• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back
Define subnetting.
Separates a network into multiple logically define segments, or subnets.
What are 3 reasons why a Network Administrator might subnet a network?
1. Enhanced Security
2. Improved Performance
3. Simply Troubleshooting
Default for a Class A network
255.0.0.0.
Default for a Class B network
255.255.0.0
Default for a Class C network
255.255.255.0
Formula for determining how to modify a default subnet mask.
2n-2=y

Where n equals the number of bits in the subnet mask that must be switched from 1 to 0. Y equals the number of subnets that result.
What does CIDR stand for?
Classless Interdomain Routing. AKA classless routing or supernetting.
How is a supernet created?
A subnet created by moving the subnet boundary to the left.
Define default gateway.
The gateway that first interprets a device's outbound request, and then interpret its inbound request to and from other subnets.
Class A network IP range?
0.0.0.0 to 127.255.255.255
Class B network IP range?
128.0.0.0 to 191.255.255.255
Class C network IP range?
192.0.0.0 to 223.255.255.255
Convert the following subnet mask into its dotted-decimal equivalent: 11111111 11111111 11111000 00000000.
255.255.248.0
A node on a network has an IP address of 140.133.28.72 and its subnet mask is 255.248.0.0. What type of subnetting has been used on this network
Supernetting
On a network with an IP address of 140.133.28.72 (or 10001100 10000101 00011100 01001000) and a subnet mask of 255.248.0.0 (or 11111111 11111000 00000000 00000000), what is the network ID?
140.248.0.0 (or 10001100 11111000 00000000 00000000)
As a networking consultant, you've been asked to help expand a client's TCP/IP network. The network administrator tells you that the network ID is subnetted as 185.27.54.0/26. On this network, how many bits of each IP address are devoted to host information?
6
If you worked on an older network that could not interpret classless addressing, and your network ID was 145.27.0.0, what is the theoretical maximum number of different subnets you could create on this network?
254
You have decided to create 254 subnets on your Class B network. What subnet mask will you use to accomplish this?
a. 255.255.255.0
If you subdivide your Class B network into 254 subnets, what is the maximum number of hosts you can assign to any single subnet?
254
Your company has leased a Class C network whose network ID is 205.61.128.0. You want to create 16 subnets within this network. One of the subnets will have an extended network prefix of 205.61.128.64. What will be the broadcast address for this subnet? (Hint: If you know the number of hosts per subnet, you can easily determine the broadcast address.)
205.61.128.79
Your workstation's IP address is 10.35.88.12, and your supervisor's workstation's IP address is 10.35.91.4. When you send data from your workstation to your supervisor's workstation, what is the most likely IP address of the first default gateway that will accept and interpret your transmission?
10.35.88.1
You have decided to use PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP in order for all five clients in your office to be able to access servers on the Internet?
1
You have offered to help a friend set up her e-mail client software. She knows the e-mail address that her ISP assigned her. Which of the following pieces of information will you need to configure her e-mail software to successfully send messages?
SMTP server name
Which two of the following are benefits of using IMAP4 relative to POP3?
1. It allows users to review and delete mail without downloading it from the mail server.

2. It enables multiple users to easily share a central mailbox.
What Network layer protocol does the traceroute utility use to obtain its information about paths between a source and destination?
ICMP
Which of the following commands allows you to view the routing table on your Linux workstation?
netstat -r and route
When you use the mtr command to assess the path from your office workstation to a server on your company’s WAN that’s located in Spain, what is the first hop the mtr command will display?
Your default gateway's IP address
If you know that your colleague's TCP/IP host name is JSMITH, and you need to find out his IP address, which of the following commands should you type at your shell prompt or command prompt?
nslookup jsmith
Suppose your office's only DNS server was down, and you wanted to view the DNS address record for your company's domain. Which of the following TCP/IP utilities would allow you to do this?
dig
What utility might you use to find out whether your ISP's router is responsible for the poor network performance your organization experiences on a particular afternoon?
mtr
Which of the following commands reveals the default gateway addresses for all the hosts to which a router is connected?
route
What is a key in terms of encryption?
Random string of characters, into the original data's bits-sometimes several times in different sequences - to generate a unique data block.