CH 2
What is the Network Layer of the OSI Reference Model Responsible for --Physical Layer connectivity --Routing and delivery of IP packets --Formatting the data --Physical framing --None of the above
Formatting the Data
The most common type of ICMP message is ____
ping
What is another way used to describe Ethernet? --Collision detection --Sends traffic to all nodes on a hub --CSMA/CD --All of the above
All of the Above
Which of the following best describes the role of IP --Guaranteed delivery --Best effort at delivery --Establishes sessions by means of a handshake process --Is considered an OSI layer 2 protocol
Best effort at delivery
Botnets are used to bypass the functionality of a switch. --True --False
False
Which of the following makes UDP harder to scan for? --Low Overhead --Lack of startup and shutdown --Speed --Versatility
Lack of startup and shutdown
Which of the following best describes how ICMP is used --packet delivery --error detection and correction --Logical errors and diagnostics --IP packet delivery
Logical errors and diagnostics
What is a security vulnerability found in RIP --Slow convergence --Travels only 56 hops --no Authentication --Distance vector
No authentication
Which of the following statements most closely express the difference in routing and routable protocols --IP is a routing protocol, whereas RIP is a routable protocol --OSPF is a routing protocol, whereas IP is a routable protocol --BGP is used as a routable protocol, whereas RIP is a routing protocol --Routable protocols are used to define the best path form point A to point B, while routing protocols are used to transport the data
OSPF is a routing protocol, wherea IP is a routable protocol
Which of the following is not an attribute of OSPF: --Security --The use of IP multicasts to send out router updates --no limitation for hop count --Subject to route poisioning
Subject to route poisoning