Networking 2 Ch 4-6 Point quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following ICMP Type numbers relate to Router Advertisement and Router Solicitation messages? 1) 8 2) 9 3) 10 4) 11 5) 12

2,3

__________ is a method that allows and IP host to use a simplified subnetting design.

Proxy ARP

IPv6 neighbor solicitation protocol can be compared with IPv4 ________________. 1) none 2) router solicitation 3) redirect 4) arp request 5) router advertisement

4

The link-local scope all-routers multicast address is which of the following? 1) FF02::1 2) FF01::1 3) FF01::2 4) none of these choices 5) FF00::2 page number 323

4

A host invoking the Duplicate Address Detection process sends what type of message? 1) Neighbor Solicitation 2) none of these choices 3) broadcast query 4) router advertisement 5) neighbor advertisement

1

A(n) _______ is a compilation of information about all the networks that the router can reach. 1) routing table 2) switching table 3) HOSTS file 4) advertisement 5) all of these choices

1

All IPv4 packets have a predefined lifetime indicated in each packet's _________ field. 1) None of these choices 2) Precedence 3) Type of Service 4) Protocol Identifier 5) Options

1

Which of the following ICMP message types relates to reachability analysis? 1) redirect 2) time exceeded 3) source quench 4)echo/echo reply 5) destination unreachable

4

Which of the following represents the five states of a neighbor cache entry? 1) incoplete, reachable, strong, on-time, probe 2) incompatible, reachable, stale, delay, probe 3) complete, reachable, stale, delay, probe 4) Incomplete, reachable, stale, delay, probe 5) incomplete, unreachable, stale, delay, probe

4

Which of the following are basic rules of operations for nodes (routers and hosts) concerning Redirect messages? 1)Routers do not update their routing tables if they receive Redirect messages. Hosts do not send Redirect messages. 2) router update their routing tables if they receive redirect messages. host can send redirect messages 3) routers update their routing tables if they receive redirect messages. Hosts can send redirect messages 4) routers and hosts update their routing tables if they receive redirect messages. Hosts do not send redirect messages 5) routers update their routing tables if they receive redirect messages. Hosts do not send redirect messages

1

Which RFC most completely defines Neighbor Discovery for IPv6? 1) none of these choices 2) 4191 3) 4681 4) 4361 5) 4862

1 real answer 4861

Which of the following routing protocols is a link-state protocol? 1) RIP 2) BGP 3) IGRP 4) none of these choices 5) Dijkstra

4

The ____ option is sent in Router Advertisement messages to provide a common MTU value for nodes on the same network segment. 1) redirected header 2) none of these choices 3) target link-layer address 4) size 5) prefix information

2

Upon receipt of the Other Configuration flag in a Router Advertisement message, how should the host respond? 1) When set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain address configuration information. 2) When set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain non-address configuration information. 3) when set to 1, hosts must auto configure their own address configuration information 4) when set to 1, host may not use an addres configuration protocol such as DHCPv6 to obtain non-address configuration information 5) when set to 1, host must not use an address configuration protocol such as DHCPv6 to obtain address configuration information

2

What type of packet is a node sending to another node that is on-link? 1) broadcast 2) unicast 3) all of these choices 4) multicast 5) unicast and multicast

2

Which of the following choices permit a node to consider a neighbor to be reachable? 1) unsolicited router solicitations are received within the REACHABLE_TIME variable 2)Upper-layer protocol indicates forward progress within the REACHABLE_TIME variable 3)Solicited Neighbor Advertisements are received within the REACHABLE_TIME variable. 4) unsolicited neighbor advertisments are received within the REACHABLE_TIME variable 5)upper-layer protocol indicates backward progress within the REACHABLE_TIME variable

2,3

By default, IPv6 nodes will send a ____ multicast request for configuration parameters immediately upon start-up. 1) neighbor solicitation 2) DHCPv6 discovery 3) Router Solicitation 4) router advertisement 5) neighbor advertisement

3

_________ uses ICMPv6 type 135 messages. 1) router solicitation 2) neighbor advertisement 3) neighbor solicitation 4) router advertisement 5) redirect

3

____ help keep local routing optimized in the face of changing conditions and also reflect status as various destinations come on- and off-link. 1) neighbor advertisement 2) route solicitation 3) route advertisment 4) Redirects 5) route advertisement and route solicitation

4

According to the host sending algorithm, which two conditions must be met in order for a host to send a packet to a destination node's link-layer address? (Choose all that apply.) 1) link-layer entry is in the router cache 2) destination address is in the prefix list 3) link-layer entry is in the destination cache 4) link-layer entry is in the neighbor cache 5) destination address is in the destination cache

4,5

How does a host interpret the Managed Address Configuration (MAC) flag in a Router Advertisement message? 1) when set to 0, hosts must use an address configuration protocol such as DHCPv6 to obtain non-address configuration information 2) when set to 0, hosts must not use an address configuration protocol such as DHCPv6 to obtain address configuration information 3) when set to 1, hosts must not use an address configuration protocol such as DHCPv6 to obtain non-address configuration information 4) hosts are not required to interpret the managed address configuration flag in a router advertisement message 5)When set to 1, hosts must use an address configuration protocol such as DHCPv6 to obtain address configuration information.

5

Which choice best represents how a host should behave upon receipt of the H flag in the Prefix Options of the Router Advertisement message? 1) when set to 1, the host is not functioning as a mobile IPv6 home agent 2) When set to 0, the router is not functioning as a Mobile IPv6 host agent. 3) When set to 0, the router is functioning as a Mobile IPv6 home agent. 4) When set to 1, the router is not functioning as a Mobile IPv6 host agent. 5) None of these choices

5

____ use ICMPv6 type 137 messages. 1) router advertisement 2) neighbor solicitation 3) router solicitation 4) neighbor advertisement 5)Redirect

5

ICMPv4 packets contain only three required fields after the IP header: Type, Code, and _______________.

Checksum

A(n) _____ routing protocol shares information about how far away all networks are to the destination.

Distance Vector

Before an IP datagram is transmitted onto the cable, the data link ___________ puts the leading frame onto the datagram.

Driver

Neighbor Discovery makes abundant use of messages

False

There are three types of IPv6 nodes: routers, switches, and hosts.

False

Upon start-up, Neighbor Discovery collects information about how nodes configure their IPv6 addresses to communicate on the network.

False

RIP and OSPF are examples of ________ gateway protocols

Interior

__________ switches are devices that can perform switching based on the MAC address and, when necessary, examine the Network layer header to make routing decisions.

Layer 3

If a router becomes unavailable to a node, that node will invoke the ________ process.

Neighbor unreachability detection

Two of the most well-known utilities, Ping and Traceroute, rely on ICMP to perform connectivity tests and _________.

Path discovery

The Target Link-Layer Address option is used in Neighbor Advertisement and ____ messages

Router Advertisement

Which of the following ICMPv6 type numbers relate to Router Solicitation and Router Advertisement messages? 1) 137 2) 136 3) 133 4) 135 5) 134

Router Solicitation - 133 Router Advertisement - 134

The _________ address is a multicast address with link-local scope that helps reduce the number of multicast groups to which nodes must subscribe to make themselves available for solicitation by other nodes on their local links.

Solicited-node

Configuring hosts to be weak or strong can be performed on both IPv4 and IPv6 network nodes.

True

Home Agents may include the Home Agent Information option in their Router Advertisement messages, but it should not be included if the Home Agent (H) bit is not set.

True

ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.

True

To ensure that packets cannot loop endlessly through a network, each IPv4 packet has a(n)_________ value - defined in the Network layer header.

Time To Live

The ___________ command-line utility uses route tracing to identify a path from the sender to the target host.

Traceroute

ICMP reports errors only about IP datagrams. Errors about error messages are not reported.

True

ICMP's job is to provide a variety of information about IP routing behavior, reachability, routes between specific pairs of hosts, delivery errors, and so forth.

True

IP addresses are used to identify individual IP hosts on a TCP/IP internetwork. true or false

True

It's up to the IP host that receives incoming ICMP messages to act on the content of those messages.

True

ND takes over the functions that ARP and Reverse ARP handled in IPv4.

True

Neighbor Discovery has five functional processes.

True

Nodes generally have a single entry in their default router lists, and all packets destined to nodes that are off-link are sent to their default gateway.

True

The ____ option is sent in Router Advertisement messages to provide a common MTU value for nodes on the same network segment.

c. MTU

neighbor solicitation seeks to determine the ___________ address for a node's neighbors.

link-layer

A node can send a __________ solicitation message to find or virfiy the link-layer address for a local node, to see if that node is still available, or o check that its own address is not in use by another node, which is known as Duplicate Address Detection

neighbor

The route information option is sent in _____________ advertisement messages.

router

A network is usually said to be converged when all the routers know a loop-free path to get to all other networks. true or false

true

At the command prompt on a windows 7 computer, what command is used to show the routing table for the IPv6 interface? 1) netsh interface ipv6 show route 2) netstat -p ipv6 3) netsh interface ipv6 show all routes 4) netsh interface ipv6 show routing table 5) netsh interface ipv6 show routes

1

In a RIPv2 packet, the ________ field contains a plain text password. 1) authentication 2) route tag 3) authentication type 4) origin 5) address family identifier

1

The __________ utility is a command-line that uses ICMP Echo packets to test router and link latency, as well as packet loss. 1) pathping 2) traceroute 3) ipconfig 4) netstat 5) route

1

The message type __________ documents when routing or delivery errors prevent IP datagrams from reaching their destinations. 1) ICMP Destination Unreachable 2) ICMP time exceeded 3) ICMP source quench 4) ICMP echo/echo reply 5) ICMP echo/echo reply and ICMP time exceeded

1

Upon receipt of the L flag in the Prefix Options of the Router Advertisement message, how should the host respond? 1) When set to 1, the host should use the prefix received for on-link address determination. 2) when set to 1, the host should use the prefix received for off-link address determination 3) when set to 0, the host should us the prefix received for off-link address determination 4) when set to 0, the host should use the prefix received for on-link address determination 5) none of these choices

1

Upon receiving a packet sent by a source node, what is the first task an IPv6 router performs? 1) running error checks on the packet header fields 2) reducing the value of the Hop Limit field by 1 3) checking the router's routing table 4) updates its destination cache 5) checking the router's destination cache

1

When a router sends a Redirect message to a host, which of the following choices best represents the intent of such a message? 1)To inform the host that a better first-hop router is available. 2) to inform the host that there are two routers that the host can use 3) to inform the host that the host should send all packets to the core router 4) to inform that there is a problem and that an alternate route should be used 5) to inform the host that there is no router usable for those messages

1

Which of the following definitions best describes a network that is in a converged state? 1) all routers know current available networks and their associated costs 2) all routers use link-state routing protocols. 3) routers are waiting for table updates to finish propagating 4) all routers use distance vector routing protocols 5) all routers use static routing tables

1

Which of the following path discovery command-line parameters turns off reverse DNS lookups? 1)-d 2) -n 3) -a 4) -h 5) -w

1

________ can summarize routing information before sending link-state packets to other networks. 1) Area border routers 2) Distance vectors 3) all of these choices 4) backbone areas 5) autonomous systems

1

When used over an asynchronous connection like an analog telephone link, PPP supports which of the following WAN encapsulation services? 1) bit-level integrity check 2) addressing 3) protocol identification 4) delimitation 5) ethernet

1,3,4

Which Neighbor Discovery messages will include the source link-layer address of the sender in its options field? 1) neighbor solicition 2) router advertisement 3) neighbor advertisement 4) redirect 5) reply solicitation

1,4

For which of the following link types must PPP provide addressing as part of its WAN encapsulation services? 1) X.25 connection 2) analog telephone link 3) T-carrier link 4) frame relay 5) ATM connection

1,4,5

The default TTL in Windows Server 2008, Windows Vista, and Windows 7 is _____. 1) 64 2) 128 3) 112 4) 72 5) None of these choices

128

On a network that is low on available bandwidth, the _____ process causes more traffic on the wire. 1) error-detection 2) fragmentation retransmission 3) data encapsulation 4) circuit switching 5) all of these choices

2

Routers use ________ to select a routing path where there are multiple paths available. 1) source routing 2) type of service 3) shortest prefix matching 4) precedence 5) none of these choices

2

The ICMP packet field ___ provides error detection for the ICMP header only. 1) redirect 2) none of these choices 3) type 4) host 5) code

2

Which of the following ICMP message types relates to congestion control? 1) destination unreachable 2) None of these choices 3) echo/echo reply 4) redirect 5) time exceeded

2

_____ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network. 1) broadcast 2) ICMP 3) OSPF 4) Path MTU 5) RIP

2

Of the following, which routing table types can an IPv6 routing table store? Choose all that apply 1) next-hop route 2) directly attached routes 3) host routes 4) default route 5) remote routes

2,3,4,5

A host or router can send the _________ error message to indicate that the protocol defined in the IP header cannot be processed. 1) code 4: fragmentation needed and don't fragment was set 2) code 7: destination host unknown 3)Code 2: Protocol Unreachable 4) code 3: port unreachable 5) code 5:source route failed

3

A node invokes the ____ process when it wants to send a packet to an on-link neighbor but the sender does not know the link-layer address for the target node. 1) redirect function 2) router discovery 3) address resolution 4) duplicate address detection 5) host discovery

3

An Ipv6 node uses NDP to discover the link-layer address of the next-hop router by sending a Router Solicitation message as what kind of network message? 1) broadcast 2) none of these choices 3) multicast 4) anycast 5) unicast

3

Hackers can use _________ as part of a reconnaissance process to learn about active network addresses and active processes. 1) presence 2) auto recovery 3) ICMP 4) all of these choices 5) availability

3

ND makes use of multicast addresses, such as the "____" address with link-local scope (FF02::1) 1) all routers 2) all domains 3) all nodes 4) all subnets 5) all proxies page number 323

3

What allows the IS-IS routing protocol to operate on IPv6 networks? 1) the addition of the ability to route intradomain traffic for the connectionlesss network service 2) the ability to tunnel IPv4 packets 3) the addition of two new type-length-values (TLVs) as extensions 4) the use of LSP packets 5) the neighbor ship process extended from the original IPv4 implementation

3

What is an update for the IPv6 routing protocol RIPing that did not exist in the IPv4 RIP implementation? 1) use of poison reverse 2) use of a 15 hop radius 3) use of multicast for sending updates 4) none of these choices 5) use of distance-vector

3

What is the first step that an IP host performs when it receives an Ethernet II frame? 1) strip off the FCS field and hand the packet to the data link layer 2) examine the payload to determine the actual destination address 3) check the validity of the FCS value 4) check the hardware address to see if it should be read further 5) determines if the destination is on the same or a different subnet

3

What is the name of the concept that indicates that a path exists between two TCP/IP hosts on an internetwork? 1)PMTU 2) Route tracing 3) reachability 4) internetworking 5) path discovery

3

What type of scan occurs when a series of ping requests for a range of IP addresses is performed? 1) network mapping 2)firewalking 3) Host probe (scan) 4) port scan 5) protocol scan

3

Which of the following RFCs describes ICMP? 1) 1191 2) 1812 3) 792 4) none of these choices 5) 950

3

Which of the following Windows command-line utilities is the primary tool for performing connectivity or reachability tests? 1) ipconfig 2) pathping 3)Ping 4) all of these choices 5) tracert

3

Which of the following command-line parameter for the ping command governs the Time to Live value? 1) -f 2) -w 3)-i 4) -n 5) -l

3

_________ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation. 1) ROUTE 2) Firewalking 3) PMTU Discovery 4) TRACEROUTE 5) PATHPING

3

Which of the following ICMP Type numbers identify Echo and Echo Reply messages? 1) 1 2) 3 3) 0 4) 8 5) 30

3,4

Although RFC ________ dictates that IP routers "must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing," many do not. 1) 1900 2) 1955 3) 1972 4) 1812 5) 1918

4

The ___ utility is a command-line utility that uses ICMP Echo packets to test router and link latency, as well as packet loss. 1) ROUTE 2) TRACEROUTE 3) NETSTAT 4) PATHPING 5) NTP

4

Which of the following statements best defines the intent of the PMTU process? 1) determines the largest possible MTU in the path between sender and receiver 2) justifies the inclusion of the Don't Fragment flag in ICMP messages 3) determines the smallest possible MTU in the path between sender and receiver 4) Instructs the sender on what MTU to use to avoid further fragmentation en route 5) deterines whether or not each router along the route supports fragmentation

4

Which value in bytes is the default MTU for IPv6 packets? 1) 1480 2) 512 3) 576 4) 1280 5) 1024

4

____ uses ICMPv6 type 133 messages. 1) neighbor solicitation 2) router advertisement 3) neighbor advertisement 4) router solicitation 5) redirect

4

A ________ is required to get the packet from one IP host to another IP host on a single network. 1) all of these choices 2) data link 3) delimiter 4) gateway 5) hardware address

5

A router sends the __________ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet. 1) code 4: fragmentation needed and don't fragment was set 2) code 2: protocol unreachable 3) code 3: port unreachable 4) code 7: destination host unkonown 5) code 5:source route failed

5

What gives BGP the ability to run on IPv6 networks? 1) the addition of anycast 2) the addition of IPv6 address support for the Next Hop attribute 3) the addition of MPLS 4) the elimination of fragmentation and reassembly 5)The addition of multiprotocol extensions

5

When looking for a destination address for a datagram ultimately bound for a remote network, an IP host must check which structure to obtain the necessary information? 1) a source route request 2) proxy ARP to get the hardware address for the destination machine 3) ARP cache 4) all of these choices 5) routing tables

5

________ simply prevents a router from advertising a network on the same interface from which it learned that network. 1) Source routing 2) spanning tree protocol 3) on-demand routing 4) link state routing 5) split horizon

5

__________ is used to obtain an IP address for an associated data link address. 1) Internet Protocol Control Protocol 2) Link Control Protocol 3) Network Control 4) Proxy ARP 5) RARP

5

IPv6 Duplicate Address Detection protocol can be compared with IPv4 ________________. 1) router advertisement 2) router solicitation 3) arp request 4) redirect 5) none of these choices 6) gratuitous ARP

6

Data for Echo Request messages may consist of one or more octets of arbitrary data.

False

Path MTU Discovery is only available for IPv6. True of False?

False

Routed protocols are Layer 1 protocols that are used to get packets through an internetwork.

False

The Code field provides error detection for the ICMP header only.

False

The ICMP Echo Request guarantees packet delivery.

False

The ICMP redirection process serves only IP routers, not IP hosts.

False

The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP header. T/F

False

_________ describes the concept of walking a firewall ACL or ruleset to determine what it filters and how.

Firewalking

The message type ___ permits a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path.

ICMP Redirect

_________ IP is defined by the IETF in RFCs 2003 through 2006 and RFC 3220.

Mobile

IPv6 network nodes send ________ messages in order to request the link-layer address of a target node.

Neighbor Solicitation

__________________ is a general-purpose protocol that provides WAN data link encapsulation services similar to those available for LAN encapsulations

Point to Point Protocol

_________ is a technique for assigning costs to routes designed to prevent routing loops.

Poison reverse

An IP host probe is performed by sending a ping packet (ICMP Echo Request packet) to each host within a range and noting the responses.

True

CMP reports errors only about IP datagrams. Errors about error messages are not reported.

True

Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance).

True

Routers send ICMP Redirect messages to indicate that a preferable route exists. T/F

True

The principal difference between these two versions of ICMP protocol is the integration of different messaging types under the ICMPv6 protocol.

True

Border Gateway Protocol is the original point-to-point protocol for encapsulating TCP/IP traffic over a WAN link and is still used for connecting to some ISPs today (mostly for access to older UNIX hosts). True or False

false

Both the IPv4 and IPv6 implementations of the OSPF routing protocol can manage multiple addresses and instances per interface. true or false

false

When a packet is fragmented, all fragments are given different TTL values. true or false

false

With router advertising, the default Lifetime value for route entries is 10 minutes. T/F

false

At the Data Link layer, protocol data units are called __________.

frames

ARP is used to obtain the hardware address of the destination IP hosts. True or False

true

ARP is used to obtain the hardware address of the destination IP hosts. true o false

true

If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet

true

If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet. true or false

true

One of the most difficult types of networks to implement and manage is one in which the users are always moving around. true or false

true


Kaugnay na mga set ng pag-aaral

R4:M8: Entity / Owners Transactions.

View Set

Classify as: direct materials, direct labor, or manufacturing overhead

View Set

109- TEST 2- Acute and Chronic respiratory

View Set

Mr. McGlynn's History - Unit one Roanoke Vocabulary

View Set

Postpartum Depression & Baby Blues

View Set

UNIT 4 STUDY GUIDE - INTRO TO NERVOUS SYSTEM

View Set

Ancient - Qin Shi Huangdi & the terracotta warriors

View Set

Anatomy of the Cell and Cell Division

View Set