Preview

chapter 1.1 review

Good Essays
Open Document
Open Document
368 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
chapter 1.1 review
Fill in the Blank:

1). The most widely used IP addressing scheme is IPv4.
2). The most recent and largest address space IP addressing scheme is IPv6.
3). To distribute IP addresses automatically, a network administrator would configure the DHCP service.
4). The first attempt at breaking up IP address space used 4 bytes to provide address ranges of different sizes.
5). Prior to introduction of the Domain Name System, computers used Host to map human-readable names to IP address.
6). A 192.68.50.20 is used to separate the host address portion of an IP address from the network.
7). The subnet mask within the TCP/IP configuration is used to distinguish the Network address from the host address.
8). In dotted-decimal notation, each IPv4 address is broken up into four Octets.
9). Server computer and other systems that need to be accessed reliably by network clients should be configured with a Static IP.
10). The method of breaking up IP address space into address ranges of flexible size is called CIDR.

Multiple Choice:

1). What must each host on a TCP/IP network be configured with in order to communicate with other hosts? C. IP Address
2). What is the process of transmitting TCP/IP traffic from one IP subnet to another? B. Routing
3). An IP network that is formatted such as 192.168.1.1/24 id referred to as what type of notation? A. CIDR notation
4). What is the default network protocol of the internet and most modern corporate networks?
D. TCP/IP
5). What was used by TCP/IP networks to perform anem resolution prior to introduction of the domain name system? A. HOSTS files
6). What is the process of dividing a large TCP/IP address space into multiple smaller network is called? C. Subnetting
7). What technology is used by private network ranges that has extended the useful life of IPv4 addressing and slowed the adoption rate of IPv6? B. NAT
8). Which TCP/IP configuration item allows client computers to communicate with other computers that are

You May Also Find These Documents Helpful

Related Topics