Data Comm - Chapter 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) None of the above

B

A company receives its domain name from ________. A) the IETF B) its ISP C) a domain registrar D) none of the above

C

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000

C

IPsec is a(n) ________ layer standard. A) physical B) data link C) internet D) all of the above

C

IPsec is used for ________ VPNs. A) remote-access B) site-to-site C) both A and B D) neither A nor B

C

In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) none of the above

C

In stateless autoconfiguration, providing the address of DNS servers is ________. A) unnecessary B) mandatory C) optional D) impossible

C

Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) both A and B D) neither A nor B

C

Stateless autoconfiguration can be used to ________. A) change all subnet IDs in a network B) change all routing prefixes in a network C) both A and B D) neither A nor B

C

The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B D) neither A nor B

C

The management information base (MIB) is a(n) ________. A) database schema B) actual database C) either A or B D) neither A nor B

C

To configure itself, a client PC running IPv6 can configure itself using ________. A) DHCP B) stateless autoconfiguration C) both A and B D) neither A nor B

C

Which of the following can be used within a firm A) private IP addresses B) public IP addresses C) both A and B D) neither A nor B

C

Which of the following is true about NAT? A) it can enhance security B) it presents problems for some protocols C) both A and B D) neither A nor B

C

Which of the following would be an SNMP object? A) number of rows in routing table B) system uptime (since last reboot) C) both A and B D) neither A nor B

C

Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have? A) 8 B) 16 C) 254 D) 63534

C

Client PCs must have digital certificates in _________. A) transport mode B) tunnel mode C) both A and B D) neither A nor B

A

DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve. A) ranges B) scopes C) spans D) domains

A

NAT enhances security by preventing ________. A) sniffers from learning internal IP addresses B) encryption C) both A and B D) neither A nor B

A

The IEEE calls 64-bit interface addresses ________. A) extended unique identifiers B) interface IDs C) MAC addresses D) extended MAC addresses

A

The highest-level DNS servers are called ________. A) root servers B) top-level servers C) both A and B D) neither A nor B

A

The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. A) protection over only part of the route B) higher cost C) both A and B D) neither A nor B

A

The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) both A and B

A

Which is less expensive to implement? A) SSL/TLS B) IPsec C) Both cost about the same to implement.

A

Which mode of IPsec is more expensive? A) transport mode B) tunnel mode C) Both A and B are equally expensive

A

Which of the following are usually given dynamic IP addresses? A) clients B) servers C) both A and B D) neither A nor B

A

".com" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above

B

".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above

B

A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard. A) command B) trap C) alarm D) all of the above

B

Access to a router is needed to create a ________. A) link local IPv6 address B) global unicast IPv6 address C) both A and B D) neither A nor B

B

Clients normally get their IP addresses from ________. A) DNS servers B) DHCP servers C) directory servers D) identity servers

B

Corporations most wish to have ________ domain names. A) top-level B) second-level C) third-level D) none of the above

B

If a host is to be able to communicate via IPv4 and IPv6, it is said to ________. A) be bilingual B) have a dual stack C) be IPv6-ready D) be fully compliant

B

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits B) 32 bits C) 64 bits D) We cannot say.

B

In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B

B

In MPLS, the interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above

B

In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) trap D) request

B

In SNMP, the ________ creates responses. A) manager B) agent C) both A and B D) neither A nor B

B

In SNMP, the ________ creates traps. A) manager B) agent C) both A and B D) neither A nor B

B

In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) both A and B D) neither A nor B

B

In SNMP, the manager creates ________. A) traps B) GET commands C) both A and B D) neither A nor B

B

In an IPv6 global unicast address, the interface ID is ________ bits long. A) less than 32 B) 64 C) 128 D) We cannot say.

B

In tunnel mode, IPsec provides protection ________. A) all the way between the two hosts B) only between the IPsec servers C) both A and B D) neither A nor B

B

Servers are normally given ________ IP addresses. A) well-known B) static C) dynamic D) none of the above

B

The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________. A) that it provides protection over only part of the route B) higher cost C) both A and B D) neither A nor B

B

Today, it is problematic to have ________. A) only a single IPv4 stack B) only a single IPv6 stack C) a dual stack D) all of the above

B

Which has stronger security? A) SSL/TLS B) IPsec C) Both have about equal security.

B

________ is a general naming system for the Internet. A) NAT B) DNS C) Both A and B D) Neither A nor B

B

In SNMP, the ________ creates commands. A) manager B) agent C) both A and B D) neither A nor B

A

Which of the following is a private IP address range? A) 10.x.x.x B) 128.171.x.x C) both A and B D) neither A nor B

A

Which of the following standards permits central management? A) IPsec B) SSL/TLS C) both A and B D) neither A nor B

A

The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) We cannot say.

B

In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path

C

SNMPv3 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password of each manager-agent pair D) all of the above

C

Stateless autconfiguration makes more sense for ________. A) single-stack IPv4 hosts B) single-stack IPv6 hosts C) dual-stack hosts D) It makes equal sense for all of the above.

C

Which is not one of the three parts of a public IPv6 unicast address? A) subnet ID B) routing prefix C) host part D) All of the above ARE parts in a public IPv6 unicast address.

C

How many DNS root servers are there? A) 1 B) 2 C) 10 D) 13

D

If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) none of the above

D

In DNS servers, the IPv6 address of a host is contained in the ________ record. A) IPv6 B) IPv4+ C) A D) None of the above

D

In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain

D

Which of the above is NOT an element in a network management system? A) the manager B) agents C) objects D) All of the above ARE elements in network management systems.

D

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 14 B) 16 C) 254 D) none of the above

D

________ servers provide _________ IP addresses to clients. A) DNS, static B) DNS, dynamic C) DHCP, static D) DHCP, dynamic

D


Conjuntos de estudio relacionados

logistics ch 10: warehouse management

View Set

Adding fractions with denominators of 10 and 100

View Set

MAT 120 Section 3.2 Conditional Probability and the Multiplication Rule

View Set