Which of the following three sets of IP addresses and subnet
masks are private IP addresses?
A. 10.0.0.0 255.0.0.0
B. 172.16.0.0 255.255.0.0
C. 172.16.0.0 255.240.0.0
D. 192.168.0.0 255.255.0.0
Answer / guest
Answer: A, C, and D
The IP addresses and subnet masks that are for use on
private networks are 10.0.0.0 ? Mask 255.0.0.0, 172.16.0.0
through 172.31.255.255 ? Mask 255.240.0.0, and 192.168.0.0
through 192.168.255.255 ? Mask 255.255.0.0. Usually,
networks that don?t connect to the global Internet use these
addresses. If these addresses are used in a network that
also uses a globally unique IP address or registered
address, the private addresses must be filtered with access
lists to avoid advertising them to the Internet.
| Is This Answer Correct ? | 1 Yes | 1 No |
You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address
When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False
Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25
What device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD
What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances
Match the following devices with the correct description. A. Switch 1. Operates at the physical layer and extends the cable as if it is a single cable. B. Router 2. Operates at the physical layer and connects all connections into one device or concentrator. C. Repeater 3. Operates at the network layer and can filter both hardware and network addresses. D. Hub 4. Works at the Data-Link layer and transmits a digital signal only to the specific port where the destination MAC address is located.
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
Which of the following is not true in regards to route summarization? A. It increases the size of the routing table B. It increases the complexity of the network C. IP networks must be contiguous to be safely summarized D. Routing tables must have the capacity to support classless routing
OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA