Commands
What tool can be used on Linux to report duplicate IP addresses?
arping -D
ipconfig
ifconfig
dhcpd
arping -D
How is an IPv4 address MOST commonly formatted for readability?
Hexadecimal notation
Octal notation
Binary notation
Dotted decimal notation
Dotted decimal notation
How do nodes within the same subnet communicate with each other?
Through the Internet
By using a router
Using MAC addresses
By assigning new IP addresses
Using MAC addresses
How many Class B networks are there?
65,000
2 million
16,000
126
16,000
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet.
This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : mydomain.local
Description . . . . . . . : Broadcom network adapter
Physical Address. . . . . . : 00-AA-BB-CC-74-EF
DHCP Enabled . . . . . . . : No
Autoconfiguration Enabled. . . : Yes
IPv4 Address . . . . . . . : 192.168.1.102(Preferred)
Subnet Mask. . . . . . . . : 255.255.0.0
Default Gateway . . . . . . : 192.168.1.1
DNS Servers . . . . . . . : 192.168.1.20
192.168.1.27
What is the MOST likely cause of the problem?
Incorrect IP address
Incorrect DNS server address
Incorrect subnet mask
Incorrect default gateway
Incorrect subnet mask
Which of the following are uses of classless addressing (CIDR)? (Select two.)
To encrypt internet traffic
To reduce the complexity of Internet routing tables
To assign IP addresses based on geographic location
To increase the speed of internet connections
To summarize network prefixes
To reduce the complexity of Internet routing tables
To summarize network prefixes
During a network security audit, you discover an access control list (ACL) entry that allows traffic from the IP address 10.0.0.15. To further analyze the network traffic, you decide to filter packets using a network analyzer tool that requires IP addresses in binary notation.
What binary notation should you use to filter traffic from this IP address?
00001010.00001010.00000000.00001111
00001010.00000000.00000000.00001111
01010101.00000001.00000001.00001111
00010000.00000000.00000000.11111111
00001010.00000000.00000000.00001111
What is a likely consequence of two systems having duplicate IP addresses?
A race condition determining which system receives traffic
Increased network speed
Automatic resolution of the conflict by the DHCP server
The network will prioritize one system over the other
A race condition determining which system receives traffic
What is the primary purpose of using Variable Length Subnet Masks (VLSM)?
To maximize address space usage within a private network
To decrease the complexity of network design
To increase the IPv4 address space
To simplify the information Internet routers need to locate IP networks
To maximize address space usage within a private network
You're troubleshooting an IP addressing issue, and you issue a command to view the system's TCP/IP configuration. The command you use produces the following output:
fxp0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
inet6 fe80::2a0:83ff:fe30:57a%fxp0 prefixlen 64 scopeid 0x1
inet 192.168.1.235 netmask 0xfffffc00 broadcast 255.255.255.255
ether 00:a0:83:30:05:7a
media: Ethernet autoselect (100baseTX <full-duplex>)
status: active
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x7
inet 127.0.0.1 netmask 0xff000000
Which of the following operating systems are you working on?
Windows Server 2019
Windows Server 2025
Windows 11
Linux
Linux
During a network audit, it is discovered that Host Y, which is supposed to communicate with devices in the 10.1.0.0/16 network, has the following configuration:
Host Y can communicate with some devices but not others within the network.
What is the MOST likely cause of this selective communication issue?
The IP address is outside the network range.
The network cable is damaged.
The subnet mask is too broad.
The default gateway cannot reach certain devices.
The subnet mask is too broad.
During a network troubleshooting session, you notice that one of the devices in your network is attempting to communicate using the IPv6 address ::. You recall that this address has a specific purpose within IPv6 networking.
What is the significance of the device using the IPv6 address :: in this context?
The device has not yet obtained a valid IPv6 address.
The device is attempting to use the loopback address for self-testing.
The device is configured as the primary router for the network.
The device is broadcasting a multicast message to all devices on the network.
The device has not yet obtained a valid IPv6 address.
A small business plans to implement a VoIP (Voice over IP) system that requires assigning IP addresses to 30 VoIP phones.
To ensure efficient use of the company's limited IP address space, which subnet mask should be used for the VoIP subnet?
255.255.255.0
255.255.255.128
255.255.255.240
255.255.255.224
255.255.255.224
You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets.
Which network IDs will be assigned to these subnets in this configuration? (Select two.)
172.17.96.0
172.17.32.0
172.17.0.0
172.17.16.0
172.17.128.0
172.17.0.0
172.17.128.0
What happens when a host's subnet mask is shorter than it should be?
The host may not be able to contact hosts in a different subnet, thinking they are on the same local network.
The host can communicate with all other hosts without issues.
The host's IP address is considered invalid.
The host cannot communicate with any other hosts.
The host may not be able to contact hosts in a different subnet, thinking they are on the same local network.
A university's computer science department is setting up a lab network where students can experiment with network configurations and Internet protocols. The network needs to be isolated from the university's main network but should allow controlled access to the Internet for specific services.
What is the MOST appropriate setup for this scenario?
Assign each lab computer a unique public IP address and a direct connection to the Internet.
Use a private IP address range for the lab network with no further Internet access configuration.
Use a private IP address range and a dedicated proxy server for the lab network.
Use a public IP address range and directly connect the lab network to the university's main network.
Use a private IP address range and a dedicated proxy server for the lab network.
Which of the following is typically preferred for interoperability between IPv4 and IPv6 due to its efficiency?
NAT64
Dual Stack
Tunneling
6to4 automatic tunneling
Dual Stack
Which of the following best describes forwarding at Layer 2?
Assigning IP addresses to devices
Encrypting data for secure transmission
Routing packets based on IP addresses
Switching frames based on MAC addresses
Switching frames based on MAC addresse
If the subnet mask is 255.255.240.0, what does the broadcast address for a subnet look like?
The address where the last octet is 0
The address where the last four bits of the last octet are set to 0
The address where the last octet is 255
The address where the last four bits of the last octet are set to 1
The address where the last octet is 255
What does a successful ping command output include?
The message "Reply from IPAddress"
The message "Request timed out"
The encryption level of the response
The number of encrypted packets
The message "Reply from IPAddress"
A network administrator, notices that one of the workstations in their office cannot access any websites or external resources.
The administrator decides to troubleshoot the issue by following the general ping sequence. First, they ping the loopback address, which succeeds. Next, they ping the workstation's own IP address, which also succeeds.
However, when the administrator tries to ping the default gateway, it fails.
What should the administrator investigate next to resolve the issue?
Check if ICMP is blocked by the workstation's firewall.
Reinstall the network protocol stack on the workstation.
Check the physical connection between the workstation and the network.
Verify the default gateway's IP address configured on the workstation.
Verify the default gateway's IP address configured on the workstation.
What is the maximum theoretical size of an IPv4 packet?
65,535 bytes
1500 bits
1,500 bytes
32 bits
65,535 bytes
What is the primary concern addressed by the use of privacy extensions for IPv6 addresses?
Reducing the complexity of address configuration
Mitigating the tracking of devices across the Internet
Preventing the exhaustion of IPv6 addresses
Enhancing the speed of address assignment
Mitigating the tracking of devices across the Internet
What does flipping the 7th bit of the first octet in a MAC address to form an EUI-64 address accomplish?
It differentiates the modified address from the original MAC address.
It converts the address to a link-local address.
It signifies that the address is now private.
It indicates that the address is multicast.
It differentiates the modified address from the original MAC address.
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet.
This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix. : mydomain.local
Description . . . . . . . : Broadcom network adapter
Physical Address . . . . . : 00-AA-BB-CC-74-EF
DHCP Enabled. . . . . . . : No
Autoconfiguration Enabled . . : Yes
IPv4 Address. . . . . . . : 192.168.2.102(Preferred)
Subnet Mask . . . . . . . : 255.255.255.0
Default Gateway. . . . . . : 192.168.1.1
DNS Servers . . . . . . . : 192.168.2.20
What is the MOST likely cause of the problem?
Incorrect default gateway
Incorrect IP address
Incorrect DNS server address
Incorrect subnet mask
Incorrect IP address