Networking Fundamental Test #2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the binary equivalent of the hex digit C? 1100 1101 0110 1110

1100

How many bits is an IPV6 Address? 64-bits 128-bits 32-bits 48-bits

128-bits

From the following list, identify a valid Class B IP address: 191.32.255.255 129.112.54.6 192.1.1.4 127.16.0.1

129.112.54.6

How many levels of encapsulation are requirement when an ICMP message travels in an IP datagram? 2 Layers 3 Layers 1 Layer 4 Layers

2 Layers

Which IPv4 Multicast Address Space below is for all systems on this subnet 224.0.1.0 224.0.0.1 239.0.0.0 224.0.0.0

224.0.0.1

Which IPv4 Multicast Address Space below is restricted to one network 224.0.0.1 - 224.0.0.255 239.0.0.0 - 239.255.255.255 224.0.1.0 - 238.255.255.255 224.0.0.0

224.0.0.1 - 224.0.0.255

Which IPv4 Multicast Address Space below is restricted to one network 239.0.0.0 - 239.255.255.255 224.0.0.1 - 224.0.0.255 224.0.0.0 224.0.1.0 - 238.255.255.255

224.0.0.1 - 224.0.0.255

Which IPv4 Multicast Address Space below is for all OSPFIGP Routers. 239.0.0.5 224.0.0.0 224.0.1.5 224.0.0.5

224.0.0.5

Which IPv4 Multicast Address Space below is global across the internet. 224.0.0.0 224.0.1.0 - 238.255.255.255 239.0.0.0 - 239.255.255.255 224.0.0.1 - 224.0.0.255

224.0.1.0 - 238.255.255.255

The 32-bit subnet mask below is represented in dotted decimal representation as11111111 11111111 11111111 00000000 254.254.254.0 256.256.256.0 255.255.255.0 252.252.252.0

255.255.255.0

How many bits is an IPV4 Address? 32-bits 48-bits 64-bits 128-bits

32-bits

The term octet is used to describe what size of binary number? 32-bit 8-bit 4-bit 48-bit

8-bit

The Transport layer (TCP) of the TCP/IP Model opens sockets between two hosts (Also called ports), what is a commend port number for HTTP? 431 81 80 443

80

Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet? DHCP ARP IP DNS

ARP

Pick the true statement below. ARP Request to all hosts cross Broadcast domains but never get sent to a router. ARP Requests to all hosts cross Broadcast domains through a router. to other networks ARP Requests to all hosts do not cross Broadcast domains through a router to other routers. ARP Request to all hosts do not cross Broadcast domains and never get sent to a router.

ARP Requests to all hosts do not cross Broadcast domains through a router to other routers.

When configuring firewalls on a router, the network administrator configures one or more: Firewall Configuration List (FCL) Access Control List(ACL) Access Configuration List (ACL) Firewall Control List (FCL)

Access Control List(ACL)

ARP stands for:? Address Redirect Performance Address Redirect Protocol Address Resolution Performance Address Resolution Protocol

Address Resolution Protocol

Which term below refers to a single device trasmitting a message to all other devices on the subnet? Broadcast Unicast Badcast Multcast

Broadcast

Which classes defined for IPv4 are not used for unicast? (Select all correct answers.) Class C Class D Class E Class B Class A

Class D Class E

Fixed-Lenth IPV4 Subnets are an example of: Classless IPV4 Network Addresses Classful IPV4 Network Addresses

Classful IPV4 Network Addresses

What are the three standard fields that ICMP messages begin with? (Check all that Apply) Code Field Type Field Checksum Field Message Body Field

Code Field Type Field Checksum Field

Whenever an error prevents a router from forwarding or delivering a datagram, the router sends this type of ICMP message back to the source:? Destination Unreachable Parameter Problem Router Advertisement Echo Reply Neighbor Advertise

Destination Unreachable

When utilizing a Uniform Resource Locator (URL) to access www.google.com, an IP Address is needed, because packets are routed to the destination using the IP Address. What service is used to convert a URL to a IP Address? Domain Name System (DNS) Address Resolution Protocol (ARP) Neighbor Discovery Protocol (NDP) Domain Name Solution (DNS)

Domain Name System (DNS)

An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation. Base 10 Decimal Octet Dotted-decimal

Dotted-decimal

Using the ping command, ICMP utilizes the following message types: (Check all that Apply) Echo Reply Router Advertisement Echo Request Router Discovery

Echo Reply Echo Request

Porotol Multiplexing is a benefit of a layered architecture allowing multiple protocols to coexist on the same infrastructure. In networks, a protocol data unit, at one layer is carried bya a lower layer. This process is also defined as: Encapsulation destructured Isolation Compressed

Encapsulation

There are some circumstances where data within a network gets corrupt, damaged, or lost. Dealing with this is called: Diagnosis Scheduling Error Control Error Scheduling Diagnosis Control

Error Control

A NAT Translation Table stores stores: Internal IP & Port Router Interface NAT Port External IP & Port MAC Address Payload Type

External IP & Port NAT Port Internal IP & Port Payload Type

Which IPv6 Multicast Address Space below is for all all nodes on the local network segment. FF02::1 FF02::5 FF02::6 FF02::a

FF02::1

Which IPv6 Multicast Address Space below is for all all nodes on the local network segment. FF02::5 FF02::1 FF02::a FF02::6

FF02::1

Which IPv6 Multicast Address Space below is for all all nodes on the local network segment. FF02::6 FF02::a FF02::1 FF02::5

FF02::1

Which IPv6 Multicast Address Space below is for all OSPFv3 ALL OSPF Routers. FF02::6 FF02::5 FF02::a FF02::1

FF02::5

Which IPv6 Multicast Address Space below is for all OSPFv3 ALLSPF Routers. FF02::1 FF02::5 FF02::6 FF02::a

FF02::5

Which IPv6 Multicast Address Space below is for all EIGRP routers FF02::a FF02::1 FF02::5 FF02::6

FF02::a

Which IPv6 Multicast Address Space below is for all EIGRP routers FF02::a FF02::6 FF02::5 FF02::1

FF02::a

Which ARP destination address request below is accepted by all computers? FF:FF:FF:FF:FF:FF AA:AA:AA:AA:AA:AA FA:FA:FA:FA:FA:FA EE:EE:E1:EE:EE:E1

FF:FF:FF:FF:FF:FF

What protocol below is used in mobile IPv6 FTTCP FMTCP FMIP FTIP

FMIP

An IPv6 ________ address is equivalent to an IPv4 public address. Global unicast Public unicast Public multicast Unique local

Global unicast

The ping command utilizes the following protocol? ARP DNS traceroute ICMP

ICMP

Which protocol allows routers to send error or control messages back to the source of a datagram that caused a problem? DNS IP DHCP ICMP

ICMP

Which specific protocols below support Multicast traffic for IPV4? IP TCP MLD IGMP

IGMP

What is NAT called on Linux Systems? TCP masquerading ICS masquerading ECS masquerading IP masquerading

IP masquerading

To be effective, a firewall that uses datagram (packet) filtering should restrict access to all: (Check-all-that-Apply) IP desitnations protocols IP sources protocol ports

IP sources protocol ports protocols IP desitnations

IP multicasting is availabe for both: UDP IPv6 TCP IPv4

IPv6 IPv4

Which generic facility has been develped to help UDP-based application hosted behind a NAT establish connectivity? Non-Interactive Connectivity Establishment (NICE) Interoperations Connection Establish (ICE) Interactive Connectivity Establishment (ICE) Non-Interoperations Connection Establish (NICE)

Interactive Connectivity Establishment (ICE)

What defines the primary goal to develop an effective technique for multiplexed utilization of existing interconnected networks? TCP/IP Model Internet Architecture Extranet Architecture OSI Model

Internet Architecture

What is NAT called on a Windows System? Internet Connection Sharing (ICS) Network Connection Sharing (NCS) TCP Connections Sharing (TCS) Extranet Connection Sharing (ECS)

Internet Connection Sharing (ICS)

What is the mechanism is considered a required part of IP: Internet Communication Protocol Internet Control Protocol Communicatoin Internet Protocol Internet Control Message Protocol

Internet Control Message Protocol

What Internet Protocol is considered a layer 3.5 protocol and is uses to exchange error messages and other vital information ? Transmission Control Protocol (TCP) Internet Control Master Protocol (ICMP) Internet Control Message Protocol (ICMP) Transmission Cost Protocol (TCP)

Internet Control Message Protocol (ICMP)

What Internet Protocol is to send multicast addressing and delivery messages to manage which hosts are members of a multcast group. ? Internet Multicast Cost Protocol (IMCP) Internet Group Management Protocol(IGMP) Internet Multicast Control Protocol (IMCP) Internet Group Master Protocol(IGMP)

Internet Group Management Protocol(IGMP)

IGMP is considered to be a service that is integrated with the IP Layer and stands for: Internal Group Management Protocol Internet Gateway Management Protocol Internet Group Managment Protocol Internal Gateway Management Protocol

Internet Group Managment Protocol

Which specific protocols below supports Multicast traffic for IPV6? IGMP TCP MLD IP

MLD

Which specific protocols below support Multicast traffic? IP MLD IGMP TCP

MLD IGMP

In practice, ARP is only used to:? Map a 32-bit IPv4 address to a 48-bit ethernet address Map a 64-bit IPv6 address to a 48-bit ethernet address Map a 128-bit IPV4 address to a 32-bit ethernet address Map a 32-bit IPv6 address to a 32-bit ethernet address

Map a 32-bit IPv4 address to a 48-bit ethernet address

Which term below refers to a single device trasmitting a message to a specific group of devices on the subnet? Badcast Broadcast Multcast Unicast

Multcast

Which IPv6 ICMP protocol and a feature of ND is used to detect when reachability between two systems on the same link has become lost? Neighbor Reachability Detection (NRD) Neighbor Reach (NR) Neighbor Unreachability Detection (NUD) Neighbor Detection (ND)

Neighbor Unreachability Detection (NUD)

What technology is used to translate an internal private ip address to a public IP address on the internet. Node Address Translation (NAT) Virtual Public Network (VPN) Network Address Translation (NAT) Virtual Private Network (VPN)

Network Address Translation (NAT)

____________________ technology provides transparent IP-live access to the Internet for a host that has a private, non-routable IP Addres. ex....10.0.0.6 Node Port Translation (NPT) Network Address Translation (NAT) Node Address Translation (NAT) Network Port Translation (NPT)

Network Address Translation (NAT)

Although serveral variants of NAT exist, the ________________ form is the most popular because it translates protocol port numbers as well as IP Addresses Network Address and Port Translation (NAPT) Network Address and Node Translation (NANT) Node Address and Port Transport (NAPT) Node Address and Node Tranlsation (NANT)

Network Address and Port Translation (NAPT)

What is the most frequently mentioned concept of protocol layering as defined by the International Organization for Standardization (ISO)? TCP/APP Model Open Systems Interconnection (OSI) Model Open Systems InterOffice (OSI) Model TCP/IP Model

Open Systems Interconnection (OSI) Model

What defines "chunks" of digitial information comprsiong some number of bytes carried through the network somewhat independently? Packet Switching Packet Routing Service Frame Switching Delivery Routing Service

Packet Switching

Routers are prohibited from fragmenting an IPv6 Datagram. The source sending the datagram must perform a path MTU discovery. Which IPv6 ICMP message is used for this? Destination Unreachable Packet Too Big Parameter Problem Redirect Message Time Exceeded

Packet Too Big

What defines the format and order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or recipt of a message or other event. Interoperability Services Protocol Internetworking Communication methods

Protocol

When a router detects a host using a nonoptimal first hop, the router send the host the ofllowing ICMP message: Destination Unreachable Router Advertisement Parameter Problem Redirect Message Packet Too BIg

Redirect Message

How is every official standard in the Internet community published? Hubs Request for Documentation (RFD) Request for Closure (RFC) Request for Comments (RFC)

Request for Comments (RFC)

NDP defines five ICMPv6 message types: Router Advertisement Neighbor Advertisement Duplicate Address Detection (DAD) Redirect Router Solicitation Neighbor Solicitation

Router Advertisement Neighbor Advertisement Redirect Router Solicitation Neighbor Solicitation

NDP operates at Layer 3 by using ICMPv6 meesages. Select the major functions fthat NDP Provides (Select-all-that-Apply) Router Discovery Stateless Autoconfiguration Neighbor Discovery Duplicate Address Detection (DAD) DNS Server Discovery Address Resoultion

Router Discovery Stateless Autoconfiguration Neighbor Discovery Duplicate Address Detection (DAD) DNS Server Discovery Address Resoultion

When type of devices forward packets to another network across the internet? Switches Mobile Phones Routers Hubs

Routers

What are the two most common forms of proxy firewalls? SOCKS firewalls IP firewalls HTTP proxy Firewalls TCP Firewalls

SOCKS firewalls HTTP proxy Firewalls

One of the primary workhorses for UNSAF and NAT traversal is called: UNSAF STUN STAN NAT

STUN

Which protocol below is a relatively simple client/server portocol that is able to ascertain the external IP address and port numbers being used on a NAT in most circumstances? STAN UNSAF STUN NAT

STUN

Which protocol is a special set of enhancements aimed at providing additional security for IPV6 ICMP ND messages? Secure IPV6 (SIP) Secure Neighbor Discovery (SEND) Secure Neighbor Reachability (SNR) Neighbor Unreachability Detection (NUD)

Secure Neighbor Discovery (SEND)

Which protocol is considered a reliable flow of data between two hosts? UDP UMP TMP TCP

TCP

What network standards did the Defense Advanced Research Project Agency (DARPA) provide? Hint: Draws its origins from ARPANET TCP/IP Internet Protocol Suite Open Systems Interconnection Model Internetworking Protocol Suite OSI Networking Suite

TCP/IP Internet Protocol Suite

The ARPANET reference model was utilimately adopted and called the:? IT Model TCP Model IP Model TCP/IP Model OSI Model

TCP/IP Model

What are some of the secondary goals for Internet Architecure? (Select all that Apply) The Internet must support multiple types of communication services The reosurces used in the Internet archtecutre must be accountable. The Internet architecture must permit host attachment with a low level of effort. The Internet archictures must accommodate a variety of networks. The internet communcaiton must continue despite loss of networks or gateways The internet architecure must be cost-effective. The Internet architecture must permit distributed management of its resources.

The reosurces used in the Internet archtecutre must be accountable. The Internet must support multiple types of communication services The internet communcaiton must continue despite loss of networks or gateways The Internet archictures must accommodate a variety of networks. The Internet architecture must permit host attachment with a low level of effort. The Internet architecture must permit distributed management of its resources. The internet architecure must be cost-effective.

What does an ARP Table contain? The table matches an IP Address with the associated MAC Address The table matches MAC to MAC addresses. The table matches DNS names to IP Addresses. The table matches the source and destination of the default gateway.

The table matches an IP Address with the associated MAC Address

Because internet routers each use local information when forwarding datagrams, error can develop which can product routing loops. To prevent these loops, each IP datagram contains a hop limit, when this hop limit is reached, the router discards the datagram and send the following ICMP message: Router Discovery Parameter Problem Router Advertisement Time Exceeded

Time Exceeded

What protocol provides a way for two or more systems to communicate even if they are located behind relatively uncooperative NATS? Traversal Using Relays (TUR) STUN Using Relays (SUR) STUN around NAT (STURN) Traversal Using Relays around NAT (TURN)

Traversal Using Relays around NAT (TURN)

Which protocol is provides a simpler service to the application layer, but no guranteed that the datagrams will reach the host? UDP UMP TCP TMP

UDP

Which protocols does STUN utilize below? Check-all-that-apply TCP IP TCP w/TLS UDP

UDP TCP w/TLS TCP

Which term below refers to sending a frame from host to host. Unicast Badcast Multcast Broadcast

Unicast

ICMP messages provide commu ncation between: an Application on one machine and an ICMP module on another machine an ICMP module on one machine and an ICMP module on another an Application on one machine and an Application on another machine. an ICMP module on one machine and an Application on another

an ICMP module on one machine and an ICMP module on another

Proxy firewalls are not really Internet routers, but are essentially hosts running one or more _____________ that relay traffic of certain types between one connection/associatin and another application layer. IP-layer gateways (ILG's) application-layer gateways (ALGs) MAC-layer gateways (MLG's) port-layer gateways (PLG's)

application-layer gateways (ALGs)

What type of attack involves the proxy facility to masquerade as some host? dos tcp arp ip

arp

What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI? arp -a netstat -a arpname ifconfig

arp -a

Secure Neighbor Discovery uses an entirely different IPv6 address called a: contgious nongeerated address (CNA) cryptographically generated address (CGA) cryptographically nongenerated address (CNA) contigous generated address (CGA)

cryptographically generated address (CGA)

Packet-filtering firewalls act as Internet routers and __________ some traffic. filter (pass) block (pass) filter (drop) block (drop)

filter (drop)

THe simjplest method for scheduling the way packets are processed as they move through the network is: first-in-last-out (FILO) first-in-first-out (FIFO) last-out-last-in (LOLI) last-in-first-out (LIFO)

first-in-first-out (FIFO)

A method that attempts to allow two or more systems, each behind NAT, to communicate directly using pinholes is called: cow punching ip punching pin punching hole punching

hole punching

One of the popular systems for building firewalls is included with modern versions of Linux and is called: iptables filters acls ipacls

iptables

Some hardware technologies support a second form of multi-point delivery called hardware _______. multicast unicast broadcast spincast

multicast

A ________________ is a term to dentoe the set of computers that are listening to a particular multicast address. multicast group broadcast group spincast group unicast group

multicast group

ICMP, Internet Control Message Protocol provides status information about IP Packets. When an CIMP error message passed through NAT, the addressses in the ___________________ need to be rewritten by NAT, so that the end client understands the ICMP error message. port datagram tcp datagram offending datagram originating datagram

offending datagram

What are the two major types of firewalls commonly used: PAT firewalls packet-filtering firewalls NAT firewalls proxy firewalls

proxy firewalls packet-filtering firewalls

When designing IP subnets, the ________ defines the size of the subnet. subnet mask autonomous system wildcard mask area

subnet mask

An ARP reply carries: (Check All that Apply) the IPv6 address and hardware address of the original requester the IPv6 address and hardware address of the snder. the IPv4 address and hardware address of the original requester. The IPv4 address only. The IPv6 address only. The IPv4 address and hardware address of the sender.

the IPv4 address and hardware address of the original requester. The IPv4 address and hardware address of the sender.

When a datagram causes an error, ICMP can only report the error condition back to: the source application the destination application the datagram destination the original source of the datagram

the original source of the datagram

What is included in every ARP broadcast? the receiver's IP-to-hardware address binding Neither the receiver's or sender's IP-to-hardware address binding. the sender's IP-to-hardware addreess binding Both the receiver's & sender's IP-to-hardware address binding.

the sender's IP-to-hardware addreess binding

IGMP works with multicast and has two phases: when a host joins a multicast group, the host sends an IGMP message to the groups multicast declaring its membership. local multicast routers periodically poll hosts on the local network to determine whether any hosts still remain members of each group. when a host joins a multicast group, the host does not send an IGMP message to the groupls multicast membership. local multicast routers wait for polls from hosts on the local network to determine whether any hosts still remain in the group.

when a host joins a multicast group, the host sends an IGMP message to the groups multicast declaring its membership. local multicast routers periodically poll hosts on the local network to determine whether any hosts still remain members of each group.


Kaugnay na mga set ng pag-aaral

OB ch. 12, Chapter 25: Pregnant Woman, Ricci, Kyle & Carman: Maternity and Pediatric Nursing, Second Edition: Chapter 12: Nursing Management During Pregnancy; PrepU, Fetal Assessment for Risk Factors (Exam 3), RICCI Chapter 12, Chapter 12 OB, Chapter…

View Set

Biology: Human Anatomy and Physiology

View Set

Fundamentals of Financial Planning Questions

View Set

Microbiology Chapter 6 LearnSmart

View Set

Equations with variables on both sides (including special solutions), Literal Equations

View Set

Patient Protection and Affordable Care Act (PPACA) - Section 14

View Set

EQE Unit: 1, 16, 4, 2 [Ch 1, 2, 10, 3, 4]

View Set

Chapter 61: Caring for Clients Requiring Orthopedic Treatment

View Set