Internet Control Message Protocol – Ch5 | Test Bank – 4e - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.

Internet Control Message Protocol – Ch5 | Test Bank – 4e

View Product website:

https://selldocx.com/docx/internet-control-message-protocol-ch5-test-bank-4e-1323

Chapter 2: IP Addressing and Related Topics

Student: ___________________________________________________________________________

1. IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. 
True    False

 

2. As a frame moves from interface to interface, the IP source and destination address information is preserved. 
True    False

 

3. Class D addresses always take the following binary form: bbbbbbbb.11111111.11111111.11111111. 
True    False

 

4. When a host uses a service that employs a multicast address, it registers itself to “listen” on that address, as well as on its own unique host address (and the broadcast address). 
True    False

 

5. Providing a narrower address space is the primary design goal for IPv6. 
True    False

 

6. To be valid, any domain name must correspond to at least one unique ____. 
A. loopback address
B. numeric IP address
C. firewall
D. IP gateway

 

7. The ____ address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers. 
A. symbolic
B. logical numeric
C. reverse proxy
D. physical numeric

 

8. ____ is used to permit computers to translate numeric IP addresses to MAC layer addresses. 
A. ARP
B. RARP
C. Reverse proxying
D. Subnet masking

 

 ____ is used to translate MAC layer addresses into numeric IP addresses. 
A. ARP
B. RARP
C. Reverse proxying
D. Subnet masking

 

 The term ____ is used to describe the data frame crossing a router. 
A. firewall
B. hop
C. loopback
D. dot squad

 

 ____ addresses are used for multicast communications, in which a single address may be associated with more than one network host machine. 
A. Class A
B. Class B
C. Class C
D. Class D

 

 A ____ represents a network address that all hosts on a network must read. 
A. loopback
B. hop
C. broadcast address
D. dot squad

 

 A ____ is a special bit pattern that “blocks off ” the network portion of an IPv4 address with an all-ones pattern. 
A. reverse proxy
B. summary address
C. broadcast address
D. subnet mask

 

 A(n) ____ is a device that interconnects multiple IP networks or subnets. 
A. subnet mask
B. IP gateway
C. layer-3 switch
D. network address

 

 When a computer on one subnet wishes to communicate with a computer on another subnet, traffic must be forwarded from the sender to a nearby ____ to send the message on its way from one subnet to another. 
A. broadcast address
B. IP gateway
C. subnet mask
D. proxy server

 

 The simplest form of subnet masking uses a technique called ____, in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments. 
A. constant-length subnet masking
B. firewall
C. dot squad
D. anycast

 

 One form of subnet masking uses a technique called ____ and permits a single address to be subdivided into multiple subnets, in which subnets need not all be the same size. 
A. IP gateway
B. constant-length subnet masking
C. variable-length subnet masking
D. IP renumbering

 

 ____ gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses and can therefore set the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces. 
A. Route aggregation
B. Address masquerading
C. NAT
D. Classless Inter-Domain Routing

 

 ____ allows IPv4 addresses from Class A, B, or C to be combined and treated as a larger address space, or subdivided arbitrarily, as needed. 
A. Supernetting
B. Classless Inter-Domain Routing
C. Subnet masking
D. Address masquerading

 

 ____ may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server. 
A. IP renumbering
B. Supernetting
C. Address masquerading
D. Subnetting

 

 One of the most important services that a ____ provides is to manage what source addresses appear in outbound packets that pass through it. 
A. loopback
B. proxy server
C. subnet mask
D. layer-3 switch

 

 RFC ____ reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0–10.255.255.255), 16 Class Bs (172.16.0.0–172.31.255.255), and 256 Class Cs (192.168.0.0–192.168.255.255). 
A. 1517
B. 1518
C. 1878
D. 1918

 

 ____ lets networks use multiple private IPv4 addresses internally and maps them to one or more public IPv4 addresses externally. 
A. DNS
B. IP gateway
C. NAT
D. VoIP

 

 Multicast addresses in IPv6 use a(n) ____ to define the portion of the Internet to which the multicast group pertains. 
A. scope identifier
B. interface identifier
C. loopback identifier
D. aggregatable global unicast address

 

 Previously, IPv6 specified that interface identifiers followed the modified ____ format, which specifies a unique 64-bit interface identifier for each interface. 
A. RFC 4941
B. EUI-64
C. EULA-64
D. IEEE 802.64v6

 

 In IPv6, the ____ address is all zeroes and can be represented as two colon characters (::) in normal notation. 
A. anycast
B. broadcast
C. multicast
D. unspecified

 

 The physical numeric address functions at a sublayer of the Data Link layer in the OSI network reference model, called the ____________________. 
________________________________________

 

 ____________________ informs the network interface card to pass packets sent to that address to the IP stack so their contents can be read, and tells the IP gateway to forward such traffic onto the physical network, where the listening network interface resides. 
________________________________________

 

 The activity of stealing (borrowing) bits from the host portion to further subdivide the network portion of an address is called ____________________. 
________________________________________

 

 ____________________ combines contiguous network addresses by stealing bits from the network portion and using them to create a single, larger contiguous address space for host addresses. 
________________________________________

 

 In IPv6, _________________________ addresses are used to send an identical message to multiple hosts. 
________________________________________

 

 Match each item with a statement below. 

 

 Briefly discuss IPs three-part addressing scheme. 


 


 


 


 

 

 Why are concepts such as subnets and supernets important for TCP/IP networks? 


 


 


 


 

 

 Briefly describe how to calculate subnet masks. 


 


 


 


 

 

 What are the limitations of creating a CIDR address? 


 


 


 


 

 

 What are the disadvantages of using private IP addresses? 


 


 


 


 

 

 Most organizations need public IP addresses only for two classes of equipment. Briefly describe each of these classes. 


 


 


 


 

 

 List the constraints that determine the number and size of networks. 


 


 


 


 

 

 Give two reasons why you should use binary boundaries. 


 


 


 


 

 

 What are some of the design goals for IPv6? 


 


 


 


 

 

 How can you express native IPv6 addresses in URLs? 


 


 


 


 

 

Chapter 2: IP Addressing and Related Topics

Document Information

Document Type:
DOCX
Chapter Number:
5
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 5 Internet Control Message Protocol
Author:
Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Connected Book

Test Bank | Guide to TCPIP 4e by Jeffrey Carrell

By Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party