Master IP Addressing and Subnetting for Network Certification Success Understanding IP Addressing, subnetting techniques, subnet masks, ARP, routing, and NAT is crucial for networking professionals. This set of MCQs will test your knowledge on essential concepts to help you prepare for certification exams in network management and IP configuration.
IP Address Classes and Types
Which of the following is true about a Class A IP address? a) It starts with a binary 1 b) The default subnet mask is 255.0.0.0 c) It supports 254 hosts per network d) It is used for small private networks
How many host bits are in a Class B IP address? a) 8 bits b) 16 bits c) 24 bits d) 32 bits
The Class C IP address range is from: a) 0.0.0.0 to 127.255.255.255 b) 128.0.0.0 to 191.255.255.255 c) 192.0.0.0 to 223.255.255.255 d) 224.0.0.0 to 239.255.255.255
Which Class of IP address is primarily used for multicast communications? a) Class A b) Class B c) Class C d) Class D
A Class E IP address range is used for: a) Private networks b) Reserved for future use c) Multicast addresses d) Public addresses
Which of the following represents the default subnet mask for a Class A IP address? a) 255.255.255.0 b) 255.255.0.0 c) 255.0.0.0 d) 255.255.255.255
How many networks can be created in a Class C IP range with the default subnet mask? a) 128 networks b) 16,777,216 networks c) 256 networks d) 65,536 networks
What is the primary purpose of the Class D IP address range? a) Unicast addressing b) Multicast addressing c) Private network addressing d) Broadcast addressing
Which address type is used for communication within the same local network? a) Unicast b) Multicast c) Broadcast d) Anycast
The Class B IP address range supports how many hosts per network? a) 65,534 hosts b) 256 hosts c) 65,535 hosts d) 16,777,216 hosts
Subnetting Techniques
What is the main reason for subnetting in networking? a) To combine multiple networks into one b) To increase the number of available IP addresses c) To divide a larger network into smaller networks d) To improve the speed of the network
In subnetting, what does a subnet mask determine? a) The number of available hosts b) The size of the network c) The range of IP addresses in the subnet d) The maximum number of subnets possible
In a subnetted network, the number of available subnets is determined by: a) The number of host bits b) The number of network bits c) The number of address bits d) The number of borrowed bits
What is the result of borrowing bits from the host portion of an IP address in subnetting? a) More hosts in the subnet b) Fewer subnets c) More subnets and fewer hosts d) No change in the subnet
How many subnets can be created by borrowing 3 bits from the host part of a Class C address? a) 2 subnets b) 4 subnets c) 6 subnets d) 8 subnets
What is the maximum number of hosts that can be accommodated in a subnet with a subnet mask of 255.255.255.240? a) 14 hosts b) 30 hosts c) 16 hosts d) 254 hosts
Which of the following is the correct number of hosts for a subnet with a subnet mask of 255.255.255.224? a) 64 hosts b) 30 hosts c) 50 hosts d) 62 hosts
The process of subnetting a Class B IP address with a subnet mask of 255.255.255.0 creates how many subnets? a) 256 subnets b) 512 subnets c) 1,024 subnets d) 65,536 subnets
What is the network address of the subnet 192.168.1.64/26? a) 192.168.1.0 b) 192.168.1.64 c) 192.168.1.128 d) 192.168.1.192
Which of the following is a valid IP address in the 192.168.1.0/28 subnet? a) 192.168.1.255 b) 192.168.1.14 c) 192.168.1.16 d) 192.168.1.32
Subnet Masks and VLSM (Variable Length Subnet Mask)
What is the primary advantage of using Variable Length Subnet Mask (VLSM)? a) To reduce the number of IP addresses in the subnet b) To optimize IP address usage based on network size c) To make network routing more complex d) To create multiple subnets within a single Class A network
How does VLSM affect IP address allocation? a) It allows for the use of a single subnet mask for all subnets b) It enables the allocation of different subnet masks to different subnets c) It prevents the use of private IP addresses d) It forces all networks to have the same size
In which situation would VLSM be most beneficial? a) When all subnets need to have the same number of hosts b) When there is a need to optimize IP address usage across varying subnet sizes c) When configuring a Class C network d) When only a single subnet is required
How is VLSM different from traditional subnetting? a) VLSM uses the same subnet mask across all subnets b) VLSM allows for different subnet masks in different subnets c) VLSM is used only for Class A networks d) VLSM uses more host bits for subnetting
What is the main purpose of a subnet mask in IP networking? a) To identify the source IP address b) To mask out the host portion of an IP address c) To determine the class of the IP address d) To route traffic between different networks
Which subnet mask would allow for the most number of subnets in a Class C network? a) 255.255.255.240 b) 255.255.255.0 c) 255.255.255.192 d) 255.255.255.255
What is the network address of a 192.168.0.0/25 subnet? a) 192.168.0.0 b) 192.168.0.127 c) 192.168.0.64 d) 192.168.0.128
What does the /30 in the subnet mask 255.255.255.252 represent? a) 30 host bits b) 30 network bits c) 30 subnets d) 30 bits allocated for routing
Which subnet mask is used for dividing a network into smaller subnets with a minimum of 2 usable host IP addresses? a) 255.255.255.252 b) 255.255.255.240 c) 255.255.255.224 d) 255.255.255.0
How many host addresses are available in a /29 subnet? a) 6 b) 8 c) 2 d) 4
Address Resolution Protocol (ARP)
What is the primary function of the ARP protocol? a) To convert domain names to IP addresses b) To resolve IP addresses to MAC addresses c) To convert MAC addresses to IP addresses d) To manage routing tables in routers
ARP is used in which type of network communication? a) Broadcast communication b) Unicast communication c) Multicast communication d) Anycast communication
In the ARP process, what is sent to request the MAC address for a given IP address? a) ARP Reply b) ARP Request c) ARP Broadcast d) ARP Table
What is the ARP cache used for? a) Storing MAC addresses for quick resolution b) Storing IP addresses for fast look-up c) Storing routing information d) Storing DNS records
Which of the following is a valid ARP request? a) A broadcast message sent to all devices to request the MAC address of a target IP b) A unicast message sent directly to the target device c) A multicast message requesting an IP address d) A ping request
What does an ARP reply contain? a) The source IP address b) The source MAC address c) The target IP address d) All of the above
Which command is used to view the ARP cache in Windows? a) ipconfig /all b) netstat -r c) arp -a d) route print
How long do entries stay in the ARP cache by default? a) 30 seconds b) 1 hour c) 2 minutes d) Indefinitely
What happens if an ARP request does not receive a reply? a) The network device retries indefinitely b) The device drops the communication c) The device initiates a DNS query d) The ARP cache is updated automatically
How is an ARP poisoning attack typically performed? a) By intercepting DNS requests b) By sending false ARP replies to redirect traffic c) By changing MAC addresses d) By blocking ICMP requests
Answer Key
Qno
Answer (Option with text)
1
b) The default subnet mask is 255.0.0.0
2
b) 16 bits
3
c) 192.0.0.0 to 223.255.255.255
4
d) Class D
5
b) Reserved for future use
6
c) 255.0.0.0
7
c) 256 networks
8
b) Multicast addressing
9
a) Unicast
10
a) 65,534 hosts
11
c) To divide a larger network into smaller networks
12
c) The range of IP addresses in the subnet
13
b) The number of network bits
14
c) More subnets and fewer hosts
15
b) 4 subnets
16
a) 14 hosts
17
b) 30 hosts
18
a) 256 subnets
19
b) 192.168.1.64
20
b) 192.168.1.14
21
b) To optimize IP address usage based on network size
22
b) It enables the allocation of different subnet masks to different subnets
23
b) When there is a need to optimize IP address usage across varying subnet sizes
24
b) VLSM allows for different subnet masks in different subnets
25
b) To mask out the host portion of an IP address
26
a) 255.255.255.240
27
a) 192.168.0.0
28
b) 30 network bits
29
a) 255.255.255.252
30
a) 6
31
b) To resolve IP addresses to MAC addresses
32
b) Unicast communication
33
b) ARP Request
34
a) Storing MAC addresses for quick resolution
35
a) A broadcast message sent to all devices to request the MAC address of a target IP
36
d) All of the above
37
c) arp -a
38
b) 1 hour
39
b) The device drops the communication
40
b) By sending false ARP replies to redirect traffic