ________ subnets.
A) 64
B) 128
C) 256
D) None of the above
Answer: D

4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
A) 6
B) 7
C) 8
D) None of the above
Answer: B

5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have?
A) 8
B) 16
C) 254
D) 65,534
Answer: D

6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 14
B) 16
C) 256
D) None of the above
Answer: D

7) ________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.
A) DNS
B) NAT
C) DHCP
D) None of the above
Answer: B

8) In NAT, the ________ creates new external source IP addresses and port numbers.
A) router
B) firewall
C) source host
D) destination host
Answer: B

9) NAT operates transparently to the two hosts.
Answer: TRUE

10) NAT provides security.
Answer: TRUE

11) NAT enhances security by preventing ________.
A) sniffers from learning internal IP addresses
B) encryption
C) Both A and B
D) Neither A nor B
Answer: A

12) NAT can multiply the number of IP addresses available to the firm by over a thousand.
Answer: TRUE

13) Private IP address ranges are only used within a firm.
Answer: TRUE

14) Which of the following can be used within a firm?
A) Private IP addresses.
B) Public IP addresses.
C) Both A and B
D) Neither A nor B
Answer: C

15) Which of the following is a private IP address range?
A) 10.x.x.x.
B) 128.171.x.x.
C) Both A and B
D) Neither A nor B
Answer: A

16) Which of the

You May Also Find These Documents Helpful

  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    bits (192) creates two usable subnets, three subnet bits (224) creates 6 usable subnets, four bits (240)…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    You want to divide a class B network into 100 subnets. Which subnet mask will you use to get the most hosts on each subnet? How many hosts will be on each subnet? Explain your answer.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The scenario is I am an IT Administrator for a newly founded company and have been tasked with designing am IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth in the next 2 years.…

    • 530 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. What is seen in each of the three panes that display the packets seen on a local area network?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ipv6 Addressing

    • 309 Words
    • 2 Pages

    5. How long do you think it will take before the Ipv4 addresses are completely exhausted? Ipv4 is gone…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use the network diagram below and the additional information provided to answer the corresponding questions. [13 points]…

    • 668 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    6) The use of digital technology and the Internet to execute the major business processes in the enterprise is called:…

    • 671 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Networking - Task 3

    • 354 Words
    • 2 Pages

    Task 3: Document and analyses the network test results you obtained in task 2 above and compare them with the expected results. You should provide snips of the test results to support your answer.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    11231

    • 551 Words
    • 3 Pages

    7. Which three features are commonly supported at the distribution layer of the Cisco hierarchical network model? (Choose three.)…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Trick to ACE IP portion

    • 2810 Words
    • 17 Pages

    for all. In this paper, you will learn some of the simpler ways to figure out many of the subnetting questions…

    • 2810 Words
    • 17 Pages
    Good Essays
  • Better Essays

    The acronym subnet refers to sub - networking. This is the process of logically dividing an IP network into various divisions or sections within a network. Therefore, sub-netting is the technique and practice of dividing a network into two or more logical networks (Narten, Nordmark, Simpson & Soliman 2007). Within a subnet, all computers connected to it are identifiable by their almost identical IP addresses. The use of IP addresses is in order to identify uniquely computers in a subnet by the use of a router or network IP prefix followed by a host or rest field identifier. This IP address composition makes it easy to trace the network within which the sub network is located. Additionally, the second part helps identify the computer on the host sub network. Normally the expression of the network or routing prefix is in a CIDR notation. This is whereby it is annotated as the first address within the network, followed by the slash character, and then ending in the form of the bit - length of the IP prefix. An example of this case would be such as the IPv4 address - 192.168.10.0/24, which is a prefix of the IP address. From it, we get to know that the first IP address in the network is 192.168.10.0 and that it has 24 bits for the network prefix allocated to it. The remaining 8 bits of the 32 are reserved for the host sub network addressing. It must be noted that the network or data traffic between all sub networks of a network are channeled via routers which act as gateways, as well as the logical boundaries, between the various sub networks within the entire network (Singh, Beebee, & Nordmark 2010)..…

    • 1956 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Feb 2013. Question 1 Workstation A has been assigned an IP address of 192.0.10.24/28. Workstation B has been assigned an IP address of 192.0.10.100/28. The two workstations are connected with a straightthrough cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? (Choose two) A. Replace the straight-through cable with a crossover cable. B. Change the subnet mask of the hosts to /25. C. Change the subnet mask of the hosts to /26. D. Change the address of Workstation A to 192.0.10.15. E. Change the address of Workstation B to 192.0.10.111. Answer: A B Explanation If you remember the last post: Group 1: Router, Host, Server Group 2: Hub, Switch…

    • 2027 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Essentials to Subnetworking

    • 3284 Words
    • 14 Pages

    The benefits of subnetting vary with each deployment scenario. In the address allocation architecture of the Internet using Classless Inter-Domain Routing (CIDR) and in large organizations, it is necessary to allocate address space efficiently. It may also enhance routing efficiency, or have advantages in network management when subnetworks are administratively controlled by different entities in a larger organization. Subnets may be…

    • 3284 Words
    • 14 Pages
    Powerful Essays