0% found this document useful (0 votes)
19 views12 pages

DDC - Quiz Compilation Module 1 - Module 5

Uploaded by

Jaein Jang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views12 pages

DDC - Quiz Compilation Module 1 - Module 5

Uploaded by

Jaein Jang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

QUIZ Explanation: The Internet provides global

connections that enable networked devices


MODULE 1
(workstations and mobile devices) with different
1. How does BYOD change the way in which network technologies, such as Ethernet, DSL/cable,
businesses implement networks? and serial connections, to communicate. A private
network for an organization with LAN and WAN
 BYOD requires organizations to purchase connections is an intranet.
laptops rather than desktops.
4. What are two functions of end devices on a
 BYOD users are responsible for their own network? (Choose two.)
network security, thus reducing the need for
organizational security policies.  They originate the data that flows through
the network.
 BYOD devices are more expensive than
devices that are purchased by an organization.  They direct data over alternate paths in the
event of link failures.
 BYOD provides flexibility in where and
how users can access network resources.  They filter the flow of data to enhance
security.
Explanation: A BYOD environment requires an
organization to accommodate a variety of devices and  They are the interface between humans and
access methods. Personal devices, which are not under the communication network.
company control, may be involved, so security is
 They provide the channel over which the
critical. Onsite hardware costs will be reduced,
network message travels.
allowing a business to focus on delivering
collaboration tools and other software to BYOD users. Explanation: End devices originate the data that
flows through the network. Intermediary devices
direct data over alternate paths in the event of link
2. An employee wants to access the network of the failures and filter the flow of data to enhance security.
organization remotely, in the safest possible way. Network media provide the channel through which
What network feature would allow an employee to network messages travel.
gain secure remote access to a company network?
5. In which scenario would the use of a WISP be
 ACL recommended?

 IPS  an Internet cafe in a city

 VPN  a farm in a rural area without wired


broadband access
 BYOD
 any home with multiple wireless devices
Explanation: Virtual private networks (VPN) are
used to provide secure access to remote workers.  an apartment in a building with cable access to
the Internet
3. What is the Internet?
Explanation: Wireless Internet Service Providers
 It is a network based on Ethernet technology. (WISPs) are typically found in rural areas where DSL
 It provides network access for mobile devices. or cable access is not available. A dish or antenna on
the property of the subscriber connects wirelessly to a
 It provides connections through WISP transmitter, eliminating the need for physical
interconnected global networks. cabling outside the building.
 It is a private network for an organization with
LAN and WAN connections.
6. What characteristic of a network enables it to  grows in size without impacting existing
quickly grow to support new users and users
applications without impacting the performance of
 is not as reliable as a small network
the service being delivered to existing users?
 suitable for modular devices that allow for
 reliability
expansion
 scalability
 offers limited number of applications
 quality of service
Explanation: Scalable networks are networks that can
 accessibility grow without requiring costly replacement of existing
network devices. One way to make a network scalable
Explanation: Networks must be able to quickly grow
is to buy networking devices that are modular.
to support new users and services, without impacting
existing users and services. This ability to grow is 9. Which device performs the function of
known as scalability. determining the path that messages should take
through internetworks?
7. A college is building a new dormitory on its
campus. Workers are digging in the ground to  a router
install a new water pipe for the dormitory. A
 a firewall
worker accidentally damages a fiber optic cable
that connects two of the existing dormitories to the  a web server
campus data center. Although the cable has been
cut, students in the dormitories only experience a  a DSL modem
very short interruption of network services. What Explanation: A router is used to determine the path
characteristic of the network is shown here? that the messages should take through the network. A
 quality of service (QoS) firewall is used to filter incoming and outgoing
traffic. A DSL modem is used to provide Internet
 scalability connection for a home or an organization.
 security 10. Which two Internet connection options do not
require that physical cables be run to the building?
 fault tolerance
(Choose two.)
 integrity
 DSL
Explanation: Fault tolerance is the characteristic of a
 cellular
network which allows it to quickly respond to failures
of network devices, media, or services. Quality of  satellite
service refers to the measures taken to ensure that
network traffic requiring higher throughput receives  dialup
the required network resources. Scalability refers to  dedicated leased line
the ability of the network to grow to accommodate
new requirements. Security refers to protecting Explanation: Cellular connectivity requires the use of
networks and data from theft, alteration, or the cell phone network. Satellite connectivity is often
destruction. Integrity refers to the completeness of used where physical cabling is not available outside
something and is generally not used as a characteristic the home or business.
of networks in the same way as the other terms. 11. What type of network must a home user access
8. What are two characteristics of a scalable in order to do online shopping?
network? (Choose two.)  an intranet
 easily overloaded with increased traffic  the Internet
 an extranet personal laptops and smart phones. Which
networking trend does this describe?
 a local area network
 cloud computing
Explanation: Home users will go online shopping
over the Internet because online vendors are accessed  online collaboration
through the Internet. An intranet is basically a local
 bring your own device
area network for internal use only. An extranet is a
network for external partners to access certain  video conferencing
resources inside an organization. A home user does
not necessarily need a LAN to access the Internet. For Explanation: BYOD allows end users to use personal
example, a PC connects directly to the ISP through a tools to access the corporate network. Allowing this
modem. trend can have major impacts on a network, such as
security and compatibility with corporate software and
12. During a routine inspection, a technician devices.
discovered that software that was installed on a
computer was secretly collecting data about 15. What is an ISP?
websites that were visited by users of the  It is a standards body that develops cabling
computer. Which type of threat is affecting this and wiring standards for networking.
computer?
 It is a protocol that establishes how computers
 DoS attack within a local network communicate.
 identity theft  It is an organization that enables
 spyware individuals and businesses to connect to the
Internet.
 zero-day attack
 It is a networking device that combines the
Explanation: Spyware is software that is installed on functionality of several different networking
a network device and that collects information. devices in one.
13. Which term refers to a network that provides Explanation: An ISP, or Internet Service Provider, is
secure access to the corporate offices by suppliers, an organization that provides access to the Internet for
customers and collaborators? businesses and individuals.
 Internet
 intranet MODULE 2
 extranet 1. Which functionality is provided by DHCP?
 extendednet  automatic assignment of an IP address to
each host
Explanation: The term Internet refers to the
worldwide collection of connected networks. Intranet  remote switch management
refers to a private connection of LANs and WANS
that belong to an organization and is designed to be  translation of IP addresses to domain names
accessible to the members of the organization,  end-to-end connectivity test
employees, or others with authorization. Extranets
provide secure and safe access to suppliers, customers, Explanation: DHCP provides dynamic and automatic
and collaborators. Extendednet is not a type of IP address assignment to hosts.
network. 2. Which two functions are provided to users by
14. A large corporation has modified its network to the context-sensitive help feature of the Cisco IOS
allow users to access network resources from their CLI? (Choose two.)
 providing an error message when a wrong 5. When a hostname is configured through the
command is submitted Cisco CLI, which three naming conventions are
part of the guidelines? (Choose three.)
 displaying a list of all available commands
within the current mode  the hostname should be fewer than 64
characters in length
 allowing the user to complete the remainder of
an abbreviated command with the TAB key  the hostname should be written in all lower
case characters
 determining which option, keyword, or
argument is available for the entered  the hostname should contain no spaces
command
 the hostname should end with a special
 selecting the best command to accomplish a character
task
 the hostname should begin with a letter
Explanation: Context-sensitive help provides the user
Explanation: A hostname can be configured with
with a list of commands and the arguments associated
upper or lower case characters and should end with a
with those commands within the current mode of a
letter or digit, not a special character. A hostname
networking device. A syntax checker provides error
should start with a letter and no space is allowed for a
checks on submitted commands and the TAB key can
hostname.
be used for command completion if a partial command
is entered.
3. Which memory location on a Cisco router or 6. What is the function of the shell in an OS?
switch stores the startup configuration file?
 It interacts with the device hardware.
 RAM
 It interfaces between the users and the
 ROM kernel.
 NVRAM  It provides dedicated firewall services.
 flash  It provides the intrusion protection services for
the device.
Explanation: The startup configuration file of a Cisco
router or switch is stored in NVRAM, which is Explanation: Most operating systems contain a shell
nonvolatile memory. and a kernel. The kernel interacts with the hardware
and the shell interfaces between the kernel and the
4. To what subnet does the IP address 10.1.100.50
users.
belong if a subnet mask of 255.255.0.0 is used?
7. A router with a valid operating system contains a
 10.1.0.0
configuration file stored in NVRAM. The
 10.0.0.0 configuration file has an enable secret password
but no console password. When the router boots
 10.1.100.32
up, which mode will display?
 10.1.100.0
 global configuration mode
Explanation: The purpose of a subnet mask is to
 setup mode
separate the network portion of the address from the
host portion of the IP address. The network portion of  Oprivileged EXEC mode
the IP address is identified by all binary 1s in the
 user EXEC mode
subnet mask. Using a subnet mask of 255.255.0.0
identifies the first two octets of the IP address as the Explanation: If a Cisco IOS device has a valid IOS
network portion. and a valid configuration file, it will boot into user
EXEC mode. A password will be required to enter  to make a changed configuration the new
privileged EXEC mode. startup configuration
8. An administrator has just changed the IP Explanation: Usually, changes are made to a running
address of an interface on an IOS device. What else configuration in RAM and copied to NVRAM.
must be done in order to apply those changes to the However, in this case, the technician wants to copy a
device? previously saved configuration from NVRAM into
RAM in order to make changes to it.?
 Copy the running configuration to the startup
configuration file. 11. Which statement is true about the running
configuration file in a Cisco IOS device?
 Copy the information in the startup
configuration file to the running configuration.  It affects the operation of the device
immediately when modified.
 Reload the device and type yes when
prompted to save the configuration.  It is stored in NVRAM.
 Nothing must be done. Changes to the  It should be deleted using the erase running-
configuration on an IOS device take effect config command.
as soon as the command is typed correctly
 It is automatically saved when the router
and the Enter key has been pressed.
reboots.
Explanation: Changes to router and switch
Explanation: As soon as configuration commands are
configurations take effect as soon as the command is
entered into a router, they modify the device
entered. For this reason, it is very important that
immediately. Running configuration files can not be
changes to live production devices are always
deleted nor are they saved automatically.
carefully planned before being implemented. If
commands are entered that render the device unstable 12. Which two statements are true regarding the
or inaccessible, the device may have to be reloaded, user EXEC mode? (Choose two.)
resulting in network downtime.
 All router commands are available.
9. Which memory location on a Cisco router or
switch will lose all content when the device is  Global configuration mode can be accessed by
restarted? entering the enable command.

 ROM  The device prompt for this mode ends with


the “>” symbol.
 flash
 Interfaces and routing protocols can be
 NVRAM configured.
 RAM  Only some aspects of the router
configuration can be viewed.
Explanation: RAM is volatile memory and will lose
all contents if the router or switch is restarted or Explanation: User EXEC mode limits access to
shutdown. some show and debug commands. It is the first level
of user interface encountered when configuring a
10. Why would a technician enter the
router and is intended for investigation of certain
command copy startup-config running-config?
functions of the device. The User EXEC prompt is
 to remove all configurations from the switch identified with the “>” symbol.
 to save an active configuration to NVRAM 13. Which type of access is secured on a Cisco
router or switch with the enable secret command?
 to copy an existing configuration into RAM
 virtual terminal
 privileged EXEC the model, the upper layer information is encapsulated
into the data field of the next protocol. For example,
 AUX port
before an IP packet can be sent, it is encapsulated in a
 console line data link frame at Layer 2 so that it can be sent over
the physical medium.
Explanation: The enable secret command secures
access to the privileged EXEC mode of a Cisco router 3. What process is used to place one message inside
or switch. another message for transfer from the source to the
destination?
14. What is the default SVI on a Cisco switch?
 access control
 VLAN1
 decoding
 VLAN99
 encapsulation
 VLAN100
 flow control
 VLAN999
Explanation: Encapsulation is the process of placing
Explanation: Layer 2 switches use switch virtual one message format into another message format. An
interfaces (SVIs) to provide a means for remote access example is how a packet is placed in its entirety into
over IP. The default SVI on a Cisco switch is VLAN1. the data field as it is encapsulated into a frame.
4. A web client is sending a request for a webpage
MODULE 3 to a web server. From the perspective of the client,
what is the correct order of the protocol stack that
1. What process is used to receive transmitted data is used to prepare the request for transmission?
and convert it into a readable message?
 HTTP, IP, TCP, Ethernet
 access control
 HTTP, TCP, IP, Ethernet
 decoding
 Ethernet, TCP, IP, HTTP
 encapsulation
 Ethernet, IP, TCP, HTTP
 flow control
Explanation:
Explanation: Decoding is the process of receiving 1. HTTP governs the way that a web server and client
transmitted data and reversing the encoding process to interact.
interpret the information. An example is a person that 2. TCP manages individual conversations between
listens to a voicemail and decodes the sounds to web servers and clients.
understand the received message 3. IP is responsible for delivery across the best path to
2. What is done to an IP packet before it is the destination.
transmitted over the physical medium? 4. Ethernet takes the packet from IP and formats it for
transmission.
 It is tagged with information guaranteeing
reliable delivery. 5. What are two benefits of using a layered
network model? (Choose two.)
 It is segmented into smaller individual pieces.
 It assists in protocol design.
 It is encapsulated into a TCP segment.
 It speeds up packet delivery.
 It is encapsulated in a Layer 2 frame.
 It prevents designers from creating their own
Explanation: When messages are sent on a network, model.
the encapsulation process works from the top of the
OSI or TCP/IP model to the bottom. At each layer of
 It prevents technology in one layer from  source MAC address
affecting other layers.
 source IP address
 It ensures a device at one layer can function at
Explanation: The destination IP address is used for
the next higher layer.
end-to-end delivery of data to a remote network. The
Explanation: Some vendors have developed their destination MAC address is used for delivery on a
own reference models and protocols. Today, if a local network. The destination port number identifies
device is to communicate on the Internet, the device the application that should process the data at the
must use the TCP/IP model. The benefits of using a destination. Source addresses identify the sender of
layered model are as follows: the data.
 assists in protocol design 8. What is the general term that is used to describe
a piece of data at any layer of a networking model?
 fosters competition between vendors
 frame
 prevents a technology that functions at one
layer from affecting any other layer  packet
 provides a common language for describing  protocol data unit
network functionality
 segment
 helps in visualizing the interaction between
Explanation: The term protocol data unit (PDU) is
each layer and protocols between each layer
used to describe a piece of data at any layer of a
6. What is the purpose of protocols in data networking model. A packet is the PDU at the network
communications? layer. A frame is the data link layer PDU. A segment is
the PDU at the transport layer.
 specifying the bandwidth of the channel or
medium for each type of communication 9. Which two protocols function at the internet
layer? (Choose two.)
 specifying the device operating systems that
will support the communication  POP
 providing the rules required for a specific  BOOTP
type of communication to occur
 ICMP
 dictating the content of the message sent
 IP
during communication
 PPP
Explanation: Protocols provide rules that define how
a message is transmitted across a network. Explanation: ICMP and IP both function at the
Implementation requirements such as electronic and internet layer, whereas PPP is a network access layer
bandwidth details for data communication are protocol, and POP and BOOTP are application layer
specified by standards. Operating systems are not protocols.
specified by protocols, but will implement protocols.
Protocols determine how and when to send a message 10. Which layer of the OSI model defines services
but they do not control the contents of a message. to segment and reassemble data for individual
communications between end devices?
7. Which logical address is used for delivery of data
to a remote network?  application

 destination MAC address  presentation

 destination IP address  session

 destination port number  transport


 network  unicast
Explanation: The OSI model consists of seven layers:  allcast
application, presentation, session, transport, network,
Explanation: Broadcast communication is a one-to-
data link, and physical. The transport layer defines
all communication. A unicast communication is a one-
services to segment, transfer, and reassemble the data
to-one communication. Multicast is a one-to-many
for individual communications between the end
communication where the message is delivered to a
devices.
specific group of hosts. Allcast is not a standard term
11. Which type of communication will send a to describe message delivery.
message to a group of host destinations
14. In computer communication, what is the
simultaneously?
purpose of message encoding?
 broadcast
 to convert information to the appropriate
 multicast form for transmission
 unicast  to interpret information
 anycast  to break large messages into smaller frames
Explanation: Multicast is a one-to-many  negotiate correct timing for successful
communication where the message is delivered to a communication
specific group of hosts. Broadcast communication is a
Explanation: Before a message is sent across a
one-to-all communication. A unicast communication is
network it must first be encoded. Encoding is the
a one-to-one communication. Anycast is an IPv6 term
process of converting the data message into another
and is the sending of data in a one-to-nearest
format suitable for transmission across the physical
communication.
medium. Each bit of the message is encoded into a
12. Which three acronyms/initialisms represent pattern of sounds, light waves, or electrical impulses
standards organizations? (Choose three.) depending on the network media over which the bits
are transmitted. The destination host receives and
 IANA
decodes the signals in order to interpret the message.
 TCP/IP
15. Which message delivery option is used when all
 IEEE devices need to receive the same message
simultaneously?
 IETF
 duplex
 OSI
 unicast
 MAC
 multicast
Explanation: TCP/IP is a protocol stack that contains
a lot of other protocols such as HTTP, FTP, and DNS.  broadcast
The TCP/IP protocol stack is required to be used when
Explanation: When all devices need to receive the
communicating on the Internet. A MAC address is an
same message simultaneously, the message would be
address that is burned into an Ethernet network
delivered as a broadcast. Unicast delivery occurs
card. OSI is the 7 layer model that is used to explain
when one source host sends a message to one
how networking works.
destination host. The sending of the same message
13. What type of communication will send a from a host to a group of destination hosts is multicast
message to all devices on a local area network? delivery. Duplex communications refers to the ability
of the medium to carry messages in both directions.
 broadcast
16. What three requirements are defined by the
 multicast protocols used in network communcations to allow
message transmission across a network? (Choose  The end-user device requires a dedicated
three.) connection because of performance
requirements.
 connector specifications
 The end-user device needs mobility when
 message encoding
connecting to the network.
 media selection
 The end-user device area has a high
 message size concentration of RFI.

 delivery options 3. A network administrator is troubleshooting


connectivity issues on a server. Using a tester, the
 end-device installation administrator notices that the signals generated by
17. What type of delivery uses data link layer the server NIC are distorted and not usable. In
addresses? which layer of the OSI model is the error
categorized?
 remote delivery
 presentation layer
 local and remote delivery
 network layer
 local delivery
 physical layer
 remote delivery using routers
 data link layer
18. What layer of the TCP/IP protocol model
determines the best path through the network? 4. What type of cable is used to connect a
workstation serial port to a Cisco router console
 application port?
 transport  crossover
 internet  rollover
 network access  straight-through
 coaxial
MODULE 4 5. Which type of UTP cable is used to connect a PC
1. Which standards organization oversees to a switch port?
development of wireless LAN standards?  console
 IANA  rollover
 IEEE  crossover
 IOS  straight-through
 TIA 6. What is the definition of bandwidth?
 the measure of the transfer of bits across the
2. A network administrator is designing a new media over a given period of time
network infrastructure that includes both wired  the speed at which bits travel on the network
and wireless connectivity. Under which situation
would a wireless connection be recommended?  the amount of data that can flow from one
place to another in a given amount of time
 The end-user device only has an Ethernet NIC.
 the measure of usable data transferred over a
given period of time
7. Which statement correctly describes frame  the measure of the usable data transferred
encoding? across the media
 It uses the characteristic of one wave to  the measure of the bits transferred across
modify another wave. the media over a given period of time
 It transmits data signals along with a clock  the time it takes for a message to get from
signal which occurs at evenly spaced time sender to receiver
durations.
11. What is one advantage of using fiber optic
 It generates the electrical, optical, or wireless cabling rather than copper cabling?
signals that represent the binary numbers of
 It is usually cheaper than copper cabling.
the frame.
 It is able to be installed around sharp bends.
 It converts bits into a predefined code in
order to provide a predictable pattern to  It is easier to terminate and install than copper
help distinguish data bits from control bits. cabling.
8. What is a characteristic of UTP cabling?  It is able to carry signals much farther than
copper cabling.
 cancellation
12. What is the purpose of the OSI physical layer?
 cladding
 controlling access to media
 immunity to electrical hazards
 transmitting bits across the local media
 woven copper braid or metallic foil
 performing error detection on received frames
9. A wireless LAN is being deployed inside the new
one room office that is occupied by the park  exchanging frames between nodes over
ranger. The office is located at the highest part of physical network media
the national park. After network testing is
complete, the technicians report that the wireless 13. Why are two strands of fiber used for a single
LAN signal is occasionally affected by some type of fiber optic connection?
interference. What are two possible causes of the  The two strands allow the data to travel for
signal distortion? (Choose two.) longer distances without degrading.
 the microwave oven  They prevent crosstalk from causing
 the large number of trees that surround the interference on the connection.
office  They increase the speed at which the data can
 the cellular phones that are used by the travel.
employees  They allow for full-duplex connectivity
 the elevated location where the wireless LAN 14. Which characteristic describes crosstalk?
was installed
 the distortion of the network signal from
 the number of wireless devices that are used in fluorescent lighting
the wireless LAN
 the distortion of the transmitted messages
10. What is indicated by the term throughput? from signals carried in adjacent wires
 the guaranteed data transfer rate offered by an  the weakening of the network signal over long
ISP cable lengths
 the capacity of a particular medium to carry  the loss of wireless signal over excessive
data distance from the access point
15. Which procedure is used to reduce the effect of  The branch sites are connected to a central
crosstalk in copper cables? site through point-to-point links.
 requiring proper grounding connections
 twisting opposing circuit wire pairs
together
MODULE 5
 wrapping the bundle of wires with metallic
1. What is the decimal equivalent of 0xC9?
shielding
 185
 designing a cable infrastructure to avoid
crosstalk interference  200
 avoiding sharp bends during installation  201
16. Which statement describes a characteristic of  199
the frame header fields of the data link layer?
2. Which is a valid hexadecimal number?
 They all include the flow control and logical
connection fields.  f

 Ethernet frame header fields contain Layer 3  g


source and destination addresses.  h
 They vary depending on protocols.  j
 They include information on user applications. 4. How many bits are in an IPv4 address?
17. Which two factors influence the method that is  32
used for media access control? (Choose two.)
 64
 how data is generated by end devices
applications  128

 how the connection between nodes appears  256


to the data link layer 5. Which two statements are correct about IPv4
 how signals are encoded by the NICs on end and IPv6 addresses? (Choose two.)
devices  IPv6 addresses are represented by
 how nodes share the media hexadecimal numbers.

 how the IP protocol forwards the packet to the  IPv4 addresses are represented by
destination hexadecimal numbers.

18. What is a characteristic of a WAN hub-and-  IPv6 addresses are 32 bits in length.
spoke topology?  IPv4 addresses are 32 bits in length.
 It requires that some of the branch sites be  IPv4 addresses are 128 bits in length.
interconnected through point-to-point links.
 IPv6 addresses are 64 bits in length.
 It requires that every site be interconnected to
each other through point-to-point links. 6. Which IPv4 address format was created for ease
of use by people and is expressed as 201.192.1.14?
 All sites require a hub device that connects to
a router.  binary
 dotted decimal
 hexadecimal 11. What is the binary representation for the
decimal number 173?
 ASCII
 10100111
7. What is the dotted decimal representation of the
IPv4 address  10100101
11001011.00000000.01110001.11010011?
 10101101
 192.0.0.199
 10110101
 198.51.100.201
Explanation: decimal 173 = 128 + 0 + 32 + 0 + 8 + 4
 203.0.113.211 +0+1
 209.165.201.223 12. Given the binary address of 11101100 00010001
00001100 00001010, which address does this
8. What is the decimal equivalent of the binary
represent in dotted decimal format?
number 10010101?
 234.17.10.9
 149
 234.16.12.10
 157
 236.17.12.6
 168
 236.17.12.10
 192
Explanation: The binary number 11101100 00010001
Explanation: Binary 10010101 maps to 149 in
00001100 00001010 translates to 236.17.12.10.
decimal. 128+16+4+1 = 149
9. What is the decimal equivalent of the hex
number 0x3F? 13. How many binary bits exist within an IPv6
address?
 63
 32
 77
 48
 87
 64
 93
 128
Explanation:
Hex 0x3F is 63 in decimal.  256
(3*16)+(15*1) = 63
14. What is the binary equivalent of the decimal
10. What is the dotted decimal representation of number 232?
the IPv4 address which is represented as the binary
 11101000
string 00001010.01100100.00010101.00000001?
 11000110
 10.100.21.1
 10011000
 10.10.20.1
 11110010
 100.10.11.1
 100.21.10.1
Explanation: Converting the binary string of
00001010.01100100.00010101.00000001 to dotted
decimal gives 10.100.21.1

You might also like