100% found this document useful (1 vote)
4K views

Chapter 4 Solutions: Review Questions

This chapter discusses IP addressing and subnetting. It provides examples of IP addresses and subnet masks for different address classes and CIDR notation. Review questions cover topics like determining network vs host identifiers, valid address ranges, and properties of different address classes. Case projects discuss private IP addresses, network and broadcast addresses, differences between CIDR and VLSM, and the purpose of route summarization.

Uploaded by

Lisa Wilson Lane
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views

Chapter 4 Solutions: Review Questions

This chapter discusses IP addressing and subnetting. It provides examples of IP addresses and subnet masks for different address classes and CIDR notation. Review questions cover topics like determining network vs host identifiers, valid address ranges, and properties of different address classes. Case projects discuss private IP addresses, network and broadcast addresses, differences between CIDR and VLSM, and the purpose of route summarization.

Uploaded by

Lisa Wilson Lane
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

CCNA Guide to Cisco Networking, Fourth Edition Chapter 4 Solutions

Chapter 4 Solutions
Review Questions
1. If your Class C address has a three-bit subnet mask, which of the following would be a
subnetwork identifier?
a. 203.16.34.33
b. 203.16.34.135
c. 203.16.34.32
d. 203.16.34.240
2. Which of the following would be a broadcast address for a Class C network?
a. 190.15.23.255
b. 190.42.25.255
c. 221.21.23.255
d. 129.21.15.255
3. Which of the following Class C IP addresses is a broadcast (assuming the subnet mask is
255.255.255.224)?
a. 219.129.32.5
b. 219.129.32.63
c. 219.129.32.97
d. 219.129.32.161
4. For a Class B broadcast, which octets will be completely binary ones?
a. 2nd
b. 2nd and 3rd
c. 1st and 2nd
d. 3rd and 4th
5. Which of the following is a Class A broadcast?
a. 11.255.255.255
b. 127.75.255.255
c. 193.255.255.255
d. 14.25.255.255
6. What is the purpose of the reserved numbers in a Class D address?
a. Unicast
b. Experimental
c. Broadcast
d. Multicast
7. What is the purpose of the reserved numbers in a Class E address?
a. Unicast
b. Broadcast
c. Multicast
d. Experimental
8. In a Class C address, which octets identify the network?
a. All of them
b. The first octet only
c. The first and second octet
d. The last octet
e. The first three octets
9. Class B addresses allow you to configure how many octets on your network for host IP
addresses?
a. One
b. Two

1
CCNA Guide to Cisco Networking, Fourth Edition Chapter 4 Solutions

c. Three
d. Four
10. Which of the following are valid network identifiers for Class A addresses?
a. 1-127
b. 1-126
c. 192-223
d. 224-240
e. 128-191
11. What would the value of the first octet of the subnet mask be if the CIDR notation for an
address is 192.168.1.16/27?
a. 224
b. 254
c. 255
d. 265
12. What would the value of the last octet of the subnet mask be if the CIDR notation for an
address is 192.168.1.16/28?
a. 192
b. 224
c. 240
d. 248
e. 252
13. Assuming that the address 165.24.3.6 uses the correct default mask, what is the host
identifier?
a. 165.24
b. 24.3.6
c. 3
d. 3.6
14. How many bits (maximum) can be used from the last octet of a Class C address to subnet
your network?
a. 2
b. 4
c. 6
d. 8
15. Which of the following address classes allows you to borrow a maximum of 14 bits to create a
subnet mask?
a. Class A
b. Class B
c. Class C
d. None of the above
16. A subnet mask of 255.255.252.0 on a Class B network indicates that _______ bits have been
borrowed from the host portion to subnet the network.
a. 2
b. 4
c. 6
d. 8
e. 10
17. Given the following CIDR address and mask, which of the following is a broadcast on its
subnetwork 162.17.12.125/24?
a. 162.17.15.255
b. 162.17.12.255
c. 162.17.255.255
d. 255.255.255.255

2
CCNA Guide to Cisco Networking, Fourth Edition Chapter 4 Solutions

e. None of the above


18. Given the address 190.14.20.255/20, which of the following statements is true?
a. This is a broadcast address.
b. This is a network address.
c. This is a host address.
d. This address is on network 190.14.20.0.
e. This address is on network 190.14.16.0.
19. Given the address 190.14.20.0/22, which of the following statements is true? (Choose all that
apply.)
a. This is a broadcast address.
b. This is a network address.
c. This is a host address.
d. This address is on network 190.14.20.0.
e. This address is on network 190.14.16.0.
20. How does CIDR conserve IP addresses?
a. By charging more for IP address assignments
b. By allocating IP network numbers on criteria other than traditional bit boundaries
c. By using traditional octet boundary subnet masks
d. By aggregating routes
21. Which of the following routing protocols support VLSM? (Choose all that apply.)
a. RIP version 1
b. IGRP
c. OSPF
d. EIGRP
22. What is the purpose of summarization?
a. To reduce the number of routing table entries
b. To prevent route flapping
c. To conserve IP addresses
d. To reduce the cost of acquiring IP addresses

23. What is true regarding IPv6? (Choose all the apply)


a. addresses are expressed in binary
b. addresses are expressed in hexadecimal
c. it is difficult to transition to IPv6
d. IPv6 addresses are 64 bits rather than 32 bits like IPv4 addresses
e. Most Cisco systems support IPv6

24. What are some reasons to switch to IPv6? (Choose all that apply)
a. The equipment costs less
b. IPv6 is inherently more secure
c. There is more address space available with IPv6
d. IPv6 will handle your NAT configurations automatically
e. Broadcasting will be replaced with multicasting

Case Projects
Case Project 1
IP addresses beginning with the decimal number 10 are part of the private address ranges.
These reserved numbers cannot be used on networks whose IP addresses are seen on the
Internet because many people are using these same numbers and all "seen" IP addresses must
be unique. Private addresses are to be used behind a firewall of some type that will hide the
private IP scheme and present different and unique IP addresses to the outside networks. IP
addresses beginning with the decimal number 127 can never be assigned in any circumstances

3
CCNA Guide to Cisco Networking, Fourth Edition Chapter 4 Solutions

because the entire 127.0.0.0 network is used for loopback testing. If you ping 127.0.0.1 (or any
valid IP address on that network), a positive reply means your TCP/IP protocol stack is installed
and functioning correctly. IP addresses beginning with 223 and above cannot be used because
they are part of Class D and E networks which are reserved for multicasting and experimentation
respectively.

Case Project 2
On each subnet (network) there are two IP addresses which cannot be assigned to devices. One
is the network or subnet number itself and the other is the broadcast address for all hosts on the
subnet. The network or subnet address cannot be assigned because it is the address that
represents all of the IP host addresses within it. This address is defined by having all binary
zeroes in the host portion of the address. The broadcast address cannot be assigned because it
is the address that hosts on that network (subnet) use to communicate with all other hosts on that
segment. The broadcast address is defined by having all binary ones in the host portion of the
address.

Case Project 3
CIDR moves the network/node line to the right and this is used to create multiple subnets out of
one network number. VLSM also moves the network/node line to the right for the same reason as
CIDR but VLSM creates subnets out of subnets so the line can be moved to the right more than
once to more perfectly match how many host IP addresses are needed on any subnet.
Summarization moves the network/node line to the left. The purpose is advertise as few subnets
as possible because each advertisement creates an entry in the routing tables and large routing
tables take up CPU processing power and time.

You might also like