TESTOUT CH 7

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is a characteristic of static routing when compared to dynamic routing? -Routers send packets for destination networks to the next hop router. -All routes must be manually updated on the router. -Routers use the hop count to identify the distance to a destination network. -Routers can only use static routing when not connected to the internet.

-All routes must be manually updated on the router. (static routing requires that entries in the routing table are configured manually. Network entries remain in the routing table until manually removed. WHen changes to the network occur, static entries must be added or removed. The next hop router is used with most routes to identify the next router in the path to the destination, regardless of whether the route is a static or dynamically-learned route. The hop count can be used by static or dynamic routes, depending on the routing protocol used. static routing can be used for private and public networks whether they are connected to the internet or not)

Which of the following routing protocols is used by routers on the internet for learning and sharing routes? -EIGRP -BGP -OSPF -IS-IS -RIP

-BGP (BGP (border gateway protocol) is the protocol used on the internet. ISPs use BGP to identify routes between ASs. Very large networks can use BGP internally, but typically only share routes on the internet if the AS has two (or more) connection to the internet through different ISPs. RIP is used on small private networks, while OSPF and EIGRP are used on larger private networks. IS-IS is used on very large private networks and within the internet service provider (ISP) network.

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?

-BGP (BGP is an advanced distance vector protocol (also called a path vector protocol) that uses paths, rules, and policies to make routing decisions.)

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network? -VLSM -Convergence -Classful -Link state -Distance vector

-Convergence (the term convergence is used to describe the condition when all routers have the same (or correct) routing information. Convergence requires some time, but once it is reached, it means that any router has learned about all other networks that are being advertised (or shared) on the network. Link-state and distance vector describe general methods that routers use to share routes with other routers. Classful describes a routing protocol that assumes the subnet mask based on the address class of the network. Variable length subnet masks (VLSM) lets you use custom subnet masks for subnetting or supernetting.)

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receive a packet addressed to network 10.1.0.0/16. What will the router do with the packet? -Hold the packet in cache until a matching route is learned or configured. -send the packet to both networks 192.168.3.0 and 192.168.4.0 and to the next hop router. -send the packet out both of its directly-connected networks as a broadcast frame. -drop the packet

-Drop the packet (if a packet does not match any route in a routing table, the router drops the packet. In this example, the router does not know about the destination network, and it is not configured with a default route. With a default route, the router will forward the packet to the next hop router specified by the default route.)

Which of the following routing protocols is classified as a hybrid routing protocol? -IS-IS -EIGRP -RIP -OSPF

-EIGRP (EIGRP is a hybrid routing protocol developed by cisco for routing within an AS. RIP is a ditance vector protocol, while OSPF and IS-IS are link state protocols.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. what will the router so with the packet? -Forward the packet to the next hop router specified by the route to the network 0.0.0.0. -drop the packet -send the packet out both of its directly connected networks to the next hop router. -send the packet out both of its directly connected networks as a broadcast frame.

-Forward the packet to the next hop router specified by the route to the network 0.0.0.0. (a route of 0.0.0.0 with a mask of 0.0.0.0 identifies a default route. The default route is used when no other route is a better match. Packets that match no other networks are sent to the next hop router specified by the default route.)

Which of the following are true about reverse proxy? (select two)

-Handles requests from the internet to a server in a private network. -Can perform load balancing, authentication, and caching. (A reverse proxy server handles requests from the internet to a server located inside a private network. Reverse proxies can perform load balancing, authentication, and caching. Reverse proxies often work transparently, meaning clients don't know they are connected to a reverse proxy.)

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers. -If the network is connected to the internet using public addressing. -If the network has over 15 areas and uses IPv6. -If the network has over 15 hops. -If the network is connected to the internet using multiple ISP's.

-If the network is connected to the internet using multiple ISP's. (very large networks can use BGP internally, but typically only share routes on the internet if the AS has two (or more) connections to the internet through different ISPs If your network has over 15 hops, use a routing protocol other than RIP. Use OSPF or IS-IS to divide your network into areas. Private networks that use public IP addresses do not need to share routes with internet routers; it is typically the responsibility of the ISP to configure routes into the private network, even when public addressing is being used. A single route out of the private network is all that is required if the network has a single connection to the internet.)

You would like to control internet access based on users, time of day, and websites visited. How can you do this?

-Install a proxy server. Allow internet access only through the proxy server. You can configure rules on a proxy server based on users, time of day, and websites visited. all intenet acces requests are routed through the proxy server. Use a packet filtering firewall, such as windows firewall, to allow or deny individual packets based on characteristics such as source or destination address and port number. Configure internet zones to identify trusted or restricted websites and control the types of actions that can be performed when visiting those sites.

When multiple routes to a destination exist, what is used to select the best possible route? -Distance vector -Metric -Autonomous system number -Exterior gateway protocol

-Metric (Routers use metric values to identify the distance, or cost, to a destination network. The metric is used by the routing protocol to identify and select the best route to the destination when multiple routes exists. The metric can be calculated based on hop count, bandwidth, or link cost. The exterior gateway protocol is a routing protocol that routes traffic between autonomous systems. The distance vector is a routing protocol that defines how routers update and share routing information. An autonomous system number is a unique number used to identify an autonomous system.)

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? -EIGRP -RIP -IS-IS -OSPF

-OSPF OSPF divides a large network into areas. Each autonomous system requires an area 0 that identifies the network backbone. All areas are connected to area 0, either directly or indirectly through another area. Routes between areas must pass through area 0. IS-IS uses areas, but does not have an area 0 requirement. Neither RIP nor EIGRP use area.

Which of the following routing protocols uses relative link cost as the metric? -BGP -RIP -OSPF -EIGRP

-OSPF OSPF is a link-state routing protocol used for routing within an OSPF uses relative link cost for the metric.

Which of the following best describes OSPF? -OSPF is a classful distance vector routing protocol. -OSPF is classless link state routing protocol. -OSPF is a classful link state routing protocol. -OSPF is a classless distance vector routing protocol

-OSPF is classless link state routing protocol. RIP version 1 and IGRP are both classful distance vector routing protocols that supports classless addressing.

What are the main differences between the OSPF and IS-IS routing protocols? -OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol. -OSPF requires an area 0, while IS-IS does not. -OSPF is a classful protocol, while IS-IS is a classless protocol. -OSPF is a link state protocol, while IS-IS is not.

-OSPF requires an area 0, while IS-IS does not. (Like OSPF, IS-IS uses areas when designing the network. However, IS-IS does not require an area 0 like OSPF does. Because IS-IS was originally designed for non-IP protocols, it can more easily support IPv6 routing. Both OSPF and IS-IS have the following characteristics: -both are link state protocols. -both are classless protocols, supporting CIDR and VLSM. -Both are interior Gateway Protocols (IGPs) that are used within an AS)

Which of the following is a firewall function?

-Packet filtering (Firewalls open filter packets by checking each packet against a set of administrator-defined criteria. If the packet is not accepted, it is simply dropped)

Which of the following protocols has a limit of 15 hops between any two networks? -RIP -BGP -IS-IS -EIGRP -OSPF

-RIP (RIP networks are limited in size to a maximum of 15 hops between any two networks. A networks with a hop count of 16 indicates an unreachable network. The other routing protocols do not use the hop count as the metric. EIGRP uses bandwidth and delay for the metric. OSPF and IS-IS use a relative link cost. BGP uses paths, rules, and policies for the metric)

Which of the following statements about RIP is true? -RIP uses hop counts as the cost metric. -RIP is suitable for large networks. -RIP is the routing protocol used on the internet. -RIP is a link state routing protocol.

-RIP uses hop counts as the cost metric. (RIP is a distance vector routing protocol. As such, it is susceptible to the count-to-infinity problem. RIP uses the hop count as the cost metric. Because it has a limitation of 15 hops in one route, it is not suited for large networks.)

What info does the next hop entry in a routing table identify. -The last router in the path to the destination network. -The first router in the path to the destination network. -A backup router that is used to forward packets addresses to unknown networks -The number of routers that the packet must go through to reach the destination network.

-The first router in the path to the destination network. (the next hop router is the first(or next) router in the path to the destination network. Each router looks at the destination network in the packet, then consults the routing table to identify the next hop router to the destination network. The hop count identifies the number of routers in the path to the destination network. A default gateway router is a router that is used for packets sent to external networks. Most routers do not have a default gateway setting, but instead use a default route setting, which identifies a next hop router for all unknown networks.)

A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? -Stop and restart the RIP protocol on the router. -Force RIP to perform an immediate update -Wait for convergence to take place -Manually configure the default route to point to the new next hop router.

-Wait for convergence to take place (when using a routing protocol, changes in routing information take some time to be propagated to all routers on the network. The term "convergence" is used to describe the condition when all routers have the same (or correct) routing information. Static routes in the routing table must be updated manually. Restarting RIP might actually increase the time required for changes to be learned. Forcing an update (if the router supports it) is not a requirement, as the periodic sharing of routes will eventually update the routing table entry.)

Which of the following tasks do routers perform? (select 2) -identify devices through hardware addresses. -maintain info about paths through an internetwork. -control access to the transmission media. -route data based on logical network addresses -multiplex signals onto the same transmission media -Route data based on hardware device addresses.

-maintain info about paths through an internetwork. -route data based on logical network addresses Routers build and maintain tables of routes through an internetwork and deliver data between networks based on logical network addresses.

Which of the following are true of a circuit proxy filter firewall? (select 2)

-verifies sequencing of sessions packets. -operates at the session layer. (a circuit proxy filter firewall operates at the session layer. It verifies the sequencing of session packets, breaks the connections, and acts as a proxy between the server and the client. An application layer firewall operates at the aplication layers, examines the entire message, and can act as a proxy to clients. a stateful inspection firewall operates at the network and transport layers. It filters on both IP addresses and port numbers. A kernel proxy filtering firewall operates at the operating system ring 0.

You have a computer that is connected the internet through a NAT router. You want to use a private addressing scheme for your computer. What range of IP addresses can you use?

1. 10.0.0.1 - 10.255.255.254 2. 172.16.0.1 - 172.31.255.254 3. 192.168.0.1 - 192.168.255.254

Which of the following IP addresses is a valid IP address for a host on a public network?

142.15.6.1

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?

169.254.0.1-169.254.255.254

You want to connect your small company network to the internet. You ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connections to internal hosts. What type of network address translation should you implement?

Dynamic NAT

You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use? -Link state -BGP -Distance Vector -IGP -Static -Dynamic

IGP (You would use an interior gateway protocol (IGP) on routers within your network. Routing protocols can be classified based on whether they are routing traffic within you network. Routing protocols can be classified based on whether they are routing traffic within or between autonomous systems. an GIP routes traffic within an AS; an exterior gateway protocol (EGP) routes traffic between ASs. Link state and distance vector describe how routing protocols share routing information. The network size might determine which protocol is best for your network. Static routing uses manually defined routes in the routing table, while dynamic routing uses a protocol so routers lean and share routes with other routers. You can use static routing, dynamic routing, or both on a private network.

What does the tracert command show?

It show you each host a packet must pass through to reach its destination

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the internet . What is the cause of the problem?

Missing default route on the router

You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet. However, the comes does access other computers on other subnets as well as the internet.

Missing route on the default gateway router

You work for a large multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately users in one location have complained that they are unable to access resources stored on a server name FS23 in a South American branch office. To troubleshoot, you have done the following (1) Verified that the server is up and running, and (2) Verified that the various routers in between the two locations are up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 -f -l 1500 command on your workstation. The ping returns the following command for each packet sent. "Packet needs to be fragmented but DF set." What does this mean?

One of the intermediate routers is an MTU black hole

Which of the following associates a port number with a host on a private network?

PAT

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?

Port Forwarding

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the internet. Why can't you access the server?

Private IP addresses are not accessible through the internet

Your computer has an IP address of 161.13.5.15. Your computer is on a?

Public Network

Which utility would you use to view a routing table?

Route

You are the network administrator for a small company that implements NAT to access the internet. You recently acquired five servers that must be accessible from outside your network. Your ISP has provide you with five additional registered IP addresses to support these new servers, but you don't want the public to access these server directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the website. Which method of NAT translation should you implement for these five servers?

Static

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you allow access to?

Static NAT

What does the route print or netstat -r command display?

The command displays the contents of the routing table.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having problems. Which of the configuration values would you most likely need to change?

default gateway

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five MactIntosh clients. User have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is working properly?

tracert


Kaugnay na mga set ng pag-aaral

U.S. Constitution Practice Test 2

View Set

HA Chpt 24 Neuro Practice Questions

View Set

Pathophysiology: Fluid & Hemodynamic Disorders

View Set

NU471 Week 5 EAQ #4 Evolve Elsevier: Disaster Planning - Mastery Level Target: Level 3

View Set