Chapter 4, Chapter 5, Chapter 6
ICMP type ____ is used for echo reply packets.
0
Match Each item. 1. The non-data bites of bytes requires to move data to and from one location to another 2. A condition that occurs when the delivery times for packet increase beyond normal limits. 3. A two-staged reconnaisance method involving an initial parameter device discory phase and subsequent inverse mapping of filtered devices. 4.The ability to find at least one transmission path between a pair of hosts so they can exchange datagrams across an internetwork. 5. The comparative difference in throughput between two paths and is measured in Kbps and Mbps. 6. An ICMP message that contains request for configuration of other information 7. The process of identifying live network hosts positioned behind a filtering device by probing for addresses known not be in use. 8. A link that does not support forwarding based on the current packet format and configuration. 9. An ICMP process whereby a host sends an Echo packet to another host on an internetwork.
1. Overhead 2. Network congestion 3. Firewalking 4. Reachability 5. Throughput difference 6. ICMP query message 7. Inverse mapping 8. Restricting link 9. ICMP echo communication
The default TTL in Windows Server 2008, Windows Vista, and Windows 7 is ____.
128
Which of the following ICMPv6 type numbers relate to router solicitation and router advertisement messages? (Choose all that apply)
134 133
If configured to do so, routers periodically send unsolicited ICMP Router Advertisements to the all-hosts multicast address ____.
244.0.0.1
IPv6 Neighbor Solicitation protocol can be compared with IPv4 ____.
ARP request
A node invokes the ____ process when it wants to send a packet to an on-link neighbor but the sender does not know the link-layer address for the target node.
Address resolution
ND makes use of multicast addresses, such as the "____" address with link-local scope (FF02::1).
All nodes
Which of the following definitions best describes a network that is in a converged state?
All routers know current available networks and their costs
The PMTU specification defines in RFC 1191 requires the PMTU host to try periodically a larger MTU to see if the ____ has increased
Allowable data size
____ can summarize routing information before sending link-state packets to other networks.
Area Border routers
In RIPv2 packet, the _____ field contains a plain text password.
Authentication
When used over a asynchronous connection like an analog telephone link, PPP supports which of the following WAN encapsulation services? (Choose all that apply)
Bit-Level integrity check Delimitation Protocol identification
Which is the first step that an IP host performs when it receives an Ethernet II frame?
Check the validility of the FCS value
Which of the following ICMP packet fields provide error detection for the ICMP header only?
Checksum
A host router can send which of the following error message to indicate that the protocol defines in the IP header cannot be processed?
Code 2: Protcol unreachable
Of which of the following ICMP replies are there two versions, which are: the standard version that simply states the packet had that DON'T fragment bit set when it reached a router that needed to fragment it, and the PMTU version that includes information about the restricting link?
Code 4: Fragmentation needed and don't fragment was set.
Which ICMP reply does a router send in order to indicate that the router cannot use the strict or loose source routing path specified in the original packet?
Code 5: Source route failed.
A ____ routing protocol shares information about how far away all networks are to the destination.
Distance Vector
Before an IP datagram is transmitted onto the cable, the data link ______ puts the leading frame onto the datagram
Driver
Border gateway protocol is the orifinal point to point protocol for encapsulting TCP/IP traffic over a WAN link and is still used for connecting to some ISPs today (mostly for access to older UNIX hosts)
False
Both IPv4 and IPv6 implantations of the OSPF routing protocol can manage multiple addresses and instances per interface.
False
Neighbor discovery makes abundant use of messages.
False
Routed protcols are Layer 1 protocols that are used to get packets through an internetworks.
False
The value 0 in the IP header protocol field denotes that an ICMP header follows the IP header.
False
There are three types of IPv6 nodes: routers, switches, hosts.
False
Upon start-up, Neighbor Discovery collects information about how nodes configure their IPv6 addresses to communicate on the network.
False
When a packet is fragmented, all fragments are given different TTL values.
False
With router advertising, the default Lifetime value for route entries is 10 minutes.
False
___ describes the concept of walking a firewall ACL or ruleset to determine what it filters and how.
Firewalking
On a network that is low on available bandwidth, the ___ process causes more traffic on the wire.
Fragmentation retransmission
At the data link layer, PDUs are called.
Frames
A ___ is required to get the packet for on IP host to another IP host on a single network.
Hardware Address
An IP ___ is performed by sending a ping packet (ICMP echo request packet) to each host within a range of noting the responses.
Host Probe
Which of the following can hackers can use as part of the reconnaissance process to learn the active network addresses and active processes?
ICMP
Which message type supports functionality for reachability utilities like Ping and Tracert; essential when installing, configuring, and troubleshooting IP networks?
ICMP Echo/Echo Reply
Which of the following message types document when routing or deliver errors precent IP datagrams from reaching their destinations?
ICMP destination unreachable
Which of the following message types document when routing or deliver errors prevent IP datagrams from reaching their destinations?
ICMP destination unreachable
Using which of the following as well as some manipulation of the TTL value in the IP headers, traceroute results provide a list of router along a path, as well as the round-trip latency time to each router?
ICMP echo requests
Which of the following types of messages server to keep hosts apprised of networking conditions and problems, and equipped to use the best paths around the network?
ICMP messages
Which of the following message types permit a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path?
ICMP redirect
Which of the following IMCP types is used for echo request packets?
ICMP type 8
Which of the following represents the five states of a neighbor cache entry?
INCOMPLETE, REACHABLE, STALE, DELAY, PROBE
Which of the following typically learn about routes through manual configuration of the default gateway parameter and redirection messages?
IP Host
Which of teh following processes is one method of obtaining a list of the active hosts on a network?
IP address scanning
What protocol protects the authentication and confidentiality of ICMPv6 exchanges?
IPsec
RIP and OSPF are examples of ____ gateway protocols
Interior
___ switches are devices that can perform switching based on the MAC address and, when necessary, examine the network layer header to make routing decisions.
Layer 3
According to the host sending algorithm, which two conditions must be met in order for a host to send a packet to a destination node's link layer address? (Choose all that apply)
Link-layer entry in the neighbor cache Destination address in the destintaion cache
____ IP is defined by the IETF in RFCs 2003 through 2006 and RFC 3220.
Mobile
An IPv6 node uses NDP to discover the link-layer address of the next-hop router by sending a Router Solicitation message as what kind of network message?
Multicast
The target link-layer address option is used to _____ and router advertisement messages.
Neighbor Advertisements
____ uses ICMPv6 type 135 messages.
Neighbor Solicitation
A host invoking the Duplicate Address Detection process sends what type of message?
Neighbor solicitation
A node can send a ____ message to find (or verify) the link layer address of a local node, to see if a node is still available, or to check that its own address is not already in use by another node.
Neighbor solicitation
___ seeks to determine the link layer address for node's neighbors.
Neighbor solicitation
If a router becomes unavailable to a node, that node will invoke the ___ process.
Neighbor unreachability detection
All IPv4 packets have a predefined lifetime indicated in each packet's ____ field.
None of these choices
IPv6 Duplicate Address Detection protocol can be compared with IPv4 ____.
None of these choices
The ____ option is sent in router advertisement messages to provide a common MTU value for nodes on the same network segment.
None of these choices
What choice best represents how a host should behave upon receipt of the H flag in the prefix options of the router advertisement message?
None of these choices
Which RFC most completely defines Neighbor Discovery for IPv6?
None of these choices
Which of the following routing protocols is a link-state protocol?
None of these choices
The link local scope of all routers multicast address is which of the following?
None of these choices.
Which of the following enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation?
PMTU discovery
___ is a general purpose protcol that provides WAN data link encapsulation services similar to those available for LAN encapsulations.
PPP
Two of the most well-known utilities, Ping and Tracert, rely on ICMP to perform connectivity tests and ____.
Path-discovery
___ is a technique for assigning costs to routes designed to prevent routing loops.
Poison reverse
____ is a method that allows an IP host to use a simplified subnetting design.
Proxy ARP
____ is used to obtain an IP address for an associated data link address.
RARP
Which RFC defines a method for discovering a path MTU (PMTU) using ICMP?
RFC 1191
For any network node to communicate and exchange data with another network node, some way of forwarding packets from the sender to receiver must exist. This concept is called ____.
Reachability
_____ ICMPv6 type 137 messages
Redirect
Which neighbor discovery messages will include the source link layer address of the sender in its options field? (Choose all that apply)
Redirect Neighbor solicitation
____ help keep local routing optimized in the face of changing conditions and also reflect status as various destinations come on- and off-link.
Redirects
Of the following, which routing table types can an IPv6 routing table store? (Choose all that apply)
Remote Routes Default Routes Host Routes Directly attached routes
____ uses ICMPv6 type 133 messages.
Router Solicitation
The route information option is sent in ____ messages.
Router advertisement
By default, IPv6 nodes will send a ____ multicast request for configuration parameters immediately upon start-up.
Router solicitation
Which of the following are basic rules of operations for nodes (routers and host) concerning redirect messages?
Routers do not update their routing tables if they receive redirect messages. Hosts do not send redirect messages.
When looking for a destination address for a datagram ultimately bound for a remote network, an IP host must check which structure to obtain the necessary information?
Routing Tables
A ____ is a compilation of information about all the networks that the router can reach.
Routing table
Upon receiving a packet sent by a source node, what is the first task an IPv6 router performs?
Running error checks on the packet header fields
Which of the following choices permit a node to consider a neighbor to be reachable? (Choose all that apply)
Solicitated Neighbor advertisements are recieved within the REACHABLE_TIME variable Upper-layer protocol indicated forward progress within the REACHABLE_TIME variable
The _____ address is a multicast address within the link local scope that helps reduce the number of multicast groups to which nodes must subsribe to make themselves available for solicitation of other nodes on their local links.
Solicited-node
Which of the following may a router or host use as a way to indicate that it is becoming congested or overloaded?
Source Quench
____ simply prevents a router from advertising a network on the same interface from which it learned that network.
Split horizon
What gives BGP the ability to run on IPv6 networks?
The addition of multiprotocol extensions
What is the IS-IS routing protocol to operate on IPv6 networks.
The addition of two new type length values (TLVs) as extensions.
To ensure the packets cannot loop endlessly through a network, each packets has a _____ value - define in the Network layer header
Time to Live
When a router sends a Redirect message to a host, which of the following choices best represents the intent of such a message?
To inform the host that a better first hop router is available
Which of the following utilities use route tracing to identify a path from the sender to target host?
Traceroute
A network is usually said to be converged when all the routers know a loop-free path to get all other networks.
True
ARP is used only to find the hardware address of local IP hosts.
True
ARP is used to obtain the hardware address of the destination IP hosts.
True
Configure hosts to be weak or strong can be performed on both IPv4 and IPv6 network nodes.
True
Home Agents may include the Home Agent Information option in their Router Advertisement messages, but it should not be included if the Home Agent (H) bit is not set.
True
Home Agents may include the Home Agent Information option in their Router Advertisement messages.
True
ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.
True
IP addresses are used to identify IP hosts on a TCP/IP internetwork.
True
If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet.
True
ND takes over the functions that ARP and Reverse ARP handled in IPv4.
True
Neighbor discovery has five functional processes.
True
Nodes generally have a single entry in their default router lists, and all packets destine to nodes that are off link are sent to their default gateway.
True
One of the most difficult types of networks to implement and manage is one which the users are always moving around.
True
Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance).
True
Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.
True
Routers use ____ to select a routing path when there are multiple paths available.
Type of service
What type of packet is a node sending to another node that is on-link?
Unicast
When is an update for IPv6 routing protocol RIPng that did not exist in the IPv4 RIP implementation?
Use of multicast for sending updates.
Upon receipt of all other configured flag in the router advertisement message, which of the following best represents how the host should respond?
When set to 1, hosts may use an address configuration protocol such as SHCPv6 to obtain non-address configuration information
How does a host interpret the managed address configuration flag in the router advertisement message?
When set to 1, hosts must use an address configuration protocol such as DHCPv6 to obtain address configuration information
Upon receipt of the L flag in the Prefix Options of the Router Advertisement message, which choice best represents how the host should respond?
When set to 1, the hose should use the prefix received for on link address determination.
For which of the following link types must PPP provide addressing as a part of its WAN encapsulation services? (Choose all that apply)
X.25 connection Frame Relay ATM connection
At the command prompt on a windows 7 computer, what command is used to show the routing table for the IPv6 address?
netsh interface IPv6 show route
Which of the following is a command line utility that uses ICMP echo packets to test router and link latency, as well as packet loss?
pathping