29. When describing blocks of IP addresses, what does CIDR do?
- Interpolates data across multiple servers
- Calls back to the source router for confirmation
- Uses subnet masks to demarcate networks.
- Encrypts the header data
30. What protocol communicates data between routers representing the edges of autonomous systems?
- Distance-vector
- Link state
- Interior gateway
- Exterior gateway
31. Which of the following IP address ranges have been defined as non-routable address space? Select all that apply.
- 192.168.0.0/16
- 172.16.0.0/12
- 255.255.255.0/1
- 10.0.0.0/8
32. In a datagram, what does the flag field indicate?
- If a datagram should be scanned for viruses
- If a datagram has degraded and become unusable
- If a datagram is high or low priority
- If a datagram is allowed to or has already been fragmented
33. A router is performing basic routing functions. What is the second step in the transmission of a packet?
- A router receives a packet of data.
- The router examines the destination IP of this packet.
- Check the routing table.
- Sent an ARP response.
34. Ranges of IP addresses anyone can use for their internal networks are known as ______.
- MAC address
- Non-routable address space
- Subnet mask
- IP address
35. Which of the following is a valid IP address?
- 598.36.789
- 126.396.659.100
- 128.42.64.78
- A8:97:4F:6D:H6:0F
36. A single octet in an IP address represents what range of decimal numbers?
- 0-255
- 0-250
- 1-255
- 0-155
37. A router is performing basic routing functions. What is the third step in the transmission of a packet?
- The router looks up the destination network in its routing table.
- The router forwards the packet.
- The router examines the destination IP.
- A router receives a packet of data.
Shuffle Q/A 2
39. Why do entries in a local Address Resolution Protocol (ARP) table expire after a short amount of time?
- To keep space in the table
- It will use too much memory
- It only needs to be used one time
- To account for network changes