CMIS 468 Final
Which of the following is true?
"Handoff" means the same thing in cellular and 802.11 networks.
A router will discard a packet if the TTL value reaches ________.
0
The version number field in IPv6 has the value ________.
0101
If someone says that a 1-bit flag is set, this means that it is given the value ________.
1
In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches?
1
If the sending host does not do MTU discovery, the largest packet it can send is ________.
1,280 octets
Which of the following already runs to nearly all customer premises?
1-pair VG UTP
Which of the following is in Frame Relay's speed range?
10 Mps
Which of the following is a private IP address range?
10.x.x.x.
Which of the following is a fractional T1 line speed?
128 kbps
How many DNS root servers are there?
13
In the mask /14, how many 1s are there?
14
According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s).
2
E1 leased lines run at a speed of about ________.
2 Mbps
If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________.
2001:::00fe::cdef
In the mask 255.255.255.0, how many 1s are there?
24
T1 leased lines run at a speed of about ________.
250 kbps
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /14 and the reliability metric 10. Which row will the router choose if both are matches?
2707
Row 2707 has the mask /16 and the speed metric 20. Row 4400 has the mask /16 and the speed metric 10. Which row will the router choose if both are matches?
2707
Deciding how to send the packet back out is Step ________ in the routing process.
3
A mask has ________ bits.
32
The total length of an IP address is ________ bits.
32
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
32 bits
For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access?
3G
HSPA+ is a ________ service.
3G
A firm uses a PSDN. It has four sites. How many leased lines will it need?
4
For human reading, symbols in IPv6 addresses are written in groups of ________.
4
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?
4
The main version of Internet Protocol in use today is IP version ________.
4
The new version of Internet Protocol that is coming into use is IP version ________.
6
In an IPv6 global unicast address, the interface ID is ________ bits long.
64
Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have?
65,534
In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
7
The network part of an IP address is ________ bits long.
8
For ADSL service, which of the following typically must be added to the telephone system?
A DSLAM
In ADSL, the residential customer needs a(n) ________.
ADSL modem
Which of the following is an attraction of cloud SaaS?
All of These
Which of the above is NOT an element in a network management system?
All of these ARE elements in network management systems
Which of the following is not an issue for cloud Software as a Service?
All of these are issues for cloud Software as a Service
Which of the following is not an issue for cloud utility computing?
All of these are issues for cloud utility computing
Which of the following offers more reliable antivirus protection?
Antivirus software on the mail server
Users are primarily concerned about the ________ layer.
Application
Leased lines standards are most different around the world at speeds ________.
Below about 50 Mbps
The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power.
BitTorrent
In the United States, to get a leased line of at least 2.5 Mbps. Your access line would be ________.
Bonded T1s
Which of the following is true?
Both A Web service is one way to implement a SOA and SOAP is one way to implement a Web service
To configure itself, a client PC running IPv6 can configure itself using ________.
Both DHCP and stateless autoconfiguration
Which of the following is a security risk associated with BitTorrent?
Both Danger caused by opening TCP ports on the firewall and Danger that an employee may download an infected file
Why is metro Ethernet popular?
Both Familiarity and Rapid reprovisioning
To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination host's ________ before the router can send the packet on to the destination host.
Both IP address and data link layer address
The encapsulating security protocol can be used in ________.
Both IPv4 and IPv6
Which of the following is true about NAT?
Both It can enhance security and It presents problems for some protocols
Why is metro Ethernet popular?
Both It uses a familiar technology and It has attractive prices
In SOA, what language can be used to create service objects?
Both Java and C++.
Which of the following go from one customer site to another customer site?
Both Leased lines and Access lines
Which of the following would be an SNMP object?
Both Number of rows in routing table and System uptime (since last reboot)
Which of the following can be used within a firm?
Both Private IP addresses and Public IP addresses
Which of the following steps in Skype is done P2P?
Both Signaling and Transport
________ operates at the transport layer.
Both TCP and UDP
Which of the following is a factor that has contributed to the popularity of cloud computing?
Both The Internet and Web services
Which of the following is contributing to the exhaustion of IPv4 addresses?
Both The growing number of hosts in Asia and The growing number of mobile devices
The default row ________.
Both always has the mask /32 and will always match the IP address of an incoming packet
Stateless autoconfiguration can be used to ________.
Both change all subnet IDs in a network and change all routing prefixes in a network
Speech codecs vary with respect to ________.
Both compression and voice quality
The encapsulating security protocol offers ________.
Both confidentiality and authentication
An MTSO ________.
Both controls cellsites in a cellular system and links mobile users to wired telephone customers
ARP is used to find the destination data link layer destination addresses of ________.
Both destination hosts and routers
The router advertisement protocol may ________.
Both give the client a routing prefix and give the client a subnet ID
SaaS software vendors may make an application available by ________.
Both hosting it on their own webservers and allowing the application to be downloaded to the consumer device
The domain name system ________.
Both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet
Leased line switched WANs typically use ________.
Both leased lines and a router at each site
Label-switching routers provide ________.
Both lower cost and the ability to do traffic engineering
If a company runs its own data center, it might face problems with ________.
Both overprovisioning and underprovisioning
IPsec is used for ________ VPNs.
Both remote-access and site-to-site
SOAs are attractive because of ________.
Both reuse and language independence
A media gateway translates ________ transmissions.
Both signaling and transport
In ADSL, the customer should have ________.
Both splitters and an ADSL modem
In TCP/IP, routing means ________.
Both the process that routers use to forward incoming packets and the process that routers use to exchange routing table information
Antivirus software checks e-mail attachments for ________.
Both viruses and Trojan horses
Which of the following DSL services tend to be symmetric in speed?
Business
Which of the following DSL services usually offers QoS guarantees?
Business
If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________.
CDMA
In cellular technology, a ________ is a small geographical area.
Cell
Which of the following are usually given dynamic IP addresses?
Clients
Which of the following does the carrier NOT own?
Customer premises equipment
Clients normally get their IP addresses from ________.
DHCP servers
________ servers provide ________ IP addresses to clients.
DHCP, dynamic
________ is a general naming system for the Internet.
DNS
Stateless autoconfiguration makes more sense for ________.
Dual-Stack Hosts
Which of the following can route non-IP packets?
EIGRP
The management information base (MIB) is a(n) ________.
Either schema or actual database
LANs are ________.
Either single networks or internets
WANs are ________.
Either single networks or internets
In ________, switching decisions are based on destination addresses.
Ethernet
There is a row for each address in a(n) ________.
Ethernet switch table
A(n) ________ must find the best-matching row in its ________ table by comparing several row matches.
Ethernet switch, switching
The IEEE calls 64-bit interface addresses ________.
Extended Unique Identifiers
A TCP ________ segment is a request to close a connection.
FIN
Four-way closes use ________ segments
FIN
Which of the following segments is not acknowledged?
FIN
A router has to go through the ARP process each time it needs to send a packet to a destination host or to a next-hop router.
False
A row in a routing table has the destination 10.8.0.0 and the mask /24. It is a match for 10.8.6.7.
False
An autonomous system can freely select the exterior dynamic routing protocol it will use.
False
Border router's main job is to connect different subnets in the same network.
False
ICMP error advisement messages add reliability to IP.
False
In a routing table, a row is a route for a single IP address.
False
Routers know the difference between network and subnet masks.
False
The default row will never be selected as the best match row.
False
UDP is reliable.
False
Compared to normal routing, decision caching is ________.
Faster
Which of the following is an attraction of cloud utility computing?
Flexibility
Which of the following offers speeds that match speed range of greatest corporate demand for WAN transmission?
Frame Relay
Skype offers ________.
Free calling among Skype customers
In SNMP, the manager can create ________.
GET commands
In SNMP, companies are often reluctant to use ________ commands because of security dangers.
Get
Which of the following is used in webpage bodies?
HTTP
Which of the following is used to retrieve Web pages?
HTTP
Which element of the Skype network is in charge of transport?
Host Nodes
Which is not one of the three parts of a public IPv6 unicast address?
Host part
An IPv4 packet's protocol field value is 1. The data field contains a(n) ________ message.
ICMP
________ is used for supervisory messages at the internet layer.
ICMP
Which of the following is connectionless?
IP
________ operates at the internet layer.
IP
Which has stronger security?
IPsec
Which of the following standards provides for central management?
IPsec
Which of the following allows routers to check for errors in the header when a packet arrives?
IPv4
Which of the following permits fragmentation by routers along a packet's route?
IPv4
The neighbor advertisement protocol message was created to give the ________ address of the host sending the message.
IPv6
What does a router do with ARP request messages?
It broadcasts them
A company has more control over its ________ technology.
LAN
A network that runs on the customer premises is a ________.
LAN
According to the ITU, which of the following can be advertised as 4G?
LTE
On what full 4G standard are carriers converging?
LTE Advanced
Which of the following offers true 4G speeds?
LTE Advanced
Which of the following usually offers higher speeds?
MANs
________ is a standard to describe a file's format type.
MIME
VoIP users have ________ in their phones or on their computers.
Media Gateways
________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.
NAT
According to the ITU, which of the following offers true 4G speeds?
Neither LTE nor HSPA+
Login is done P2P (instead of using servers) in ________.
Neither Skype nor traditional VoIP
Transport is done using servers (not P2P) in ________.
Neither Skype nor traditional VoIP
TCP is ________.
Neither connectionless nor unreliable
IP is made reliable through ________.
Neither echo and echo reply messages nor error advisement messages
ATM ________.
Neither offers speeds in the range of greatest corporate demand nor is relatively inexpensive
In coaxial cable, the two conductors ________.
Neither run side-by-side nor are twisted around each other
In DNS servers, the IPv6 address of a host is contained in the ________ record.
None of These
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?
None of these
If your subnet part is 8 bits long, you can have ________ subnets.
None of these
In a network mask, the 1s correspond to the ________.
None of these
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
None of these
Which interior dynamic routing protocol is good for large internets?
OSPF
What transmission medium do ALL DSL services use?
One-pair voice-grade UTP
Local loop access lines to business use which of the following transmission media?
Optical Fiber
Transient client presence tends to be a problem in ________.
P2P Applications
In a PSDN, companies connect to the network core at ________.
POPs
Which of the following is not one of the main elements of the Skype network?
Proxy server
Which TCP/IP interior dynamic routing protocol is good for small internets if security is not a serious concern?
RIP
________ is an interior dynamic routing protocol.
RIP
Codec data comes after the ________ header in VoIP transport frames.
RTP
Which of the following DSL services does not offer QoS guarantees?
Residential
For 100,000 addresses, which will have fewer rows?
Router table
Which of the following is a processor-sharing application?
SETI@home
Which of the following is likely to dominate in VoIP?
SIP
Mail servers communicate with each other by using ________.
SMTP
Which is less expensive to implement?
SSL/TLS
In cloud ________, the user accesses the software over the Internet, often with a browser.
SaaS
Corporations most wish to have ________ domain names.
Second-Level
Which of the following steps in Skype is done P2P?
Signaling
Which of the following is one of the three parts of an IP address?
Subnet Part
Which element of the Skype network is in charge of signaling?
Super Nodes
Fragmentation is ________.
Suspicious because it is often used by hackers
Which of the following are more widely used?
T1 lines
Which of the following can handle an application message that is one megabyte in size?
TCP
Which of the following is reliable?
TCP
In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at last when trying to find matches?
The default row
In BitTorrent, a(n) ________ is a server that coordinates the file transfer.
Tracker
Converting networks to support IPv6 is relatively simple and inexpensive.
True
If the ACK bit is set, the acknowledgment number field MUST have a value.
True
In IPv6, routers usually only have to consider the hop-by-hop options extension header.
True
TCP is reliable
True
The next-hop router in the default row is called the default router.
True
The time to live field in IPv4 has the same basic function as the hop limit field in IPv6.
True
To handle internetwork transmission control tasks that the IP protocol cannot handle, the IETF created TCP.
True
When a network mask is applied to any IP address on the network, the result is the IP address' network part followed by zeros.
True
When a packet arrives, the router should look for matches in ALL rows in the routing table.
True
Which mode of IPsec is more expensive?
Tunnel Mode
The purpose of ________ is to help someone to find an appropriate service object.
UDDI
For the transport layer, VoIP uses ________ for transport transmission.
UDP
Which header comes SECOND in a VoIP transport packet?
UDP
Which of the following is connectionless?
UDP
E-mail bodies that have non-English text use ________.
UNICODE
Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?
Underutilized processing capacity of client PCs
If most P2P applications use facilitating servers, why do we still call them peer-to-peer?
User computers do most of the work.
Which of the following is not an issue for cloud utility computing?
Very high costs
The Internet is a ________.
WAN
Which of the following has more diversity in technologies?
WANs
The purpose of ________ is to allow a calling program to understand how to use a service object.
WDSL
In the IPv4 address 1.2.3.4, what is the network part?
We cannot say.
Which of the following is true?
Web service is one way to implement a SOA
________ use ________ that provide services to customers using WWW interaction standards.
Web services, service objects
Which of the following allows you to read your e-mail easily on an Internet cafés computer?
Web-enabled email
In SOA, SOAP messages are encoded in ________.
XML
If you are using a Web-enabled e-mail system ________.
You access and send mail by using a Web Browser
SNMPv3 uses ________ for authentication.
a different password for each manager-agent pair
A company receives its domain name from ________.
a domain registrar
When a cellular customer moves from one cell in a city to another cell in the same city, this is ________.
a handoff
Service quality issues with the Internet can be addressed by using ________.
a single ISP
Combining multiple WAN technologies into a collectively managed system is called having ________.
a virtual WAN
In SNMP, the ________ creates responses.
agent
In SNMP, the ________ creates traps.
agent
In SNMP, the manager communicates directly with a(n) ________.
agent
The way in which application layer functions are spread among computers to deliver service to users is called ________.
an application architecture
IPsec protects ________ layer messages.
application
The PSDN transport core normally is drawn as a cloud ________.
because customers do not need to care about what is inside it
One-bit fields are called ________ fields.
binary
In HTTP response messages, the attached file is preceded by a ________.
blank line
In HTTP, fields normally are ended by a ________.
carriage return/line feed
VoIP uses ________ switching.
circuit
In ________ file retrieval, your computer downloads a file from a server.
client/server
For their transmission medium, cable television companies primarily use ________.
coaxial cable
In HTTP, keywords usually are followed by a ________.
colon (:)
SNMPv1 uses ________ for authentication.
community names
Companies use carriers for WAN transmission because ________.
companies lack rights of way
The first Step in the Routing process involves ________.
comparing the packet's destination IP address to all rows
UDP is ________.
connectionless
Two-way amplifiers are needed for cable ________ service.
data
The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________.
destination host
The Skype protocol is relatively ________ for corporate firewalls to filter.
difficult
In Skype, ________ is the process where a Skype application looks up the username and IP address of the party it wants to contact.
directory search
In DNS, a group of resources under the control of an organization is called a ________.
domain
In MPLS, the interface to send the packet back out will be decided ________.
during the router's routing process
Pinging sends ICMP ________ messages to the target host.
echo
To see if a target host can be reached, you normally would send it an ICMP ________ message.
echo
In IPv6, the payload length gives the number of octets in the ________.
entire packet minus the main header
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.
fffe
In NAT, the ________ creates new external source IP addresses and port numbers.
firewall
In MPLS, the ________ adds the label to the packet.
first label-switching router
The router advertisement protocol may ________.
forbid the use of stateless autoconfiguration
Access to a router is needed to create a ________.
global unicast IPv6 address
According to the IETF standards, if a router receives a series of packets from the same IP address to the same IP address, it should ________.
go through the entire process for each packet
If a host to be able to communicate via IPv4 and IPv6, it is said to ________.
have a dual stack
For human reading, IPv6 address are written in ________.
hexadecimal
The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.
higher cost
In packet fragmentation and reassembly, the ________ field is used.
identification
Metropolitan area Ethernet is used primarily ________.
in MANs
In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files.
index
The part of an IPv6 global unicast address that designates the host is called the ________.
interface ID
Routers send packets out ________.
interfaces
An autonomous system is free to select whatever ________ dynamic routing protocol it wishes.
interior
IPsec is a(n) ________ layer standard.
internet
Variability in time delays between successive packets in a transport stream is called ________.
jitter
RTP supports ________.
jitter control
Label-switching routers base their decisions on a packet's ________.
label number
In MPLS, the packet travels along the ________.
label-switched path
A WAN is a network that ________.
links different sites together
For human reading, in IPv6 addresses, letters should be written in ________.
lowercase
In SNMP, the ________ creates commands.
manager
Routers usually are connected in a ________ topology.
mesh
The routing prefix in IPv6 is like the ________ part in an IPv4 address.
network
In a network mask, the 1s correspond to the ________.
network part
Carrier access lines to residential buildings typically use ________.
one-pair voice-grade UTP
Today, it is problematic to have ________.
only a single IPv6 stack
In tunnel mode, IPsec provides protection ________.
only between the IPsec servers
SONET/SDH lines use ________.
optical fiber
RFC 822 and RFC 2822 standards govern ________.
plain text content of e-mail messages
Leased lines are ________.
point-to-point lines between two premises
The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________.
protection over only part of the route
In an IPv4 packet, the ________ field value tells the type of message contained in the IP packet's data field.
protocol
A LAN is a network that ________.
provides services within a site
The use of virtual circuits ________.
reduces costs
The code "200" may be found in HTTP ________ messages.
response
When a cellular customer moves from one city to another, this is ________.
roaming
Having all privileges on a computer is known as having ________.
root privileges
The highest-level DNS servers are called ________.
root servers
For a given volume of traffic, which are more expensive?
routers
Dynamic ________ protocols allow routers to transmit routing table information to one another.
routing
When a router forwards incoming packets closer to their destination hosts, this is ________.
routing
Fiber to the home service is normally created by ________.
running optical fiber to neighborhoods
DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve.
scopes
In IPsec, agreements about how security will be done are called ________.
security associations
TCP messages are called ________.
segments
Cells are used in cellular telephony to provide ________.
service for more customers
In SOA, calls are placed to ________.
service objects
SIP is a ________ protocol for VoIP.
signaling
NAT enhances security by preventing ________.
sniffers from learning internal IP addresses
Servers are normally given ________ IP addresses.
static
An internal router only connects different IP ________.
subnets
The use of options in IP is ________.
suspicious because they are often used by hackers
In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________.
swarm
LAN speeds are faster than WAN speeds. This is because of ________.
technological limitations
The advance that made the client/server application architecture possible was ________.
the Internet
Using the Internet as a WAN is attractive because of ________.
the Internet's low cost per bit
A traditional e-mail user sending messages to his or her mail server would most likely use ________.
the SMTP standard
The main benefit of IPv6 over IPv4 is ________.
the ability to support more possible hosts
".com" is a ________.
top-level domain
".edu" is a ________.
top-level domain
Signaling is done using servers (not P2P) in ________.
traditional VoIP
Client PCs must have digital certificates in ________.
transport mode
A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard.
trap
Low-speed leased lines use ________ transmission lines to the customer premises.
two-pair data-grade UTP
In stateless autoconfiguration, providing the address of DNS servers is ________.
unnecessary
In ________, a company offloads server processing work to another company at a remote site.
utility computing
Frame Relay frames contain ________.
virtual circuit numbers
In virtualization, the real computer's capacity is divided among a number of ________.
virtual machines
A router must use the ARP process ________.
whenever it forwards an IP packet to a host that is not in its ARP cache