Chaper 9
Which of the following would be an SNMP object? number of rows in routing table a managed switch both number of rows in routing table and a managed switch neither number of rows in routing table nor a managed switch
number of rows in routing table
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? 16 bits 32 bits 64 bits None of these
32 bits
In an IPv6 global unicast address, the interface ID is ________ bits long. 32 64 128 It varies.
64
Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? 6 8 7 5
8
Which of the following is a private IP address range? 10.x.x.x 128.171.x.x both 10.x.x.x and 128.171.x.x neither 10.x.x.x nor 128.171.x.x
10.x.x.x
If your subnet part is 8 bits long, you can have ________ subnets. 128 254 256 64
254
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? 14 16 254 None of these
254
How many DNS root servers are there? 1 2 13 10
13
In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? 6 7 8 None of these
8
IPsec provides protection in two modes of operation; one of these two modes is ________. data link mode 802.1X mode network mode transport mode
transport mode
________ is a general naming system for the Internet. DNS NAT Dotted decimal notation DHCP
DNS
Which of the following can route non-IP packets? OSPF EIGRP both OSPF and EIGRP neither OSPFA nor EIGRP
EIGRP
In SNMP, companies are often reluctant to use ________ commands because of security dangers. Set request trap Get
Get
Which is less expensive to implement? SSL/TLS IPsec Both cost about the same to implement.
SSL/TLS
The domain name system ________. is a way to find a host's IP addresses if your computer only knows the host's host name is a general naming system for the Internet both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet neither is a way to find a host's IP addresses if your computer only knows the host's host name nor is a general naming system for the Internet
both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet
IPsec is used for ________ VPNs. remote-access site-to-site both remote-access and site-to-site neither remote-access nor site-to-site
both remote-access and site-to-site
SNMPv1 uses ________ for authentication. community names digital certificates and digital signatures a different password for each manager-agent pair All of these
community names
Pinging is to send ICMP ________ messages to the target host. ping error advisement echo request echo
echo request
To see if a target host can be reached, you normally would send it an ICMP ________ message. echo request error advisement either echo request or error advisement neither echo request nor error advisement
echo request
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. 0000 the interface ID fffe the subnet ID
fffe
If a host is to be able to communicate via IPv4 and IPv6, it is said to ________. be IP-agile be IPv6-ready be bilingual have a dual-stack
have a dual-stack
Which is NOT one of the three parts of a public IPv6 unicast address? subnet ID routing prefix host part All of these are parts in a public IPv6 unicast address.
host part
The part of an IPv6 global unicast address that designates the host is called the ________. host part interface ID routing prefix None of these
interface ID
A company is free to select whatever ________ dynamic routing protocol it wishes. interior exterior both interior and exterior neither interior nor exterior
interior
hich of the following is true about NAT? It can enhance security. It presents problems for some protocols. both It can enhance security and It presents problems for some protocols neither It can enhance security nor It presents problems for some protocols
neither It can enhance security nor It presents problems for some protocols
IP is reliable because of ________. echo and echo reply messages error advisement messages both echo and echo reply messages and error advisement messages neither echo and echo reply messages nor error advisement messages
neither echo and echo reply messages nor error advisement messages
".com" is a ________. root domain top-level domain second-level domain None of these
top-level domain
Client PCs must have digital certificates in ________. transport mode tunnel mode both transport mode and tunnel mode neither transport mode nor tunnel mode
transport mode
Which mode of IPsec may be more expensive if a company has a large number of computers? transport mode tunnel mode Both transport mode and tunnel mode are equally expensive.
transport mode
A company receives its domain name from ________. its ISP a domain registrar IETF its parents
a domain registrar
Today, it can be problematic to have only a single IPv6 stack because ________. a single IPv4 stack is out of date a single IPv6 stack could not communicate with a single IPv4 stack a dual stack has become a common solution All of these
a single IPv6 stack could not communicate with a single IPv4 stack
In tunnel mode, IPsec provides protection ________. all the way between the two hosts only between the IPsec servers both all the way between the two hosts and only between the IPsec servers neither all the way between the two hosts nor only between the IPsec servers
only between the IPsec servers
The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. protection over only part of the route higher cost both protection over only part of the route and higher cost neither protection over only part of the route nor higher cost
protection over only part of the route
The highest-level DNS servers are called ________. root servers top-level servers both root servers and top-level servers neither root servers nor top-level servers
root servers
Most corporations wish to have ________ domain names. top-level second-level third-level None of these
second-level
In IPsec, agreements about how security will be done are called ________. tranches security associations service-level agreements security contracts
security associations
________ is used for supervisory messages at the internet layer. DNS DHCP TCP ICMP
ICMP
________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. DNS NAT DHCP None of these
NAT
Which of the following would be an SNMP object? number of rows in routing table system uptime (since last reboot) both number of rows in routing table and system uptime (since last reboot) neither number of rows in routing table nor system uptime (since last reboot)
both number of rows in routing table and system uptime (since last reboot)
".edu" is a ________. root domain top-level domain second-level domain None of these
top-level domain