Chapter Four Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

R-What four functions do all routers perform?

1. Connect dissimilar networks 2. Interpret layers 3 and 4 addressing and other information 3. Determine the best path for data to follow 4. Reroute traffic if a primary route is down but another path is available

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable? 32 20 8 15

15

By default, what is the MTU size on a typical Ethernet network? 1518 bytes 1492 bytes 1522 bytes 1500 bytes

1500 bytes

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size? 1492 bytes 1518 bytes 1522 bytes 1500 bytes

1522 bytes

Which of the following is not a task handled by a router? A router can reroute traffic if the path of first choice is down but a second path is available. A router can connect dissimilar networks. A router can interpret Layer 3 and often Layer 4 addressing. A router forwards broadcasts over the network.

A router forwards broadcasts over the network.

Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for? The administrative boundaries of an organization. The autonomous systems used by an organization. An entire network consisting of various network devices. An IS-IS capable network router.

An IS-IS capable network router.

Which statement regarding the Border Gateway Protocol (BGP) is accurate? BGP is limited to a single autonomous system. BGP is exclusively a distance-vector protocol. BGP is a more advanced version of OSPF. BGP utilizes TCP for communicating updates.

BGP utilizes TCP for communicating updates

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate? The Windows tracert utility does not place limits on the TTL of repeated trial messages. By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages. Only tracert can send UDP messages for tracing a path. The tracert utility expects an ICMP port unreachable error message as the final reply to a trace.

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols? BGP EIGRP IS-IS OSPF

EIGRP

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate? Increased traffic will result from the switch to EIGRP. EIGRP may not be available on non-Cisco routers. EIGRP will increase CPU utilization on core routers. Convergence time will be increased with EIGRP.

EIGRP may not be available on non-Cisco routers.

What occurs when a collision happens on a network? Each node on the network stops transmitting, until manually told to reconnect and transmit. Each node on the network waits a random amount of time and then resends the transmission. The collision will create an error in the network switch, but otherwise, no issues will occur as a result. The collision goes undetected, and data transmission continues.

Each node on the network waits a random amount of time and then resends the transmission.

A-Give three examples of routing metrics used by routers to determine the best of various available routing paths.

Hop count, theoretical bandwidth, path latency

What is the purpose of the checksum TCP field? It identifies the data segment's position in the stream of data segments being sent. It confirms receipt of data via a return message to the sender. It allows the receiving node to determine whether the TCP segment became corrupted during transmission. It specifies special options, such as the maximum segment size a network can handle.

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

What is routing protocol convergence time defined as? It is the time it takes for the protocol to recognize the best path in the event of a network change. It is the amount of time involved in configuration of the routing protocol. It is the amount of time it takes after initial configuration of the protocol for all routes to become known. It is the time it takes for the protocol to recognize that a change has occurred.

It is the time it takes for the protocol to recognize the best path in the event of a network change.

A-Which protocol is supported by ICMPv6 to facilitate neighbor discovery on an IPv6 network?

NDP

Which statement does NOT accurately describe characteristics of the OSPF protocol? OSPF provides low network overhead. OSPF maintains a database of other routers' links. OSPF has no hop limits on a transmission path. OSPF requires very little CPU or memory resources.

OSPF requires very little CPU or memory resources.

A-Which two fields in an Ethernet frame help synchronize device communications but are not counted toward the frame's size?

Preamble and SFD

A-List three IGPs (interior gateway protocols).

RIP, RIPv2, OSPF

A-What is the difference between dynamic ARP table entries and static ARP table entries?

Static ARP table entries are entered manually using the arp command, while dynamic entries are created when a client makes an arp request that could not be satisfied by data in the arp table.

The IP connectionless protocol relies on what other protocol to guarantee delivery of data? UDP ICMP TCP ARP

TCP

R-What three characteristics about TCP distinguish it from UDP?

TCP is connection oriented, TCP messages arrive in order, and when data is streamed, TCP data may arrive in multiple packets.

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean? Fragmented frames will be consolidated into whole frames before being sent. The MTU for the network can be as high as 9198 bytes. The network is not based on the Ethernet standard. The MTU for the network is set at 65,535 bytes.

The MTU for the network can be as high as 9198 bytes.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? The hosts that share the same MAC addresses will be completely unable to communicate with any other devices. The network switch will eventually crash due to being unable to properly forward traffic. The hosts will generate new MAC addresses until the conflict is resolved. The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

What happens when a router receives a packet with a TTL of 0? The router attempts to forward the traffic on a local network. The router resets the TTL to 128. The router marks the packet as corrupted and forwards it to the next hop. The router drops the packet and sends an ICMP TTL expired message back to the host.

The router drops the packet and sends an ICMP TTL expired message back to the host.

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet? Internet header length (IHL) Time to Live (TTL) padding differentiated services (DiffServ)

differentiated services (DiffServ)

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? traffic class group ID traffic exchange flow label

flow label

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? flow control framing sequencing and checksums connection-oriented protocol

framing

What IPv6 field is similar to the TTL field in IPv4 packets? flow label hop limit distance vector next header

hop limit

What routing metric affects a path's potential performance due to delay? latency load MTU theoretical bandwidth

latency

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? border gateway protocols link-state protocols distance vector protocols interior gateway protocols

link state protocols

What utility is the equivalent to the pathping command on a Linux system? mtr traceroute tracepath httping

mtr

What command will list only current connections, including IP addresses and port numbers? show ip stats netstat -s netstat -n portstat

netstat -n

Which command will produce statistics about each message transmitted by a host, separated according to protocol type? netstat -an ipstat -a ipconfig -s netstat -s

netstat -s

A-What database does a router consult before determining the most efficient path for delivering a message?

routing table

You are connected to your network's Cisco router, and need to verify the route table. What command should you enter? show route-table route -a route print show ip route

show ip route

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before an acknowledgment is received? PSH flag URG flag sliding-window urgent pointer

sliding-window

A-Which Linux utility provides output similar to Wireshark's?

tcpdump

What tcpdump command can be used to filter out all traffic except SSH traffic? tcpdump -f +ssh tcpdump only ssh tcpdump -p 22 tcpdump port 22

tcpdump port 22

A-What process is used to establish a TCP connection?

three way handshake

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? traceroute -i srv1.mycompany.com traceroute -I srv1.mycompany.com traceroute -w srv1.mycompany.com traceroute -o ICMP srv1.mycompany.com

traceroute -I srv1.mycompany.com


Ensembles d'études connexes

Exam 1: Health Promotion of Adolescent

View Set

Chapter 7 Creating a Flexible Organization

View Set

n) Chapter 7 Brooker - using chapter 9 Campbell, chapter 8 Mader & others**

View Set