Term
1. Which statement is true regarding private IP addresses? a) Private IP addresses are not forwarded by internet routers. b) A system using a private IP address can communicate only with other system using private IP addresses. c) A system using a private IP address cannot access the Internet. d) Private IP addresses cannot be routed across a company's internal router. |
|
Definition
a) Private IP addresses are not forwarded by internet routers. |
|
|
Term
2. What stand-alone device connects wireless local area networks to wireless phone networks at broadband speeds?
a) DSL modem b) Cable modem c) 4G mobile hotspot d) Wireless router |
|
Definition
|
|
Term
3. You used your Web browser to access a page on your company's intranet. You have entered the following DNS name into your browsers Address field:
sales1.intranet.widgets.com
How does DNS work in this transaction?
a) The client issues a query to a DNS server, which identifies the proper caching server to resolve the name. b) The client issues a query to a DNS server, which primarily resolves IP addresses to names. c) The client issues a query to a DNS server. which identifies the proper caching server to update. d) The client issues a query to a DNS server, which primarily resolves names to IP addresses. |
|
Definition
d) The client issues a query to a DNS server, which primarily resolves names to IP addresses. |
|
|
Term
4. Which of the following is one of the steps needed when configuring a wireless access point (AP)?
a) Configure the wireless A.P's access control list. b) Configure the wireless AP's SSID. encryption level and shared key. c) Configure the wireless A.P's 802.11 wireless standard (b, g, n, ac). d) Configure the wireless AP's MAC address filter for clients. |
|
Definition
b) Configure the wireless AP's SSID. encryption level and shared key. |
|
|
Term
5. Consider the following sequence:
2E22:4F00:000E:00D0:A267:97FF:FE6B.FE34
This is an example of:
a) a subnet mask b) an IPv6 address c) an IPv4 address d) a loopback address |
|
Definition
|
|
Term
6. How many bits is an IPv6 address?
a) 32 bits b) 64 bits c) 128 bits d) 16 tits |
|
Definition
|
|
Term
7. Which of the following is an example of a top-level domain?
a) www.habitat.org b) dev.security.CIWcertified.com c) .com d) habitat.org |
|
Definition
|
|
Term
8. Which statement is true regarding IPv6?
a) IPv6 uses 32-bit addresses. b) IPv6 automatically encrypts packets. c) IPv6 relies completely upon the router to manage packets. d) IPv6 does not work on mobile phones. |
|
Definition
b) IPv6 automatically encrypts packets. |
|
|
Term
9. What is the default IPv4 subnet mask for the private IP address range of 10.0.0.0 to 10.255.255.255?
a) 255.0.0.0 b) 192.168.0.0 c) 255.255.255.0 d) 255.255.0.0 |
|
Definition
|
|
Term
10. Which of the following determines the difference between the network portion and the host portion of an IP address in IPv4?
a) The subnet mask b) Field 3 of the IP address c) The first 12 bits d) Field 1 of the IP address |
|
Definition
|
|
Term
11. Which mobile device operating system is based on the Linux kernel and makes most of its code available as open-source?
a) Android b) OS X c) iOS d) Windows Phone |
|
Definition
|
|
Term
12. Thuy is explaining the differences between IPv4 and IPv6 to a co-worker. What is a disadvantage of the IPv6 network addressing scheme?
a) Speed problems b) Lack of security c) Limited address space d) Larger address space |
|
Definition
|
|
Term
13. What is the highest number that can be used in a single field of an IPv4 address?
a) 224 b) 128 c) 255 d) 32 |
|
Definition
|
|
Term
14. You have iust received the following IPv6 address:
2E22:4F0:E::/48
What is the purpose of the "/48" address notation?
a) Dynamic Host Configuration Protocol (DHCP) b) Subnet prefix length c) Internet Corporation for Assigned Names and Numbers (ICANN) d) Automatic Private IP Addressing (APIPA) |
|
Definition
|
|