321 Test 3 (Quizzes)
Which of the following is a private IP address range?
10.x.x.x
In the mask 255.255.255.0, how many 1s are there?
24
If your subnet part is 8 bots long, you can have ___ subnets
254
deciding what interface and to what device to send the packer back out is step ___ in the routing process
3
A mask has ___ bits
32
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
32
compared to the internet, carrier WANs ___
?
the DNS ____ record is for the host name's ___ address
A; IPv4
to use a leased line, the customer must have a ___ at each site
CSU/DSU
which of the following is more widely used?
ESP
four-way closes use ___ segments
FIN
SA protections are applied in the ___
IPsec protection
which of the following is most expensive to use?
MPLS
___ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm
NAT
an abrupt close uses a ___ segment
RST
Which is less expensive to implement?
SSL/TLS
IPsec is used for ___ VPNs
Site-to-Site and Remote Access. both A and B
In SNMP. the manager communicates directly with a ___
agent
WAN optimization devices are deployed ________.
at the ends of leased lines
a company has a domain name. what else must it have before is can make a website available to the public?
both A and B - a DNS server to host it's domain name - the website itself
which of the following affects what cellular throughput an individual user will receive?
both A and B - being in a moving car - being far from the cellsite
An MTSO ____
both A and B - controls cellsites in a cellular system - links mobile users to wired telephone customers
How does carrier ethernet differ from traditional ethernet?
both A and B - it is offered by carriers instead of being installed and managed by the company using it - it is for MAN and WAN services
Why is Carrier Ethernet popular?
both A and B - it uses familiar tech - is has attractive prices
traffic shaping reduces traffic by ___
both A and B - preventing certain undesirable traffic from entering the network - limiting the amount of certain undesirable traffic entering the network
In ADSL, the customer should have _____
both A and B - splitters -an ADSL modem
DSL offers
both A and B - voice transmission - data transmission
NAT
both A and B -allows a firm to have more internal IP addresses -provides some security
The domain name system ___
both A and B -is a way to find a host's IP address is your computer only knows the hosts's host name -is a general naming system for the internet
Which of the following receives rights of way for transmission beyond sights?
carriers
For their transmission medium, cable television companies primarily use ________.
coaxial cable
The first step in the routing process involves
comparing the packet's destination IP address to all rows
which of the following does the carrier NOT own?
customer premises equipment
two way amplifiers are needed for cable ___ service
data
compared to ADSL service, cable modem traditionally has been ____
faster and more expensive
In IPv6 addresses, ____ are seperated by ____
fields, colons
One-bit fields are called ____ fields and if it is not set, this means its value is ____
flag, 0
if a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ___
go through all three steps for each
for human reading, IPv6 addresses are written in ___ notation
hexadecimal
leaseline
high speed point to point, always on connection
which is NOT one of the three parts of a public IPv6 unicast address?
host part
router ports are called ___
interfaces
If no other row matches, the router will select the ___ row as its best match
last
A WAN is the network that ____
links different sites together
the PSTN core is organized as a _____
modified hierarchy
A border router connects different IP ___ and an internal router connects different IP ____
networks, subnets
In the mask /14, how many 1s are there? (8 / 16 / 24)
none of the above
What transmission medium do ALL DSL services use?
one-pair voice-grade UTP
Dynamic ________ protocols allow routers to transmit routing table information to one another.
routing
In the routing table, a ___ represents a route for a group of IP addresses
row
corporations wish to have ___ domain names
second-level
the second step in the routing process involves _____
selecting the nest-match row
in SNMP, companies are often reluctant to use ___ commands because of security dangers
set
Ping is for ___ messages
supervisory
for cost reasons, you should ____ where you can, _____ where you must
switch, route
an advantage of using DHCP to configure clients is that ___
the configuration information will be up-to-date
in a telephone system, the lines that connect customers to the nearest switch are called _____
the local loop
".com" is a ____
top-level domain
TCP/IP standards are at the ___
transport layer
In the IPv4 address 1.2.3.4, what is the network part?
we cannot say
which is a problem with IPv4 addresses?
we have run out of them
the difference between
which one is the UTP