Name: 
 

Chapter9



True/False
Indicate whether the statement is true or false.
 

 1. 

On a network using TCP/IP, some nodes may use multiple IP addresses.
 

 2. 

In CIDR, conventional network class distinctions do not exist.
 

 3. 

The MIME standard replaces SMTP.
 

 4. 

POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time.
 

 5. 

IMAP4 servers require less storage space and usually more processing resources than POP servers do.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

A class ____ network class is reserved for special purposes.
a.
A
c.
C
b.
B
d.
D
 

 2. 

In ____ addressing, the network information portion of an IPv4 address is limited to the first 8 bits in a Class A address.
a.
classful
c.
stateful
b.
subnet
d.
limited
 

 3. 

In classful addressing, the Class B IPv4 address network ID is located in the ____.
a.
last 8 bits
c.
first 8 bits
b.
last 16 bits
d.
first 16 bits
 

 4. 

In classful addressing, Class C IPv4 address host information is located in the ____.
a.
last 8 bits
c.
first 8 bits
b.
last 16 bits
d.
first 16 bits
 

 5. 

Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
a.
0
c.
first eight
b.
1
d.
last eight
 

 6. 

Within a classful addressing, ____ is the default subnet mask for a Class C address.
a.
255.255.255.255
c.
255.255.0.0
b.
255.255.255.0
d.
255.0.0.0
 

 7. 

The result from ANDing 11001111 with 10010001 is ____.
a.
11001111
c.
10000001
b.
10010001
d.
00000001
 

 8. 

When using classful IPv4 addressing, a network ID always ends with an octet of ____.
a.
0
c.
1
b.
00000000
d.
255
 

 9. 

Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.
a.
unobtainable
c.
reserved
b.
out-of-range
d.
open for general use
 

 10. 

CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
a.
dash ( - )
c.
backward slash ( \ )
b.
underscore ( _ )
d.
forward slash ( / )
 

 11. 

The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.
a.
proxy
c.
Internet
b.
core
d.
default
 

 12. 

The gateways that make up the Internet backbone are called ____ gateways.
a.
proxy
c.
Internet
b.
core
d.
default
 

 13. 

The most popular mail server programs are Sendmail and ____.
a.
Eudora
c.
AOL mail
b.
Microsoft Outlook
d.
Microsoft Exchange Server
 

 14. 

An example of a popular client email software is ____.
a.
MIME
c.
Sendmail
b.
Microsoft Outlook
d.
Microsoft Exchange Server
 

 15. 

SMTP operates from port ____.
a.
25
c.
110
b.
11
d.
250
 

 16. 

The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.
a.
100
c.
10,000
b.
1000
d.
1,000,000
 

 17. 

POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.
a.
25
c.
110
b.
11
d.
250
 

 18. 

IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.
a.
POP3
c.
SMTP
b.
POP
d.
MIME
 

 19. 

An administrator can discover the host name assigned to a client by using the ____ utility.
a.
host
c.
hostname
b.
nbstat
d.
nslookup
 

 20. 

A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.
a.
nbstat
c.
dig
b.
pathping
d.
route
 

 21. 

The ____ utility allows you to view a host’s routing table.
a.
nbstat
c.
dig
b.
pathping
d.
route
 

Completion
Complete each statement.
 

 1. 

____________________ separates a network into multiple logically defined segments, or subnets.
 

 

 2. 

The combination of additional bits used for subnet information plus the existing network ID is known as the ____________________.
 

 

 3. 

The.backbone are called ____________________ gateways.
 

 

 4. 

____________________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.
 

 

 5. 

____________________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.
 

 

Matching
 
 
Match each item with a statement below:
a.
ipconfig utility
f.
dig utility
b.
ifconfig utility
g.
nslookup utility
c.
netstat utility
h.
route utility
d.
nbstat utility
i.
traceroute utility
e.
host utility
 

 1. 

Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
 

 2. 

Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
 

 3. 

Useful only on networks that run Windows-based operating systems and NetBIOS.
 

 4. 

Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
 

 5. 

The TCP/IP administration utility for use with Windows operating systems.
 

 6. 

Allows you to view a host’s routing table.
 

 7. 

Used if an administrator already know a host’s name and wants to learn its IP address.
 

 8. 

The TCP/IP configuration and management utility used on UNIX and Linux systems.
 

 9. 

Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
 

Short Answer
 

 1. 

Explain how to calculate a host’s network ID given its IPv4 address and subnet mask.
 

 2. 

Describe the formula determining how to modify a default subnet mask to create subnets.
 

 3. 

If subnetting is used on a LAN, explain how devices interpret subnetting information.
 

 4. 

Explain how hiding IP addresses on private networks allows network managers more flexibility in assigning addresses.
 

 5. 

Explain why SNAT is considered static and describe why this is useful.
 

 6. 

Describe what PAT is and how it works.
 

 7. 

Describe four features of IMAP4.
 

 8. 

Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
 

 9. 

Explain what happens when an administrator issues the mtr command.
 

 10. 

Describe the function of the route utility and provide examples of how it is entered on a UNIX or Linux system, a Windows-based system, and a Cisco-brand router.
 



 
Check Your Work     Start Over