Você está na página 1de 18

Who invented the Internet Protocol?

Correct!

In a research paper published in 1974, Vinton Cerf and Robert Kahn proposed a protocol
they called "TCP". Cerf and Kahn didn't realize it at the time, but the protocol they invented
would later become IP, the official network-layer protocol of the Internet

2. What is the size of today's standard (IPv4) IP address?

a) 4 bytes (32 bits) b) 12 bytes (96 bits)

c) 15 bytes (120 bits) d) 16 bytes (128 bits)

Correct!

An IPv4 address contains 4 bytes (32 bits). IP addresses are usually written in dotted-
decimal notation where a period (.) separates each byte (for example, 10.0.0.255). With
32 bits, a total of 4,294,967,296 IPv4 addresses are possible.

3. What is the size of the next-generation (IPv6) IP address?

a) 4 bytes (32 bits) b) 12 bytes (96 bits)

c) 15 bytes (120 bits) d) 16 bytes (128 bits)

Correct!

An IPv6 address contains 16 bytes (128 bits). IPv6 addresses are written in a hexadecimal
format. The eight, two-byte segments of the address are separated by colons (:). For
example - E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420

4. What Open Systems Interconnection (OSI) layer does IP


belong to?

a) session b) transport

c) network d) data link


Correct!

IP belongs to the network layer of the OSI model.

5. Which of the following higher-level protocols runs over IP?

a) FTP b) HTTP

c) SMTP d) All of the above

Correct!

File Transfer (FTP), Hypertext Transfer Protocol (HTTP), Simple Mail Transport Protocol
(SMTP), and many other popular protocols run at higher levels of the OSI model, utilizing IP
as their foundation

6. Which of the following IPv4 addresses is the loopback


address?

a) 0.0.0.0 b) 10.0.0.1

c) 127.0.0.1 d) 255.255.255.255

Correct!

By convention, 127.0.0.1 is the loopback address in IP. Packets sent to this address do
not actually travel onto the network, they automatically get routed to a receive queue on
the local device. The loopback address is useful for testing network software when a
working network connection is not present.

7. Which of the following IPv6 addresses is the loopback


address?

a) 0::0 b) 0::1

c) 127::0 d) 127::1

Correct!
The IPv6 address 0:0:0:0:0:0:0:1, written in shorthand notation as 0::1, is the loopback
address in IPv6, equivalent to 127.0.0.1 in the IPv4 scheme.

8. The length of an IP datagram header can vary depending


on the options used. What is the smallest possible IP header
size?

a) 16 bytes b) 20 bytes

c) 24 bytes d) 60 bytes

Correct!

An IP header is usually 20 bytes in length, and this is its minimum size. The size of the
header can vary, however, if a special options flag is used to send additional information
such as a time stamp. An IP header can be as large as 60 bytes.

9. The source IP address for an IPv4 datagram is stored


where in the header?

a) 2nd longword (bytes 5-8) b) 3rd longword (bytes 9-12)

c) 4th longword (bytes 13-16) d) 5th longword (bytes 17-20)

Correct!

The full 32-bit IP address for a datagram's source device is always stored in the 4th
longword (bytes 13-16) of an IP header. A longword in TCP/IP networking is a 4-byte
quantity aligned on a 32-bit boundary.

10. The destination IP address for an IPv4 datagram is stored


where in the header?

a) 2nd longword (bytes 5-8) b) 3rd longword (bytes 9-12)

c) 4th longword (bytes 13-16) d) 5th longword (bytes 17-20)

Correct!
The full 32-bit IP address for a datagram's destination is always stored in the 5th
longword (bytes 17-20) of an IP header.

11. The header length field in an IPv4 datagram contains the


size of an IP header measured in number of -

a) bits b) bytes

c) longwords d) none of the above

Correct!

The length of an IP datagram header is technically measured in longwords. The header


length field is 4 bits long and, along with the protocol version number, makes up the first
byte of an IP header. In a normal 20-byte long IP header, the header length field therefore
normally contains the value '5' (0x1001).

12. The datagram length field in an IPv4 datagram contains


which numeric value?

a) total number of bytes in the b) total number of bytes in the


datagram, including the header datagram, excluding the header

c) total number of longwords in d) total number of longwords in


the datagram, including the the datagram, excluding the
header header

Correct! a

The length of an IP datagram itself is technically measured in bytes. The length field
represents the size of both the header and the data portions of the datagram.

13. The maximum size of an IP datagram (including the


header) is -

a) 1,024 bytes b) 1,500 bytes

c) 4,096 bytes d) 65,535 bytes


Correct!

The datagram length field in an IP header is 16 bits in length. Therefore, the maximum
datagram size an IP datagram can support is 2^16 - 1 = 65,535 bytes

14. Can IP run over any other physical networks besides


Ethernet?

a) No (and IP does not run over Ethernet) b) No

c) Yes (but IP does not run over Ethernet) d) Yes

Correct!

IP runs over Ethernet and several other hardware interfaces including ATM.

15. What function does Address Resolution Protocol (ARP)


perform?

a) converts IP addresses to b) automatically assigns IP


Ethernet addresses addresses to computers

c) prevents two computers from d) none of the above


using the same IP address

Correct!

Address Resolution Protocol (ARP) converts IP addresses to Media Access Control (MAC)
addresses. ARP is usually implemented in the operating system network device driver.

16. What mechanism does ARP use to resolve IP addresses?

a) mathematical formula b) lookup table

c) central Web site d) random number generator

Correct!
The ARP cache of IP address to MAC address mappings functions as a lookup table.

17. Which utility program is designed to report whether a


networked computer is responding at a given IP address, and
how long these responses take?

a) traceroute b) ping

c) ttcp d) netstat

Correct!

The ping utility sends network packets using a special protocol to determine the
responsiveness of remote addresses.

18. Which of these shell commands supplies the IP address of


a computer running the Windows operating system?

a) ipshow b) traceroute

c) iplookup d) ipconfig (or winipcfg)

Correct!

The ipconfig command displays the IP address, network mask, and gateway address for
each adapter. It can also be used to release and renew address settings, such as those
made through DHCP.

19. Which of these shell commands supplies the IP address of


a computer running the Linux operating system?

a) ipconfig b) ifconfig

c) linuxconf d) none of the above

Correct!

The ifconfig command can be used to display and change IP settings for all network
adapters on a Linux system.
20. Each of the four numeric fields of an IP address written in
dotted-decimal notation is also known as -

a) octet b) word

c) subnet d) class

Correct!

Each of the four bytes of an IP address is also known as an octet.

21. What are the smallest and largest possible values for an
IP octet?

a) 0 and 255 b) 0 and 256

c) 0 and 512 d) 0 and 999

Correct!

Each octet of an IP address ranges in value from 0 to 255. Although not all octets are byte-
long quantities, IP octets are always 8 bits in length, and each bit can be set to either 0 or
1.

22. Which of the following IP address ranges are considered


part of the Class A network?

a) 0.0.0.0 - 126.255.255.255 b) 1.0.0.0 - 127.255.255.255

c) 1.0.0.0 - 126.255.255.255 d) 0.0.0.0 - 127.255.255.255

Correct!

Technically, the Class A address range runs from IP address 1.0.0.0 through address
126.255.255.255. By rule, the 0.x.x.x network is reserved, and 127.x.x.x is considered the
broadcast network and also unavailable for general-purpose uses.

23. Which of the following IP address ranges are considered


part of the Class B network?

a) 128.0.0.0 - 159.255.255.255 b) 128.0.0.0 - 175.255.255.255

c) 128.0.0.0 - 191.255.255.255 d) 128.0.0.0 - 207.255.255.255

Correct!

In a Class B network, the first three bits of the first octet are set to '110'. Therefore, the
Class B range includes 128.0.0.0 through 191.255.255.255.

24. Which of the following IP address ranges are considered


part of the Class C network?

a) 192.0.0.0 - 223.255.255.255 b) 192.0.0.0 - 219.255.255.255

c) 192.0.0.0 - 215.255.255.255 d) 192.0.0.0 - 211.255.255.255

Correct!

The Class C network range includes 192.0.0.0 through 223.255.255.255. This is the range
of addresses most commonly used on the Internet today.

25. The Class D network range is reserved on the Internet for


-

a) broadcast b) multicast

c) anycast d) none of the above

Correct!

The Class D address range, from 224.0.0.0 through 239.255.255.255, is reserved on the
Internet for multicast. Multicast is the ability to define an arbitrary group of IP nodes and
address messages just to that collective rather than broadcast to all nodes on the network
or send point-to-point to each node individually.

The Class E address range, from 240.0.0.0 through 255.255.255.255 is reserved on the
Internet and not to be used for any purpose.
26. In IPv6, the anycast feature allows -

a) senders to address packets b) senders to address to packets to


to all nodes in a group any member of a group of nodes

c) receivers to listen for any d) receivers to announce their


given packet on the network presence to potential senders

Correct! b

Anycast is a feature of Internet Protocol new in IPv6. Anycast allows senders to direct
messages to a node group with the expectation that any single arbitrary node in the group
can receive and act on the message. Anycast is similar to load balancing and other
redundancy concepts implemented elsewhere in communications architectures. Anycast can
be used to implement broadcasts, but anycast is a more generalized concept.

27. Which of the following IP address ranges are reserved for


use on private networks?

a) 10.0.0.0 - 10.255.255.255 b) 172.16.0.0 - 172.31.255.255

c) 192.168.0.0 - 192.168.255.255 d) all of the above

Correct!

10.0.0.0 - 10.255.255.255 is the private network range within Class A, 172.16.0.0 -


172.31.255.255 in Class B, and 192.168.0.0 - 192.168.255.255 in Class C.

28. Which of the following technologies manage the


conversion between IP addresses and host names?

a) WINS b) DNS

c) NIS d) all of the above

Correct!

Domain Name System (DNS), Windows Internet Naming Service (WINS), and Network
Information System (NIS) each support a form of name-adddress mapping on computer
networks. WINS was designed for Microsoft Windows networks and NIS was designed for
Unix networks. DNS supports overall name resolution and mapping on the Internet.
29. In DNS, requests to obtain the IP address of a given host
name are issued by -

a) servers b) translators

c) resolvers d) none of the above

Correct!

DNS resolvers issue host name/address conversion requests. Resolvers effectively work
like clients, issuing requests to and within the hierarchy of DNS servers.

30. The default network mask for Class C IP addresses is -

a) 255.0.0.0 b) 255.255.0.0

c) 255.255.255.0 d) 255.255.255.255

Correct!

The default network mask for Class A networks is 255.0.0.0, for Class B networks
255.255.0.0, for Class C networks 255.255.255.0

31. A traditional Class C network can handle a maximum of


how many hosts?

a) 254 b) 258

c) 510 d) 512

Correct! a

Using the default network mask 255.255.255.0, eight bits remain for host addressing. A
total of 256 possible addresses can fit within the lower eight bits. However, traditional IP
prohibits a host being assigned the all-zeros (.0) and all-ones (.255) host address, so
network administrators configure no more than 254 hosts on a typical Class C network.

32. CIDR stands for -


a) Class-Based Internet Domain b) Careful Inter-Domain
Routing Routing

c) Constant Internet Domain Routing d) Classless Inter-Domain


Routing

Correct!

CIDR stands for Classless Inter-Domain Routing. CIDR was developed in the 1990s as a
standard scheme for routing IP addresses. Full story.

33. In CIDR notation, which of the following Class C networks


contains host 192.168.14.2?

a) 192.168.10.0/22 b) 192.168.11.0/21

c) 192.168.12.0/23 d) 192.168.13.0/24

Correct!

CIDR notation uses the format xxx.xxx.xxx.xxx/n, where 'n' is the number of '1' bits in the
network mask. This means the network 192.168.11.0/21 actually contains all addresses in
the range 192.168.8.0 - 192.168.15.255. Conversely,

• the network 192.168.10.0/22 only contains addresses in the range 192.168.8.0 -


192.168.11.255
• the network 192.168.12.0/23 only contains addresses in the range 192.168.12.0 -
192.168.13.255, and
• the network 192.168.13.0/24 only contains addresses in the range 192.168.13.0 -
192.168.13.255.

34. In CIDR notation, which of the following Class A networks


contains host 10.1.7.129?

a) 10.1.6.0/24 b) 10.1.5.0/23

c) 10.1.4.0/22 d) 10.1.8.0/21

Correct!
Using CIDR notation, the network 10.1.4.0/22 actually contains all addresses in the range
10.1.4.0 - 10.1.7.255. Conversely,

• the network 10.1.6.0/24 only contains addresses in the range 10.1.6.0 -


10.1.6.255
• the network 10.1.5.0/23 only contains addresses in the range 10.1.4.0 -
10.1.5.255, and
• the network 10.1.8.0/21 only contains addresses in the range 10.1.8.0 -
10.1.15.255.

35. In CIDR notation, which of the following Class B networks


contains host 172.18.1.1?

a) 172.11.0.0/12 b) 172.15.0.0/12

c) 172.22.0.0/13 d) 172.26.0.0/13

Correct!

Using CIDR notation, the network 172.22.0.0/13 actually contains all addresses in the
range 172.16.0.0 - 172.23.255.255. Conversely,

36. How does CIDR benefit the Internet?

a) frees up more IP address space b) allows a single IP address to


be used by multiple hosts

c) maintains backward compatibility d) All of the above


with old IP routing protocols

Correct! a

CIDR frees up additional IP address space on the Internet by allowing supernetting.


Subnetting with CIDR allows, for example, networks larger than Class C (256 nodes) but
smaller than Class B (65,536 nodes) to be allocated. Increased granularity minimizes waste.
CIDR was not a part of the original Internet Protocol but was added during the 1990s. To
make CIDR work, modifications to several popular routing protocols were required. CIDR
has nothing to do with Network Address Translation (NAT), another technology that saves
public IP address space by managing a mapping of multiple private IP addresses to one
public one.
37. Which central authority is responsible for allocating IP
addresses on the Internet?

a) IETF b) IANA

c) IEEE d) none of the above

Correct!

The Internet Assigned Numbers Authority (IANA) centrally coordinates the use of IPv4
address space on the Internet. Full story

38. Which Request For Comments (RFC) documentation


describes the Internet Protocol?

a) RFC 1 b) RFC 768 and RFC 1157

c) RFC 761 d) RFC 760 and RFC 791

Correct!

The first RFC for Internet Protocol, RFC 760, was published in January 1980. RFC 791,
published in September 1981, superceded the original document. Full story

39. Computers configured with more than one IP address are


often called

a) routers b) bridges

c) multi-homed d) internetworked

Correct!

A multi-homed device contains multiple network adapters. Multi-homed computers are


often used as proxy servers, firewalls, and other types of gateways. A proxy server often
has one adapter with an external Web address (asssigned by an ISP) and another adapter
to use a private intranet address (such as 192.168.0.1).
Some Web servers like Apache support a feature called virtual hosting. Virtual hosting
allows a computer to act as if it possesses multiple IP addresses. Virtual hosting is not the
same as multi-homing, that refers to multiple network interfaces of a device.

40. The IP checksum feature supports integrity checking for -

a) an IP packet (header and b) an IP header only


payload)

c) an IP payload only d) none of the above - IP doesn't use


checksums

Correct!

By itself, IP only supports checksums on the header. TCP adds its own, separate checksum
to packets in addition to the IP checksum.

41. The IP delivery service is -

a) reliable, connection-oriented b) non-routable

c) unreliable, connectionless d) none of the above

Correct! The IP protocol is routable but connectionless. This means IP provides no


support for a sender to establish a connection with a receiver other before communicating.
Instead, IP (and UDP) simply transmit packets and assume that the destination application
will be listening on the appropriate port to receive them. TCP adds connection semantics on
top of IP.

You have successfully completed the IP portion of this exam. Congratulations!

TCP stands for -

Top of Form
Transmission Control Protocol

Trivial Connection Protocol

Telephony Connection Protocol

Traffic Control Protocol

Bottom of Form

udp

tcp and udp belongs tp transport layer

Both TCP and UDP are transport protocols, belonging to the Transport Layer of the OSI
model. Both TCP and UDP run on top of IP, that operates at the Network layer.

FTP (reliable file transfer), HTTP (Web page or general hypertext data transfer), and SMTP
(email delivery) each add application-level semantics on top of TCP.

Though it could use TCP, Domain Name System (DNS) typically runs on top of UDP as a
means to improve performance of distributed name resolution.

UDP offers which of the following benefits relative to TCP?


Top of Form

UDP consumes fewer computer resources by not maintaining connection state

UDP supports a self-regulating "throttle" feature that prevents network saturation


UDP guarantees that individual packets of a transmission will arrive "in order"

none of the above

Bottom of Form

Very good, you chose the correct answer for Question 6 - a


As a connectionless protocol, UDP does not incorporate any connection establishment,
teardown, or maintenance logic. For example, a server supporting a UDP application with
multiple simultaneous clients will need to allocate less memory to support these clients than
would the corresponding TCP application server. Bandwidth throttling and in-order delivery
features are properties of TCP, not UDP.

TCP offers which of the following benefits relative to UDP?


Top of Form

TCP allows much larger packets to be sent over the network, improving application
performance

TCP includes a "retry" mechanism to prevent missing (dropped) packets

TCP uses a smaller header than does UDP

none of the above

Bottom of Form

Very good, you chose the correct answer for Question 7 - b


TCP prevents dropped packets through a retry mechanism. TCP acknowledges received
packets by sending a message back to the sender, and if this message is not received within
a certain window of time, TCP automatically resends the missing packet. However, TCP
generally does not support packets much larger than those supported by UDP, and TCP
actually utilizes a larger header than does UDP.

Question 8
The size of a UDP header is -
Top of Form

2 bytes

4 bytes

8 bytes

16 bytes

Bottom of Form

Very good, you chose the correct answer for Question 8 -


UDP headers are 8 bytes long. UDP headers contain the following four fields that each
contain two bytes: 1) source port number, 2) destination port number, 3) length of data
portion, and 4) UDP checksum.

The size of a TCP header is -


Top of Form
2 bytes

20 bytes

8 bytes

16 bytes

Very good, you chose the correct answer for Question 9 -


TCP headers are 20 bytes long. TCP headers include source and destination port numbers,
sequence and acknowledge numbers, and the TCP checksum.

Você também pode gostar