Chaper 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following would be an SNMP object? number of rows in routing table a managed switch both number of rows in routing table and a managed switch neither number of rows in routing table nor a managed switch

number of rows in routing table

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? 16 bits 32 bits 64 bits None of these

32 bits

In an IPv6 global unicast address, the interface ID is ________ bits long. 32 64 128 It varies.

64

Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? 6 8 7 5

8

Which of the following is a private IP address range? 10.x.x.x 128.171.x.x both 10.x.x.x and 128.171.x.x neither 10.x.x.x nor 128.171.x.x

10.x.x.x

If your subnet part is 8 bits long, you can have ________ subnets. 128 254 256 64

254

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? 14 16 254 None of these

254

How many DNS root servers are there? 1 2 13 10

13

In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? 6 7 8 None of these

8

IPsec provides protection in two modes of operation; one of these two modes is ________. data link mode 802.1X mode network mode transport mode

transport mode

________ is a general naming system for the Internet. DNS NAT Dotted decimal notation DHCP

DNS

Which of the following can route non-IP packets? OSPF EIGRP both OSPF and EIGRP neither OSPFA nor EIGRP

EIGRP

In SNMP, companies are often reluctant to use ________ commands because of security dangers. Set request trap Get

Get

Which is less expensive to implement? SSL/TLS IPsec Both cost about the same to implement.

SSL/TLS

The domain name system ________. is a way to find a host's IP addresses if your computer only knows the host's host name is a general naming system for the Internet both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet neither is a way to find a host's IP addresses if your computer only knows the host's host name nor is a general naming system for the Internet

both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet

IPsec is used for ________ VPNs. remote-access site-to-site both remote-access and site-to-site neither remote-access nor site-to-site

both remote-access and site-to-site

SNMPv1 uses ________ for authentication. community names digital certificates and digital signatures a different password for each manager-agent pair All of these

community names

Pinging is to send ICMP ________ messages to the target host. ping error advisement echo request echo

echo request

To see if a target host can be reached, you normally would send it an ICMP ________ message. echo request error advisement either echo request or error advisement neither echo request nor error advisement

echo request

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. 0000 the interface ID fffe the subnet ID

fffe

If a host is to be able to communicate via IPv4 and IPv6, it is said to ________. be IP-agile be IPv6-ready be bilingual have a dual-stack

have a dual-stack

Which is NOT one of the three parts of a public IPv6 unicast address? subnet ID routing prefix host part All of these are parts in a public IPv6 unicast address.

host part

The part of an IPv6 global unicast address that designates the host is called the ________. host part interface ID routing prefix None of these

interface ID

A company is free to select whatever ________ dynamic routing protocol it wishes. interior exterior both interior and exterior neither interior nor exterior

interior

hich of the following is true about NAT? It can enhance security. It presents problems for some protocols. both It can enhance security and It presents problems for some protocols neither It can enhance security nor It presents problems for some protocols

neither It can enhance security nor It presents problems for some protocols

IP is reliable because of ________. echo and echo reply messages error advisement messages both echo and echo reply messages and error advisement messages neither echo and echo reply messages nor error advisement messages

neither echo and echo reply messages nor error advisement messages

".com" is a ________. root domain top-level domain second-level domain None of these

top-level domain

Client PCs must have digital certificates in ________. transport mode tunnel mode both transport mode and tunnel mode neither transport mode nor tunnel mode

transport mode

Which mode of IPsec may be more expensive if a company has a large number of computers? transport mode tunnel mode Both transport mode and tunnel mode are equally expensive.

transport mode

A company receives its domain name from ________. its ISP a domain registrar IETF its parents

a domain registrar

Today, it can be problematic to have only a single IPv6 stack because ________. a single IPv4 stack is out of date a single IPv6 stack could not communicate with a single IPv4 stack a dual stack has become a common solution All of these

a single IPv6 stack could not communicate with a single IPv4 stack

In tunnel mode, IPsec provides protection ________. all the way between the two hosts only between the IPsec servers both all the way between the two hosts and only between the IPsec servers neither all the way between the two hosts nor only between the IPsec servers

only between the IPsec servers

The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. protection over only part of the route higher cost both protection over only part of the route and higher cost neither protection over only part of the route nor higher cost

protection over only part of the route

The highest-level DNS servers are called ________. root servers top-level servers both root servers and top-level servers neither root servers nor top-level servers

root servers

Most corporations wish to have ________ domain names. top-level second-level third-level None of these

second-level

In IPsec, agreements about how security will be done are called ________. tranches security associations service-level agreements security contracts

security associations

________ is used for supervisory messages at the internet layer. DNS DHCP TCP ICMP

ICMP

________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. DNS NAT DHCP None of these

NAT

Which of the following would be an SNMP object? number of rows in routing table system uptime (since last reboot) both number of rows in routing table and system uptime (since last reboot) neither number of rows in routing table nor system uptime (since last reboot)

both number of rows in routing table and system uptime (since last reboot)

".edu" is a ________. root domain top-level domain second-level domain None of these

top-level domain


Ensembles d'études connexes

homework: Chapter 5: Cognitive Development in Infancy-PSY 228 (psych of human development)

View Set

Atlas A: General Orientation to Human Anatomy

View Set

Acts of the Apostles - Exam #1 Study Guide

View Set

Ch. 10 Sexual Reproduction and Genetics

View Set

Adult health exam 1 study material

View Set

What is computer made of? # Grade 3

View Set

Psychiatric/Mental health nursing - Foundations and modes of care

View Set

MUS Geology- Chapter 1 Test (No T/F)

View Set

head and spinal cord injury quiz questions

View Set