SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

CCNA Discovery 2 Chapter 4 V4.1

Labels: CCNA 2 Chapter 4 V4.1

1. In an 8 bit binary number, what is the total number of combinations of the
eight bits?

128
254
255
**256
512
1024


2. Convert the decimal number 231 into its binary equivalent. Select the correct
answer from the list below.

11110010
11011011
11110110
**11100111
11100101
11101110


3. How many usable hosts are available given a Class C IP address with the
default subnet mask?

**254
255
256
510
511
512


4. Which statement describes NAT overload or PAT?

Each internal address is dynamically translated to an individual external IP address.
A single internal address is always translated to the same unique external IP address.
**Many internal addresses can be translated to a single IP address using different port
assignments.
Many internal addresses are statically assigned a single IP address and port to use for
communications.


5. Which IPv4 class of addresses provides the most networks?
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


Class A
Class B
**Class C
Class D
Class E


6. Which statement accurately describes public IP addresses?

Public addresses cannot be used within a private network.
**Public IP addresses must be unique across the entire Internet.
Public addresses can be duplicated only within a local network.
Public IP addresses are only required to be unique within the local network.
Network administrators are free to select any public addresses to use for network
devices that access the Internet.


7. Which two statements describe classful IP addresses? (Choose two.)

It is possible to determine which class an address belongs to by reading the first bit.
**The number of bits used to identify the hosts is fixed by the class of the network.
Only Class A addresses can be represented by high-order bits 100.
Up to 24 bits can make up the host portion of a Class C address.
**Up to 24 bits can be used to identify unique networks.
Three of the five classes of addresses are reserved for multicasts and experimental
use.


8. Company XYZ uses a network address of 192.168.4.0. It uses the mask of
255.255.255.224 to create subnets. What is the maximum number of usable hosts
in each subnet?

6
14
**30
62


9. hat is the network broadcast address for a Class C address of 192.168.32.0
with the default subnet mask?

192.168.0.0
192.168.0.255
192.168.32.0
192.168.32.254
**192.168.32.255
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


10. Refer to the exhibit. Host A is connected to the LAN, but it cannot get access
to any resources on the Internet. The configuration of the host is shown in the
exhibit. What could be the cause of the problem?

The host subnet mask is incorrect.
The default gateway is a network address.
The default gateway is a broadcast address.
**The default gateway is on a different subnet from the host.


11. IPv6 increases the IP address size from 32 bits to how many bits?

64
96
**128
192
256
512


12. What is the range of the first octet in a Class B address?

127 to 191
127 to 192
**128 to 191
128 to 192


13. Which IPv4 class provides the highest number of host addresses per
network?

**Class A
Class B
Class C
Class D
Class E


14. refer to the exhibit. Which range of IP addresses would allow hosts that are
connected to the Router1 Fa0/0 interface to access outside networks?

192.168.1.0 through 192.168.1.95
**192.168.1.66 through 192.168.1.94
192.168.1.66 through 192.168.1.96
192.168.1.0 through 192.168.1.127
192.168.1.66 through 192.168.1.128
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


15 Which option shows the proper notation for an IPv6 address?

2001,0db8,3c55,0015,abcd,ff13
2001-0db8-3c55-0015-abcd-ff13
2001.0db8.3c55.0015.abcd.ff13
**2001:0db8:3c55:0015::abcd:ff13


16. What are two reasons that NAT was developed? (Choose two.)

to preserve registered public IP addresses
to allow users on the public Internet to access local networks
**to provide a method for privately addressed LANs to participate in the Internet
to make routing protocols operate more efficiently
**to allow private addresses to be routed on the public Internet
to reduce overhead and CPU usage on gateway routers


17. What must happen for a privately addressed host on an inside local network
to be able to communicate with an outside destination host on the Internet?

The host IP address must be translated to an outside private address.
The host IP address must be translated to an inside local address.
The host IP address must be translated to an outside local address.
**The host IP address must be translated to an inside global address.


18. Which port numbers are used by PAT to create unique global addresses?

255 and below
1024 and below
**1025 and above
64,000 and above


19. Static NAT works by mapping a specific inside local IP address to what other
specific address type?

**inside global
outside local
outside global
private IP address


20. What are three advantages of NAT implementations? (Choose three.)

**improved security
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

improved router performance
decreased processor load
**improved scalability
universal application compatibility
**sharing few public IP addresses with many hosts

Weitere ähnliche Inhalte

Mehr von ccna4discovery

Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answersccna4discovery
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answersccna4discovery
 

Mehr von ccna4discovery (7)

Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
 

Kürzlich hochgeladen

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Ccna 2 Chapter 4 V4.1 Answers

  • 1. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ CCNA Discovery 2 Chapter 4 V4.1 Labels: CCNA 2 Chapter 4 V4.1 1. In an 8 bit binary number, what is the total number of combinations of the eight bits? 128 254 255 **256 512 1024 2. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 **11100111 11100101 11101110 3. How many usable hosts are available given a Class C IP address with the default subnet mask? **254 255 256 510 511 512 4. Which statement describes NAT overload or PAT? Each internal address is dynamically translated to an individual external IP address. A single internal address is always translated to the same unique external IP address. **Many internal addresses can be translated to a single IP address using different port assignments. Many internal addresses are statically assigned a single IP address and port to use for communications. 5. Which IPv4 class of addresses provides the most networks?
  • 2. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ Class A Class B **Class C Class D Class E 6. Which statement accurately describes public IP addresses? Public addresses cannot be used within a private network. **Public IP addresses must be unique across the entire Internet. Public addresses can be duplicated only within a local network. Public IP addresses are only required to be unique within the local network. Network administrators are free to select any public addresses to use for network devices that access the Internet. 7. Which two statements describe classful IP addresses? (Choose two.) It is possible to determine which class an address belongs to by reading the first bit. **The number of bits used to identify the hosts is fixed by the class of the network. Only Class A addresses can be represented by high-order bits 100. Up to 24 bits can make up the host portion of a Class C address. **Up to 24 bits can be used to identify unique networks. Three of the five classes of addresses are reserved for multicasts and experimental use. 8. Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet? 6 14 **30 62 9. hat is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask? 192.168.0.0 192.168.0.255 192.168.32.0 192.168.32.254 **192.168.32.255
  • 3. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 10. Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem? The host subnet mask is incorrect. The default gateway is a network address. The default gateway is a broadcast address. **The default gateway is on a different subnet from the host. 11. IPv6 increases the IP address size from 32 bits to how many bits? 64 96 **128 192 256 512 12. What is the range of the first octet in a Class B address? 127 to 191 127 to 192 **128 to 191 128 to 192 13. Which IPv4 class provides the highest number of host addresses per network? **Class A Class B Class C Class D Class E 14. refer to the exhibit. Which range of IP addresses would allow hosts that are connected to the Router1 Fa0/0 interface to access outside networks? 192.168.1.0 through 192.168.1.95 **192.168.1.66 through 192.168.1.94 192.168.1.66 through 192.168.1.96 192.168.1.0 through 192.168.1.127 192.168.1.66 through 192.168.1.128
  • 4. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 15 Which option shows the proper notation for an IPv6 address? 2001,0db8,3c55,0015,abcd,ff13 2001-0db8-3c55-0015-abcd-ff13 2001.0db8.3c55.0015.abcd.ff13 **2001:0db8:3c55:0015::abcd:ff13 16. What are two reasons that NAT was developed? (Choose two.) to preserve registered public IP addresses to allow users on the public Internet to access local networks **to provide a method for privately addressed LANs to participate in the Internet to make routing protocols operate more efficiently **to allow private addresses to be routed on the public Internet to reduce overhead and CPU usage on gateway routers 17. What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet? The host IP address must be translated to an outside private address. The host IP address must be translated to an inside local address. The host IP address must be translated to an outside local address. **The host IP address must be translated to an inside global address. 18. Which port numbers are used by PAT to create unique global addresses? 255 and below 1024 and below **1025 and above 64,000 and above 19. Static NAT works by mapping a specific inside local IP address to what other specific address type? **inside global outside local outside global private IP address 20. What are three advantages of NAT implementations? (Choose three.) **improved security
  • 5. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ improved router performance decreased processor load **improved scalability universal application compatibility **sharing few public IP addresses with many hosts