1 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
Question Booklet Code: C Duration: 2 Hours
Course: Diploma in Engineering in Computer Science Year: Third Year
Paper Code: 702304 Paper Name: Internet Programming
ATTEMPT ALL THE BELOW MENTIONED QUESTIONS:
1. Which of the following services use
TCP?
DHCP
SMTP
HTTP
TFTP
FTP
A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
2. What layer in the TCP/IP stack is
equivalent to the Transport layer of the
OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
3. Which of the following describe the
DHCP Discover message?
It uses FF:FF:FF:FF:FF:FF as a layer 2
broadcast.
It uses UDP as the Transport layer protocol.
It uses TCP as the Transport layer protocol.
It does not use a layer 2 destination address.
A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only
4. You want to implement a mechanism
that automates the IP configuration,
including IP address, subnet mask,
default gateway, and DNS information.
Which protocol will you use to accomplish
this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
5. Which of the following is private IP
address?
A. 12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
6. Which of the following allows a router
to respond to an ARP request that is
intended for a remote host?
A. Gateway DP
B. Reverse ARP (RARP)
C. Proxy ARP
D. Inverse ARP (IARP)
7. The DoD model (also called the TCP/IP
stack) has four layers. Which layer of the
DoD model is equivalent to the Network
layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
8. Which of the following services use
UDP?
DHCP
SMTP
SNMP
FTP
HTTP
TFTP
A. 1, 3 and 6
B. 2 and 4
C. 1, 2 and 4
D. All of the above
CMJ UNIVERSITY, SHILLONG
TERM END EXAMINATION - 2013
2 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
9. Which class of IP address provides a
maximum of only 254 host addresses per
network ID?
A. Class A
B. Class B
C. Class C
D. Class D
10. If you use either Telnet or FTP, which
is the highest layer you are using to
transmit data?
A. Application
B. Presentation
C. Session
D. Transport
11. Which of the following is the decimal
and hexadecimal equivalents of the
binary number 10011101?
A. 155, 0x9B
B. 157, 0x9D
C. 159, 0x9F
D. 185, 0xB9
12. Which statements are true regarding
ICMP packets?
They acknowledge receipt of a TCP segment.
They guarantee datagram delivery.
They can provide hosts with information about
network problems.
They are encapsulated within IP datagrams.
A. 1 only
B. 2 and 3
C. 3 and 4
D. 2, 3 and 4
13. Which of the following are layers in
the TCP/IP model?
Application
Session
Transport
Internet
Data Link
Physical
A. 1 and 2
B. 1, 3 and 4
C. 2, 3 and 5
D. 3, 4 and 5
14. Which layer 4 protocol is used for a
Telnet connection?
A. IP
B. TCP
C. TCP/IP
D. UDP
15. Which statements are true regarding
ICMP packets?
ICMP guarantees datagram delivery.
ICMP can provide hosts with information about
network problems.
ICMP is encapsulated within IP datagrams.
ICMP is encapsulated within UDP datagrams.
A. 1 only
B. 2 and 3
C. 1 and 4
D. All of the above
16. Which of the following are TCP/IP
protocols used at the Application layer of
the OSI model?
IP
TCP
Telnet
FTP
TFTP
A. 1 and 3
B. 1, 3 and 5
C. 3, 4 and 5
D. All of the above
17. What protocol is used to find the
hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
18. Which of the following protocols uses
both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS
19. What is the address range of a Class
B network address in binary?
A. 01xxxxxx
B. 0xxxxxxx
C. 10xxxxxx
D. 110xxxxx
20. HTML stands for;
a. Hyper text marker language
b. Hyper tab marker language.
c. High transfer markup language
d. Hyper text markup language
21. Html is used for:
a. Hardware programming
b. Software programming
c. Web programming
d. All of these
3 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
22. Tags are used to describe:
a. Web page
b. Wed site
c. Web size
d. None of these
23. Html code contains:
a. Tags
b. Attributes
c. Elements
d. All of these
24. To create and view an html document,
which tools are used:
a. Text editor
b. Web browser
c. Both a and b
d. None of these
25. Html document must always be saved
with:
a. .html
b. .htm
c. .doc
d. Both a &b
26. How many levels of headings are in
html:
a. 2
b. 7
c. 6
d. 4
27. Break element is used to insert :
a. A new line
b. New text
c. A blank line
d. None of these
28. To insert blank lines, which tags are
used:
a. <p>
b. <bk>
c. <br>
d. <ba>
29. To centralize any text, it is simply
enclosed within:
a. <center>
b. <cen>
c. <centr>
d. <cent>
30. Horizontal rule element is used to
divide the webpage into:
a. Two sections
b. Separate sections
c. Four sections
d. All sections
31. The type attribute can be used with
_________ tag for setting the type for
the entire list:
a. <ty>
b. <li>
c. <ol>
d. <ul>
32. It can be used with individual
_________ tag to set the type of a
particular list item:
a. <ul>
b. <li>
c. <ol>
d. <ty>
33. Image element has only an opening
tag:
a. <im>
b. <ima>
c. <img>
d. <image>
34. The align attribute is used to adjust :
a. The size of image
b. Color of image
c. Shape of image
d. Position of the image
35. The default value of border is:
a. 1
b. 2
c. 3
d. 0
36. By default,the background color of the
web page is:
a. Black
b. Red
c. Pink
d. White
37. The hexadecimal number of white
color:
a. #ffffff
b. #fffeee
c. #fefefe
d. #efefef
38. The hexadecimal number of red color
is:
a. #ff0110
b. #ff0111
c. #ff0000
d. #ff1001
4 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
39. To create a link in the same document
how many anchor elements are used:
a. Two
b. Three
c. Four
d. Five
40. The first anchor element is specified
with which attribute:
a. Name
b. Wfhy
c. Abfg
d. Href
41. The second anchor element is
specified with:
a. Href
b. Hrfe
c. Name
d. Hghj
42. Frames are used to divide the browser
window into:
a. Dependent segments
b. Two dependent segments
c. Four independent segments
d. Various independent segments
43. Web pages created using frames can
contain:
a. Table of contents
b. Navigation links
c. Footnotes,banners
d. All of these
44. To create a frameset
document,________ element is included
in an html document:
a. Frames
b. Frameset
c. Font
d. Html
45. The syntax of the frame element is:
a. <fra>
b. <fram>
c. <frame>
d. <frameset>
46. Web publishing means:
a. Collecting the web pages
b. Publishing the web pages
c. Storing the web pages
d. None of these
47. The most common place for
publishing the web page is on the web
space provided by:
a. DNS
b. URL
c. ISP
d. All of these
48. Scripting languages can be used to
provide:
a. Simple features to the web page
b. Main features to theweb page
c. Dynamic features to the web page
d. None of these
49. Most common scripting language is:
a. Html
b. C
c. C++
d. JavaScript
50. JavaScript language was developed
by:
a. Microsoft
b. Sun
c. Nsf
d. Netscape
51. JavaScript is used for:
a. Client-side applications
b. Data validation
c. Creating interactive forms
d. All of these
52. Your router has the following IP
address on Ethernet0: 172.16.2.1/23.
Which of the following can be valid host
IDs on the LAN interface attached to the
router?
172.16.1.100
172.16.1.198
172.16.2.255
172.16.3.0
A. 1 only
B. 2 and 3 only
C. 3 and 4 only
D. None of the above
53. Which two statements describe the
IP address 10.16.3.65/23?
The subnet address is 10.16.3.0
255.255.254.0.
The lowest host address in the subnet is
10.16.2.1 255.255.254.0.
The last valid host address in the subnet is
10.16.2.254 255.255.254.0.
The broadcast address of the subnet is
10.16.3.255 255.255.254.0.
A. 1 and 3
B. 2 and 4
C. 1, 2 and 4
D. 2, 3 and 4
5 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
54. What is the maximum number of IP
addresses that can be assigned to hosts
on a local subnet that uses the
255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
55. You need to subnet a network that
has 5 subnets, each with at least 16
hosts. Which classful subnet mask would
you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
56. You have a network that needs 29
subnets while maximizing the number of
host addresses available on each subnet.
How many bits must you borrow from the
host field to provide the correct subnet
mask?
A. 2
B. 3
C. 4
D. 5
57. If an Ethernet port on a router were
assigned an IP address of
172.16.112.1/25, what would be the valid
subnet address of this host?
A. 172.16.112.0
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
58. You have an interface on a router
with the IP address of
192.168.192.10/29. Including the router
interface, how many hosts can have IP
addresses on the LAN attached to the
router interface?
A. 6
B. 8
C. 30
D. 32
59. What is the subnetwork number of a
host with an IP address of
172.16.66.0/21?
A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
60. The network address of
172.16.0.0/19 provides how many
subnets and hosts?
A. 7 subnets, 30 hosts each
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
61. You need to configure a server that is
on the subnet 192.168.19.24/29. The
router has the first available host
address. Which of the following should
you assign to the server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
D. 192.168.19.31 255.255.255.248
62. You have an interface on a router
with the IP address of
192.168.192.10/29. What is the
broadcast address the hosts will use on
this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
63. You have a network with a subnet of
172.16.17.0/22. Which is the valid host
address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
D. 172.16.18.255 255.255.252.0
64. On a VLSM network, which mask
should you use on point-to-point WAN
links in order to reduce the waste of IP
addresses?
A. /27
B. /28
C. /29
D. /30
65. To test the IP stack on your local
host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
D. 127.0.0.255
6 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
66. Which of the following is true when
describing a multicast address?
A. Packets addressed to a unicast address are
delivered to a single interface.
B. Packets are delivered to all interfaces
identified by the address. This is also called a
one-to-many address.
C. Identifies multiple interfaces and is only
delivered to one address. This address can
also be called one-to-one-of-many.
D. These addresses are meant for nonrouting
purposes, but they are almost globally unique
so it is unlikely they will have an address
overlap.
67. Which of the following is true when
describing a unicast address?
A. Packets addressed to a unicast address are
delivered to a single interface.
B. These are your typical publicly routable
addresses, just like a regular publicly routable
address in IPv4.
C. These are like private addresses in IPv4 in
that they are not meant to be routed.
D. These addresses are meant for nonrouting
purposes, but they are almost globally unique
so it is unlikely they will have an address
overlap.
68. To enable OSPFv3, which of the
following would you use?
A. Router1(config-if)# ipv6 ospf 10 area
0.0.0.0
B. Router1(config-if)# ipv6 router rip 1
C. Router1(config)# ipv6 router eigrp 10
D. Router1(config-rtr)# no shutdown
69. What multicast addresses does RIPng
use?
A. FF02::A
B. FF02::9
C. FF02::5
D. FF02::6
70. Which statement(s) about IPv6
addresses are true?
Leading zeros are required.
Two colons (::) are used to represent
successive hexadecimal fields of zeros.
Two colons (::) are used to separate fields.
A single interface will have multiple IPv6
addresses of different types.
A. 1 and 3
B. 2 and 4
C. 1, 3 and 4
D. All of the above
Question Booklet Code: C Duration: 2 Hours
Course: Diploma in Engineering in Computer Science Year: Third Year
Paper Code: 702304 Paper Name: Internet Programming
ATTEMPT ALL THE BELOW MENTIONED QUESTIONS:
1. Which of the following services use
TCP?
DHCP
SMTP
HTTP
TFTP
FTP
A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
2. What layer in the TCP/IP stack is
equivalent to the Transport layer of the
OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
3. Which of the following describe the
DHCP Discover message?
It uses FF:FF:FF:FF:FF:FF as a layer 2
broadcast.
It uses UDP as the Transport layer protocol.
It uses TCP as the Transport layer protocol.
It does not use a layer 2 destination address.
A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only
4. You want to implement a mechanism
that automates the IP configuration,
including IP address, subnet mask,
default gateway, and DNS information.
Which protocol will you use to accomplish
this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
5. Which of the following is private IP
address?
A. 12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
6. Which of the following allows a router
to respond to an ARP request that is
intended for a remote host?
A. Gateway DP
B. Reverse ARP (RARP)
C. Proxy ARP
D. Inverse ARP (IARP)
7. The DoD model (also called the TCP/IP
stack) has four layers. Which layer of the
DoD model is equivalent to the Network
layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
8. Which of the following services use
UDP?
DHCP
SMTP
SNMP
FTP
HTTP
TFTP
A. 1, 3 and 6
B. 2 and 4
C. 1, 2 and 4
D. All of the above
CMJ UNIVERSITY, SHILLONG
TERM END EXAMINATION - 2013
2 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
9. Which class of IP address provides a
maximum of only 254 host addresses per
network ID?
A. Class A
B. Class B
C. Class C
D. Class D
10. If you use either Telnet or FTP, which
is the highest layer you are using to
transmit data?
A. Application
B. Presentation
C. Session
D. Transport
11. Which of the following is the decimal
and hexadecimal equivalents of the
binary number 10011101?
A. 155, 0x9B
B. 157, 0x9D
C. 159, 0x9F
D. 185, 0xB9
12. Which statements are true regarding
ICMP packets?
They acknowledge receipt of a TCP segment.
They guarantee datagram delivery.
They can provide hosts with information about
network problems.
They are encapsulated within IP datagrams.
A. 1 only
B. 2 and 3
C. 3 and 4
D. 2, 3 and 4
13. Which of the following are layers in
the TCP/IP model?
Application
Session
Transport
Internet
Data Link
Physical
A. 1 and 2
B. 1, 3 and 4
C. 2, 3 and 5
D. 3, 4 and 5
14. Which layer 4 protocol is used for a
Telnet connection?
A. IP
B. TCP
C. TCP/IP
D. UDP
15. Which statements are true regarding
ICMP packets?
ICMP guarantees datagram delivery.
ICMP can provide hosts with information about
network problems.
ICMP is encapsulated within IP datagrams.
ICMP is encapsulated within UDP datagrams.
A. 1 only
B. 2 and 3
C. 1 and 4
D. All of the above
16. Which of the following are TCP/IP
protocols used at the Application layer of
the OSI model?
IP
TCP
Telnet
FTP
TFTP
A. 1 and 3
B. 1, 3 and 5
C. 3, 4 and 5
D. All of the above
17. What protocol is used to find the
hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
18. Which of the following protocols uses
both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS
19. What is the address range of a Class
B network address in binary?
A. 01xxxxxx
B. 0xxxxxxx
C. 10xxxxxx
D. 110xxxxx
20. HTML stands for;
a. Hyper text marker language
b. Hyper tab marker language.
c. High transfer markup language
d. Hyper text markup language
21. Html is used for:
a. Hardware programming
b. Software programming
c. Web programming
d. All of these
3 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
22. Tags are used to describe:
a. Web page
b. Wed site
c. Web size
d. None of these
23. Html code contains:
a. Tags
b. Attributes
c. Elements
d. All of these
24. To create and view an html document,
which tools are used:
a. Text editor
b. Web browser
c. Both a and b
d. None of these
25. Html document must always be saved
with:
a. .html
b. .htm
c. .doc
d. Both a &b
26. How many levels of headings are in
html:
a. 2
b. 7
c. 6
d. 4
27. Break element is used to insert :
a. A new line
b. New text
c. A blank line
d. None of these
28. To insert blank lines, which tags are
used:
a. <p>
b. <bk>
c. <br>
d. <ba>
29. To centralize any text, it is simply
enclosed within:
a. <center>
b. <cen>
c. <centr>
d. <cent>
30. Horizontal rule element is used to
divide the webpage into:
a. Two sections
b. Separate sections
c. Four sections
d. All sections
31. The type attribute can be used with
_________ tag for setting the type for
the entire list:
a. <ty>
b. <li>
c. <ol>
d. <ul>
32. It can be used with individual
_________ tag to set the type of a
particular list item:
a. <ul>
b. <li>
c. <ol>
d. <ty>
33. Image element has only an opening
tag:
a. <im>
b. <ima>
c. <img>
d. <image>
34. The align attribute is used to adjust :
a. The size of image
b. Color of image
c. Shape of image
d. Position of the image
35. The default value of border is:
a. 1
b. 2
c. 3
d. 0
36. By default,the background color of the
web page is:
a. Black
b. Red
c. Pink
d. White
37. The hexadecimal number of white
color:
a. #ffffff
b. #fffeee
c. #fefefe
d. #efefef
38. The hexadecimal number of red color
is:
a. #ff0110
b. #ff0111
c. #ff0000
d. #ff1001
4 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
39. To create a link in the same document
how many anchor elements are used:
a. Two
b. Three
c. Four
d. Five
40. The first anchor element is specified
with which attribute:
a. Name
b. Wfhy
c. Abfg
d. Href
41. The second anchor element is
specified with:
a. Href
b. Hrfe
c. Name
d. Hghj
42. Frames are used to divide the browser
window into:
a. Dependent segments
b. Two dependent segments
c. Four independent segments
d. Various independent segments
43. Web pages created using frames can
contain:
a. Table of contents
b. Navigation links
c. Footnotes,banners
d. All of these
44. To create a frameset
document,________ element is included
in an html document:
a. Frames
b. Frameset
c. Font
d. Html
45. The syntax of the frame element is:
a. <fra>
b. <fram>
c. <frame>
d. <frameset>
46. Web publishing means:
a. Collecting the web pages
b. Publishing the web pages
c. Storing the web pages
d. None of these
47. The most common place for
publishing the web page is on the web
space provided by:
a. DNS
b. URL
c. ISP
d. All of these
48. Scripting languages can be used to
provide:
a. Simple features to the web page
b. Main features to theweb page
c. Dynamic features to the web page
d. None of these
49. Most common scripting language is:
a. Html
b. C
c. C++
d. JavaScript
50. JavaScript language was developed
by:
a. Microsoft
b. Sun
c. Nsf
d. Netscape
51. JavaScript is used for:
a. Client-side applications
b. Data validation
c. Creating interactive forms
d. All of these
52. Your router has the following IP
address on Ethernet0: 172.16.2.1/23.
Which of the following can be valid host
IDs on the LAN interface attached to the
router?
172.16.1.100
172.16.1.198
172.16.2.255
172.16.3.0
A. 1 only
B. 2 and 3 only
C. 3 and 4 only
D. None of the above
53. Which two statements describe the
IP address 10.16.3.65/23?
The subnet address is 10.16.3.0
255.255.254.0.
The lowest host address in the subnet is
10.16.2.1 255.255.254.0.
The last valid host address in the subnet is
10.16.2.254 255.255.254.0.
The broadcast address of the subnet is
10.16.3.255 255.255.254.0.
A. 1 and 3
B. 2 and 4
C. 1, 2 and 4
D. 2, 3 and 4
5 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
54. What is the maximum number of IP
addresses that can be assigned to hosts
on a local subnet that uses the
255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
55. You need to subnet a network that
has 5 subnets, each with at least 16
hosts. Which classful subnet mask would
you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
56. You have a network that needs 29
subnets while maximizing the number of
host addresses available on each subnet.
How many bits must you borrow from the
host field to provide the correct subnet
mask?
A. 2
B. 3
C. 4
D. 5
57. If an Ethernet port on a router were
assigned an IP address of
172.16.112.1/25, what would be the valid
subnet address of this host?
A. 172.16.112.0
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
58. You have an interface on a router
with the IP address of
192.168.192.10/29. Including the router
interface, how many hosts can have IP
addresses on the LAN attached to the
router interface?
A. 6
B. 8
C. 30
D. 32
59. What is the subnetwork number of a
host with an IP address of
172.16.66.0/21?
A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
60. The network address of
172.16.0.0/19 provides how many
subnets and hosts?
A. 7 subnets, 30 hosts each
B. 8 subnets, 8,190 hosts each
C. 8 subnets, 2,046 hosts each
D. 7 subnets, 2,046 hosts each
61. You need to configure a server that is
on the subnet 192.168.19.24/29. The
router has the first available host
address. Which of the following should
you assign to the server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
D. 192.168.19.31 255.255.255.248
62. You have an interface on a router
with the IP address of
192.168.192.10/29. What is the
broadcast address the hosts will use on
this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
63. You have a network with a subnet of
172.16.17.0/22. Which is the valid host
address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
D. 172.16.18.255 255.255.252.0
64. On a VLSM network, which mask
should you use on point-to-point WAN
links in order to reduce the waste of IP
addresses?
A. /27
B. /28
C. /29
D. /30
65. To test the IP stack on your local
host, which IP address would you ping?
A. 127.0.0.0
B. 1.0.0.127
C. 127.0.0.1
D. 127.0.0.255
6 | P a g e Centre for Collaboration of Industry and Institutions (CCII) – www.cmju.in
66. Which of the following is true when
describing a multicast address?
A. Packets addressed to a unicast address are
delivered to a single interface.
B. Packets are delivered to all interfaces
identified by the address. This is also called a
one-to-many address.
C. Identifies multiple interfaces and is only
delivered to one address. This address can
also be called one-to-one-of-many.
D. These addresses are meant for nonrouting
purposes, but they are almost globally unique
so it is unlikely they will have an address
overlap.
67. Which of the following is true when
describing a unicast address?
A. Packets addressed to a unicast address are
delivered to a single interface.
B. These are your typical publicly routable
addresses, just like a regular publicly routable
address in IPv4.
C. These are like private addresses in IPv4 in
that they are not meant to be routed.
D. These addresses are meant for nonrouting
purposes, but they are almost globally unique
so it is unlikely they will have an address
overlap.
68. To enable OSPFv3, which of the
following would you use?
A. Router1(config-if)# ipv6 ospf 10 area
0.0.0.0
B. Router1(config-if)# ipv6 router rip 1
C. Router1(config)# ipv6 router eigrp 10
D. Router1(config-rtr)# no shutdown
69. What multicast addresses does RIPng
use?
A. FF02::A
B. FF02::9
C. FF02::5
D. FF02::6
70. Which statement(s) about IPv6
addresses are true?
Leading zeros are required.
Two colons (::) are used to represent
successive hexadecimal fields of zeros.
Two colons (::) are used to separate fields.
A single interface will have multiple IPv6
addresses of different types.
A. 1 and 3
B. 2 and 4
C. 1, 3 and 4
D. All of the above
No comments:
Post a Comment