TEST 02 NET II
Upon receipt of the Other Configuration flag in a Router Advertisement message, which of the following best represents how the host should respond? 1. when set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain non-address configuration information. 2. when set to 1, hosts may not use an address configuration protocol such as DHCPv6 to obtain non-address configuration information. 3. when set to 1, hosts must autoconfigure their own address configuration information 4. When set to 1, hosts may not use an address configuration protocol such as DHCPv6 to obtain address configuration information. 5. When set to 1, hosts must use an address configuration protocol such as DHCPv6 to obtain address configuration information.
1. when set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain non-address configuration information.
A(n) _____ routing protocol shares information about how far away all networks are to the destination.
Distance Vector
Before an IP datagram is transmitted onto the cable, the data link ___________ puts the leading frame onto the datagram.
Driver
Border gateway protocol is the original point-to-point protocol for encapsulating TCP/IP traffic over a WAN link and is still used for connecting to some ISPs today (mostly for access to older UNIX hosts). T or F
False
Data for Echo Request messages may consist of one or more octets of arbitrary data. T or F
False
Path MTU discovery is only available for IPv6. T or F
False
Routed protocols are Layer 1 protocols that are used to get packets through an internetwork. T or F
False
The Code field provides error detection for the ICMP header only. T or F
False
The ICMP Echo Request guarantees packet delivery. T or F
False
The ICMP redirection process serves only IP routers, not IP hosts. T or F
False
The value 0 in the IP header protocol field denotes that an ICMP header follows the IP header. T or F
False
Upon start-up, Neighbor Discovery collects information about nodes configure their IPv6 addresses to communicate on the network. T or F
False
When a packet is fragmented, all fragments are given different TTL values. T or F
False
ta for Echo Request messages may consist of one or more octets of arbitrary data. T or F
False
RIP and OSPF are examples of ________ gateway protocols
Interior
__________ switches are devices that can perform switching based on the MAC address and, when necessary, examine the Network layer header to make routing decisions.
Layer 3
_________ IP is defined by the IETF in RFCs 2003 through 2006 and RFC 3220.
Mobile
A node can send a(n) ____ Solicitation message to find (or verify) the link-layer address of a local node, to see if a node is still available, or to check that its own address is not already in use by another node.
Neighbor
IPv6 network nodes send ________Solicitation messages in order to request the link-layer address of a target node.
Neighbor
If a router becomes unavailable to a node, that node will invoke the ________ process.
Neighbor unreachability detection
Two of the most well-known utilities, Ping and Traceroute, rely on ICMP to perform connectivity tests and _________discovery
Path
____ is a general-purpose protocol that provides WAN data link encapsulation services similar to those available for LAN encapsulations.
Point to Point Protocol
_________ is a technique for assigning costs to routes designed to prevent routing loops.
Poison reverse
__________ is a method that allows and IP host to use a simplified subnetting design.
Proxy ARP
ICMP ________ permits a gateway (router) on a non-optimal route between sender and receiver to redirect traffic to a more optimal path.
Redirect
A(n) ________ is a compilation of information about all the networks that the router can reach.
Routing table
The ___________ command-line utility uses route tracing to identify a path from the sender to the target host.
Traceroute
ARP is used only to find the hardware address of local IP hosts. T or F
True
ARP is used to obtain the hardware address of the destination IP hosts.
True
An IP host probe is performed by sending a ping packet (ICMP Echo Request packet) to each host within a range and noting the responses. T or F
True
Configuring hosts to be weak or strong can be performed on both IPv4 and IPv6 network nodes. T or F
True
ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum. T or F
True
ICMP reports errors only about IP datagrams. Errors about error messages are not reported. T or F
True
ICMP reports errors only about processing of non-ICMP IP datagrams. T or F
True
ICMP's job is to provide a variety of information about IP routing behavior, reachability, routes between specific pairs of hosts, delivery errors, and so forth. T or F
True
IP addresses are used to identify individual IP hosts on a TCP/IP internetwork. T or F
True
If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet. T or F
True
It's up to the IP host that receives incoming ICMP messages to act on the content of those messages. T or F
True
Neighbor Discovery has five functional processes. T or F
True
Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance). T or F
True
Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists. T or F
True
The principal difference between these two versions of ICMP protocol is the integration of different messaging types under the ICMPv6 protocol. T or F
True
one of the most difficult types of networks to implement and manages is one in which the users are always moving around. T or F
True
Which of the following path discovery command-line parameters turns off reverse DNS lookups? a. -d b. -a c. -w d. -n e. -h
a. -d
Which of the following command-line parameters for the ping command governs the Time to Live value? a. -i b. -l c. -w d. -f e. -n
a. -i
Which of the following RFCs describes ICMP? a. 792 b. 1812 c. None of these choices d. 1191 e. 950
a. 792
In a RIPv2 packet, the ________ field contains a plain text password. a. Authentication b. Authentication Type c. Route Tag d. Origin e. Address Family Identifier
a. Authentication
Of the following, which routing table types can an IPv6 routing table store? a. Directly attached routes b. Host routes c. Remote routes d. Default route e. next-hop route
a. Directly attached routes b. Host routes c. Remote routes d. Default route
Which of the following statements best defines the intent of the PMTU process? a. instructs the sender on what MTU to use to avoid further fragmentation en route b. determines the largest possible MTU in the path between sender and receiver c. determines the smallest possible MTU in the path between sender and receiver d. justifies the inclusion of the Don't Fragment flag in ICMP messages e. determines whether or not each router along the route supports fragmentation
a. Instructs the sender on what MTU to use to avoid further fragmentation en route
The __________ utility is a command-line that uses ICMP Echo packets to test router and link latency, as well as packet loss. a. PATHPING b. ROUTE c. TRACEROUTE d. NTP e. NETSTAT
a. PATHPING
________ is used to obtain an IP address for an associated data link address. a. RARP b. Proxy ARP c. Network Control d. Link Control Protocol e. Internet protocol Control Protocol
a. RARP
Which of the following are basic rules of operations for nodes (routers and hosts) concerning Redirect messages? a. Routers do not update their routing tables if they receive Redirect messages. Hosts do not send Redirect messages. b. Routers and hosts update their routing tables if they receive redirect messages. hosts do not send redirect messages c. Routers update their routing tables if they receive Redirect messages. Hosts do not send Redirect messages. d. Routers do not update their routing tables if they receive Redirect messages. Hosts can send Redirect messages. e. Routers update their routing tables if they receive Redirect messages. Hosts can send Redirect messages.
a. Routers do not update their routing tables if they receive Redirect messages. Hosts do not send Redirect messages.
For which of the following link types must PPP provide addressing as part of its WAN encapsulation services? (choose all that apply) a. X.25 connection b. analog telephone link c. ATM connection d. Frame relay e. T-carrir link
a. X.25 connection c. ATM connection d. Frame relay
A host or router can send the _____ error message to indicate that the protocol defined in the IP header cannot be processed. a. code 2: protocol unreachable b. code 3: port Unreachable c. code 7: port Destination Host Unknown d. code 5: source Route Failed e. code 4: Fragmentation Needed and Don't Fragment Was Set
a. code 2: protocol unreachable
A router sends the __________ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet. a. code 5: Source Route Failed b. code 2: protocol Unreachable c. code 4: Fragmentation Needed and Don't Fragment Was Set d. code 3: Port Unreachable e. code 7: Destination Host Unknown
a. code 5: Source Route Failed
When used over an asynchronous connection like an analog telephone link, PPP supports which of the following WAN encapsulation services? a. delimitation b. Ethernet c. protocol identification d. addressing e. bit-level integrity check
a. delimitation c. protocol identification e. bit-level integrity check
What allows the IS-IS routing protocol to operate on IPv6 networks? a. the addition of two new type-length-values (TLVs) as extensions b. the ability to tunnel IPv4 packets c. the use of LSP packets d. the neighborship process extended from the original IPv4 implementation e. the addition of the ability to route intradomain traffic for the connections network service.
a. the addition of two new type-length-values (TLVs) as extensions
The default TTL in windows server 2008, Windows Vista, and Windows 7 is _______ a. 64 b. 128 c. 72 d. None of these choices e. 112
b. 128
According to the host sending algorithm, which two conditions must be met in order for a host to send a packet to a destination node's link-layer address? a. Link-layer entry is in the neighbor cache b. Destination address is in the prefix list c. link-layer entry is in the router cache d. link-layer entry is in the destination cache e. destination address is in the destination cache
b. Destination address is in the prefix list c. link-layer entry is in the router cache d. link-layer entry is in the destination cache e. destination address is in the destination cache
Hackers can use _________ as part of a reconnaissance process to learn about active network addresses and active processes. a. All of these choices b. ICMP c. auto recovery d. availability e. presence
b. ICMP
By default, IPv6 nodes will send a _________ multicast request for configuration parameters immediately upon start-up. a. Router Advertisement b. Router Solicitation c. DHCPv6 Discovery d. Neighbor Advertisement e. Neighbor Solicitation
b. Router Solicitation
Which of the following choices permit a node to consider a neighbor to be reachable? (choose all that apply) a. unsolicited Neighbor Advertisements are received within the REACHABLE_TIME variable b. Upper-layer protocol indicates backward progress within the REACHABLE_TIME variable. c. unsolicited router solicitations are received within the REACHABLE_TIME variable d. Solicited Neighbor Advertisements are received within the REACHABLE_TIME variable. e. Upper-layer protocol indicates forward progress within the REACHABLE_TIME variable.
b. Upper-layer protocol indicates backward progress within the REACHABLE_TIME variable. d. Solicited Neighbor Advertisements are received within the REACHABLE_TIME variable. e. Upper-layer protocol indicates forward progress within the REACHABLE_TIME variable.
On a network that is low on available bandwidth, the ____ process causes more traffic on the wire. a. data encapsulation b. fragmentation retransmission c. All of these choices d. error-detection e. circuit switching
b. fragmentation retransmission
Is required to get the packet from one IP host to another IP host on a single network. a. All of these choices b. hardware address c. gateway d. data link e. delimiter
b. hardware address
What is the name of the concept that indicates that a path exists between two TCP/IP hosts on an internetwork? a. PMTU b. reachability c. route tracing d. path discovery e. internetworking
b. reachability
Upon receipt of the L flag in the Prefix Options of the Router Advertisement message, which choice best represents how the host should respond? a. when set to 0, the host should use the prefix received for on-link address determination b. when set to 1, the host should use the prefix received for on-link address determination c. when set to 1, the host should use the prefix received for off-link address determination d. when set to 0, the host should use the prefix received for off-link address determination e. None of these choices
b. when set to 1, the host should use the prefix received for on-link address determination
Which of the following ICMP Type numbers relate to Router Advertisement and Router Solicitation messages? a. 12 b. 8 c. 10 d. 11 e. 9
c. 10 e. 9
_______ can summarize routing information before sending link-state packets to other networks a. Autonomous systems b. Backbone areas c. Area border routers d. All of these choices e. Distance vectors
c. Area border routers
The ICMP packet field ________ provides error detection for the ICMP header only. a. Redirect b. Type c. None of these choices d. Code e. Host
c. None of these choices
_______ help keep local routing optimized in the face of change conditions and also reflect status as various destinations come on and off-link. a. Route Advertisement b. Neighbor Advertisement c. Redirects d. Route Advertisement and Route Solicitation e. Route Solicitation
c. Redirects
At the command prompt on a windows 7 computer, what command is used to show the routing table for the IPv6 interface? a. netsh interface IPv6 show routes b. netstat -p ipv6 c. netsh interface ipv6 show route d. netsh interface ipv6 show all routes e. netsh interface ipv6 show routing table
c. netsh interface ipv6 show route
Which of the following Windows command-line utilities is the primary tool for performing connectivity or reachability tests? a. All of these choices b. tracert c. ping d. pathping e. ipconfig
c. ping
ICMP packets contain only three required fields after the IP header: Type, Code, and ____________.
checksum
Which value in bytes is the default MTU for IPv6 packets? a. 512 b. 1024 c. 1480 d. 1280 e. 576
d. 1280
Although RFC ____ dictates that IP routers"must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing," many do not. a. 1900 b. 1918 c. 1972 d. 1812 e. 1955
d. 1812
Which of the following ICMP Type numbers identify Echo and Echo Reply messages? a. 1 b. 30 c. 3 d. 8 e. 0
d. 8 e. 0
IPv6 Neighbor Solicitation protocol can be compared to IPv4 ______. a. Redirect b. Router Advertisement c. Router Solicitation d. ARP Request e. None of these choices
d. ARP Request
Which of the following definitions best describes a network that is in a converged state? a. All routers use static routing tables b. All routers use link-state routing protocols c. Routers are waiting for table updates to finish propagating d. All routers know current available networks and their associated costs e. All routers use distance vector routing protocols
d. All routers know current available networks and their associated costs
Which of the following ICMP message types relates to reachability analysis? a. Time Exceeded b. Redirect c. Destination Unreachable d. Echo/Echo Reply e. Source Quench
d. Echo/Echo Reply
A host invoking the duplicate address detection process sends what type of message? a. router advertisement b. Neighbor Advertisement c. None of these choices d. Neighbor Solicitation e. Broadcast Query
d. Neighbor Solicitation
IPv6 Duplicate Address Detection protocol can be compared with IPv4 _______. a. Router Solicitation b. ARP Request c. Router Advertisement d. None of these choices e. Redirect
d. None of these choices
____ simply prevents a router from advertising a network on the same interface from which it learned that network. a. Spanning Tree protocol b. Link state routing c. Source routing d. Split horizon e. On-demand routing
d. Split horizon
What is the first step that an IP host performs when it receives an Ethernet II frame? a. check the hardware address to see if it should be read further b. Determines if the destination is on the same of a different subnet c. examine the payload to determine the actual destination address d. check the validity of the FCS value e. strip off the FCS field and hand the packet to the Data link layer
d. check the validity of the FCS value
An IPV6 node uses NDP to discover the link-layer address of the next-hop router by sending a Router Solicitation message as what kind of network message? a. None of these choices b. unicast c. broadcast d. multicast e. anycast
d. multicast
Which of the following Windows command-line utilities is the primary tool for performing connectivity or reachability tests? a. ipconfig b. pahping c. all of these choices d. ping e. tracert
d. ping
What is an update for the IPv6 routing protocol RIPng that did not exist in the IPv4 RIP implementation? a. use of distance-vector b. None of these choices c. use of a 15 hop radius d. use of multicast for sending updates e. use of poison reverse
d. use of multicast for sending updates
__________ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network. a. broadcast b. RIP c. path MTU d. OSPF e. ICMP
e. ICMP
The message type __________ documents when routing or delivery errors prevent IP datagrams from reaching their destinations. a. ICMP Echo/Echo Reply and ICMP Time Exceeded b. ICMP Time Exceeded c. ICMP Echo/Echo Reply d. ICMP Source Quench e. ICMP Destination Unreachable
e. ICMP Destination Unreachable
All IPv4 packets have a predefined lifetime indicated in each packet's _________ field. a. Type of Service b. protocol Identifier c. Precedence d. Options e. None of these choices
e. None of these choices
Which of the following routing protocols is a link-state protocol? a. IGRIP b. Dijkstra c. BGP d. RIP e. None of these choices
e. None of these choices
hich of the following ICMP message types relates to congestion control? a. Redirect b. Echo/Echo Reply c. Destination Unreachable d. Time Exceeded e. None of these choices
e. None of these choices
_________ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation. a. TRACEROUTE b. ROUTE c. PATHPING d. Firewalking e. PMTU Discovery
e. PMTU Discovery
Routers use ________ to select a routing path where there are multiple paths available. a. shortest prefix matching b. None of these chices c. source routing d. precedence e. Types of service
e. Types of service
ND makes use of multicast addresses such as the "_________" address with link-local scope (FF02::1). a. all subnets b. all routers c. all proxies d. all domains e. all nodes
e. all nodes
What type of scan occurs when a series of ping requests for a range of IP addresses is performed? a. firewalking b. port scan c. protocol scan d. network mapping e. host probe (scan)
e. host probe (scan)
When looking for a destination address for a datagram ultimately bound for a remote network, an IP host must check which structure to obtain the necessary information? a. ARP cache b. a source route request c. All of these choices d. proxy ARP to get the hardware address for the destination machine e. routing tables
e. routing tables
What gives BGP the ability to run on IPv6 networks? a. The elimination of fragmentation of reassembly b. the addition of IPv6 address support for the Next Hop attribute c. the addition of anycast d. the addition of MPLS e. the addition of multiprotocol extensions
e. the addition of multiprotocol extensions
With router advertising, the default Lifetime value for route entries is 10 minutes.
false
_________ describes the concept of walking a firewall ACL or ruleset to determine what it filters and how.
firewalking
At the Data Link layer, protocol data units are called __________.
frames