167 What is the greatest number of host addresses you can create on a single subnet of a network with the following address: 172.16.0.0/20?1421444,0944,096
168 Ralph has an IPv4 Class B network with a subnet mask of 255.255.248.0. How many subnets can he create, and how many hosts can he create per subnet?64 subnets and 2046 hosts32 subnets and 2046 hosts30 subnets and 1022 hosts62 subnets and 1022 hosts
169 Convert the binary mask 11111111.11111111.11100000.00000000 into its equivalent decimal value. What is the decimal representation of this mask?255.255.224.0255.255.240.0255.255.248.0255.255.252.0
170 If you have an IPv4 network address of 192.168.1.32/27, what is the valid range of host addresses you can use for your workstations?192.168.1.33 through 192.168.1.63192.168.1.33 through 192.168.1.62192.168.1.34 through 192.168.1.62192.168.1.34 through 192.168.1.63
171 Alice has been assigned the IPv4 network address 172.21.0.0/22 for the creation of a new department network in her company. How many host addresses does she have available to her?51051210221024
172 Automatic Private IP Addressing (APIPA) assigns IPv4 addresses from which of the following classes to Dynamic Host Configuration Protocol (DHCP) clients that cannot contact a DHCP server?Class AClass BClass CClass D
173 Which of the following Internet Protocol (IPv4) address classes identifies multicast addresses?Class AClass BClass CClass DClass E
174 Which of the following is an address that you can assign to a host on a private IPv4 network?192.167.9.46172.16.255.25510.1.0.253225.87.34.1
175 Which of the following is the correct subnet mask for an IPv4 network with the address 172.16.0.0/20?255.255.224.0255.255.240.0255.255.248.0255.255.255.224255.255.255.240
176 Ed has been assigned the IPv4 network address 192.168.2.32/28 for the computers in his department. Which of the following ranges of addresses can Ed use to configure the TCP/IP clients on his computers?192.168.2.32 to 192.168.2.55192.168.2.33 to 192.168.2.46192.168.2.33 to 192.168.2.40192.168.2.1 to 192.168.2.254
177 Which of the following IPv4 addresses is available for use on a network device?1.0.0.1127.98.127.0234.9.76.32240.65.8.124
178 Which of the following IPv6 address types is the functional equivalent of an IPv4 APIPA address?Link localGlobal unicastSite localAnycast
179 When two workstations access the Internet using the same Port Address Translation (PAT) router, which of the following does the router assign to each workstation? (Choose all that apply.)A unique port numberA common public IPv4 addressA common port numberA unique public IPv4 address
180 Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?EUI-64SLAACAPIPAv6DHCPv6
181 Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling? (Choose all that apply.)TeredoIPsecICMPv66to4
182 Which of the following best describes why IPv6 hosts exchange ICMPv6 Router Solicitation and Router Advertisement messages with routers?To obtain the prefix needed to generate a link-local addressTo learn the IPv6 address of the nearest routerTo perform address conflict detection for its link-local addressTo encapsulate IPv4 packets and transmit them over the router
183 Which of the following are examples of Virtual IP (VIP) addresses? (Select all that apply.)An IP address assigned to a host workstation by a DHCP serverA public IP address substituted for a host's own private IP address by a NAT routerAn IP address assigned to a host workstation by APIPAAn IP address assigned to a virtual NIC
184 Which of the following is the best definition of a subinterface?A logical network interface created from a physical network interfaceOne of the ports on a physical network interface adapter with multiple portsA physical network interface connected to a subnetOne of the IP addresses associated with a network interface that has multiple IP addresses
185 Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?110 and 25143 and 25110 and 14380 and 11025 and 80
186 Which of the following server applications use two well-known port numbers during a typical transaction?NTPSNMPHTTPFTP
187 Which of the following protocols does the Ping utility use to exchange messages with another system?UDPTCPICMPIGMP
188 Which of the following components does the port number in a transport layer protocol header identify?A transport layer protocolAn applicationA gatewayA proxy server
189 Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?Institute for Electronic and Electrical Engineers (IEEE)Internet Assigned Numbers Authority (IANA)Internet Engineering Task Force (IETF)International Organization for Standardization (ISO)
190 Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?222080443
191 The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?2580110443
192 What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?MSSWindowMMSWinMS
193 What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?SocketOUIWell-known portNetwork addressDomain
194 Which of the following protocols generate messages that are carried directly within Internet Protocol (IPv4) datagrams, with no intervening transport layer protocol? (Choose all that apply.)ICMPIGMPSMTPSNMP
195 Which of the following protocols is used to exchange directory service information?RDPLDAPSNMPSMB
196 Ralph is configuring a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants both protocols to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to secure the SMTP connection with Transport Layer Security (TLS) and the POP3 connection with Secure Sockets Layer (SSL) encryption? (Choose all that apply.)11025587993995
197 Which of the following is not a port number used for Structured Query Language (SQL) communications?1433152133063389
198 Which of the following port numbers is assigned to a Unix logging services program?389514636993
199 Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?HTTPHTMLSMTPFTP
200 Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?DHCPBOOTPDNSSNMP
201 Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)EthernetIPTCPUDP
202 What is the native file sharing protocol used on all Microsoft Windows operating systems?Hypertext Transfer Protocol (HTTP)Network File System (NFS)File Transfer Protocol (FTP)Server Message Block (SMB)Lightweight Directory Access Protocol (LDAP)
203 When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?ACKFINPSHSYNURG
204 Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?SynchronizationInitialization exchangeConnection establishmentThree-way handshake
205 Alice