MCQs on IP Addressing and Subnetting | CCNA Certification MCQs

Master IP Addressing and Subnetting for Network Certification Success
Understanding IP Addressing, subnetting techniques, subnet masks, ARP, routing, and NAT is crucial for networking professionals. This set of MCQs will test your knowledge on essential concepts to help you prepare for certification exams in network management and IP configuration.


IP Address Classes and Types

  1. Which of the following is true about a Class A IP address?
    a) It starts with a binary 1
    b) The default subnet mask is 255.0.0.0
    c) It supports 254 hosts per network
    d) It is used for small private networks
  2. How many host bits are in a Class B IP address?
    a) 8 bits
    b) 16 bits
    c) 24 bits
    d) 32 bits
  3. The Class C IP address range is from:
    a) 0.0.0.0 to 127.255.255.255
    b) 128.0.0.0 to 191.255.255.255
    c) 192.0.0.0 to 223.255.255.255
    d) 224.0.0.0 to 239.255.255.255
  4. Which Class of IP address is primarily used for multicast communications?
    a) Class A
    b) Class B
    c) Class C
    d) Class D
  5. A Class E IP address range is used for:
    a) Private networks
    b) Reserved for future use
    c) Multicast addresses
    d) Public addresses
  6. Which of the following represents the default subnet mask for a Class A IP address?
    a) 255.255.255.0
    b) 255.255.0.0
    c) 255.0.0.0
    d) 255.255.255.255
  7. How many networks can be created in a Class C IP range with the default subnet mask?
    a) 128 networks
    b) 16,777,216 networks
    c) 256 networks
    d) 65,536 networks
  8. What is the primary purpose of the Class D IP address range?
    a) Unicast addressing
    b) Multicast addressing
    c) Private network addressing
    d) Broadcast addressing
  9. Which address type is used for communication within the same local network?
    a) Unicast
    b) Multicast
    c) Broadcast
    d) Anycast
  10. The Class B IP address range supports how many hosts per network?
    a) 65,534 hosts
    b) 256 hosts
    c) 65,535 hosts
    d) 16,777,216 hosts

Subnetting Techniques

  1. What is the main reason for subnetting in networking?
    a) To combine multiple networks into one
    b) To increase the number of available IP addresses
    c) To divide a larger network into smaller networks
    d) To improve the speed of the network
  2. In subnetting, what does a subnet mask determine?
    a) The number of available hosts
    b) The size of the network
    c) The range of IP addresses in the subnet
    d) The maximum number of subnets possible
  3. In a subnetted network, the number of available subnets is determined by:
    a) The number of host bits
    b) The number of network bits
    c) The number of address bits
    d) The number of borrowed bits
  4. What is the result of borrowing bits from the host portion of an IP address in subnetting?
    a) More hosts in the subnet
    b) Fewer subnets
    c) More subnets and fewer hosts
    d) No change in the subnet
  5. How many subnets can be created by borrowing 3 bits from the host part of a Class C address?
    a) 2 subnets
    b) 4 subnets
    c) 6 subnets
    d) 8 subnets
  6. What is the maximum number of hosts that can be accommodated in a subnet with a subnet mask of 255.255.255.240?
    a) 14 hosts
    b) 30 hosts
    c) 16 hosts
    d) 254 hosts
  7. Which of the following is the correct number of hosts for a subnet with a subnet mask of 255.255.255.224?
    a) 64 hosts
    b) 30 hosts
    c) 50 hosts
    d) 62 hosts
  8. The process of subnetting a Class B IP address with a subnet mask of 255.255.255.0 creates how many subnets?
    a) 256 subnets
    b) 512 subnets
    c) 1,024 subnets
    d) 65,536 subnets
  9. What is the network address of the subnet 192.168.1.64/26?
    a) 192.168.1.0
    b) 192.168.1.64
    c) 192.168.1.128
    d) 192.168.1.192
  10. Which of the following is a valid IP address in the 192.168.1.0/28 subnet?
    a) 192.168.1.255
    b) 192.168.1.14
    c) 192.168.1.16
    d) 192.168.1.32

Subnet Masks and VLSM (Variable Length Subnet Mask)

  1. What is the primary advantage of using Variable Length Subnet Mask (VLSM)?
    a) To reduce the number of IP addresses in the subnet
    b) To optimize IP address usage based on network size
    c) To make network routing more complex
    d) To create multiple subnets within a single Class A network
  2. How does VLSM affect IP address allocation?
    a) It allows for the use of a single subnet mask for all subnets
    b) It enables the allocation of different subnet masks to different subnets
    c) It prevents the use of private IP addresses
    d) It forces all networks to have the same size
  3. In which situation would VLSM be most beneficial?
    a) When all subnets need to have the same number of hosts
    b) When there is a need to optimize IP address usage across varying subnet sizes
    c) When configuring a Class C network
    d) When only a single subnet is required
  4. How is VLSM different from traditional subnetting?
    a) VLSM uses the same subnet mask across all subnets
    b) VLSM allows for different subnet masks in different subnets
    c) VLSM is used only for Class A networks
    d) VLSM uses more host bits for subnetting
  5. What is the main purpose of a subnet mask in IP networking?
    a) To identify the source IP address
    b) To mask out the host portion of an IP address
    c) To determine the class of the IP address
    d) To route traffic between different networks
  6. Which subnet mask would allow for the most number of subnets in a Class C network?
    a) 255.255.255.240
    b) 255.255.255.0
    c) 255.255.255.192
    d) 255.255.255.255
  7. What is the network address of a 192.168.0.0/25 subnet?
    a) 192.168.0.0
    b) 192.168.0.127
    c) 192.168.0.64
    d) 192.168.0.128
  8. What does the /30 in the subnet mask 255.255.255.252 represent?
    a) 30 host bits
    b) 30 network bits
    c) 30 subnets
    d) 30 bits allocated for routing
  9. Which subnet mask is used for dividing a network into smaller subnets with a minimum of 2 usable host IP addresses?
    a) 255.255.255.252
    b) 255.255.255.240
    c) 255.255.255.224
    d) 255.255.255.0
  10. How many host addresses are available in a /29 subnet?
    a) 6
    b) 8
    c) 2
    d) 4

Address Resolution Protocol (ARP)

  1. What is the primary function of the ARP protocol?
    a) To convert domain names to IP addresses
    b) To resolve IP addresses to MAC addresses
    c) To convert MAC addresses to IP addresses
    d) To manage routing tables in routers
  2. ARP is used in which type of network communication?
    a) Broadcast communication
    b) Unicast communication
    c) Multicast communication
    d) Anycast communication
  3. In the ARP process, what is sent to request the MAC address for a given IP address?
    a) ARP Reply
    b) ARP Request
    c) ARP Broadcast
    d) ARP Table
  4. What is the ARP cache used for?
    a) Storing MAC addresses for quick resolution
    b) Storing IP addresses for fast look-up
    c) Storing routing information
    d) Storing DNS records
  5. Which of the following is a valid ARP request?
    a) A broadcast message sent to all devices to request the MAC address of a target IP
    b) A unicast message sent directly to the target device
    c) A multicast message requesting an IP address
    d) A ping request
  6. What does an ARP reply contain?
    a) The source IP address
    b) The source MAC address
    c) The target IP address
    d) All of the above
  7. Which command is used to view the ARP cache in Windows?
    a) ipconfig /all
    b) netstat -r
    c) arp -a
    d) route print
  8. How long do entries stay in the ARP cache by default?
    a) 30 seconds
    b) 1 hour
    c) 2 minutes
    d) Indefinitely
  9. What happens if an ARP request does not receive a reply?
    a) The network device retries indefinitely
    b) The device drops the communication
    c) The device initiates a DNS query
    d) The ARP cache is updated automatically
  10. How is an ARP poisoning attack typically performed?
    a) By intercepting DNS requests
    b) By sending false ARP replies to redirect traffic
    c) By changing MAC addresses
    d) By blocking ICMP requests

Answer Key

QnoAnswer (Option with text)
1b) The default subnet mask is 255.0.0.0
2b) 16 bits
3c) 192.0.0.0 to 223.255.255.255
4d) Class D
5b) Reserved for future use
6c) 255.0.0.0
7c) 256 networks
8b) Multicast addressing
9a) Unicast
10a) 65,534 hosts
11c) To divide a larger network into smaller networks
12c) The range of IP addresses in the subnet
13b) The number of network bits
14c) More subnets and fewer hosts
15b) 4 subnets
16a) 14 hosts
17b) 30 hosts
18a) 256 subnets
19b) 192.168.1.64
20b) 192.168.1.14
21b) To optimize IP address usage based on network size
22b) It enables the allocation of different subnet masks to different subnets
23b) When there is a need to optimize IP address usage across varying subnet sizes
24b) VLSM allows for different subnet masks in different subnets
25b) To mask out the host portion of an IP address
26a) 255.255.255.240
27a) 192.168.0.0
28b) 30 network bits
29a) 255.255.255.252
30a) 6
31b) To resolve IP addresses to MAC addresses
32b) Unicast communication
33b) ARP Request
34a) Storing MAC addresses for quick resolution
35a) A broadcast message sent to all devices to request the MAC address of a target IP
36d) All of the above
37c) arp -a
38b) 1 hour
39b) The device drops the communication
40b) By sending false ARP replies to redirect traffic

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top