CIS 321 Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

fields

(1) a subdivision of a message header or trailer. (2) an IPv6 field is a group of lowercase hexadecimal symbols. each field represents 16 bits. fields are separated by colons.

cable modem

(1) broadband data transmission service using cable television. (2) the modem used in this service

handoff

(1) in a wireless LAN, a change in access points when a user moves to another location. (2) in cellular telephony, transfer from one cellsite to another, which occurs when a subscriber moves from one cell to another within a system

routing

(1) the forwarding of IP packets. (2) the exchange of routing protocol information through routing protocols.

In the mask /14, how many 1s are there?

14

If your subnet part is 8 bits long, you can have ________ subnets.

254

Deciding what interface and to what device to send the packet back out is step ________ in the routing process.

3

A mask has ________ bits.

32

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?

32 bits

The DNS ________ record is for the host name's ________ address

A; IPv4

Which of the following does the carrier NOT own?

B. customer premises equipment

Corporations wish to have ________ domain names.

B. second-level

To use a leased line, the customer must have a(n) ________ at each site.

C. CSU/DSU

In a telephone system, the lines that connect customers to the nearest switch are called ________.

D. the local loop

Four-way closes use ________ segments.

FIN

Which of the following is the most expensive to use?

MPLS

An abrupt close uses a ________ segment.

RST

Which is less expensive to implement?

SSL/TLS

In SNMP, companies are often reluctant to use ________ commands because of security dangers.

Set

In the IPv4 address 1.2.3.4, what is the network part?

We cannot say.

Which is a problem with IPv4 addresses? A. They are incompatible with wireless devices. B. They are too complex. C. Routers find it difficult to handle them. D. We have run out of them.

We have run out of them.

metropolitan area network

a WAN that spans a single urban area

mobile telephone switching office

a control center that connects cellular customers to one another and to wired telephone users, as well as overseeing all cellular calls (determining what to do when people move from one cell to another, including which cellsite should handle a caller when the caller wishes to place a call.)

echo reply

a message that responds to an Echo message

prefix notation

a way of representing masks; gives the number of initial 1s in the mask. a mask is represented by a slash followed by the number of initial 1s in the mask.

exploit

act of breaking into a computer, the method used to break in, or the crimeware software used to break in

In SNMP, the manager communicates directly with a(n) ________.

agent

two-way amplifiers

amplifier that amplifies signals in both directions

private IP address ranges

an IP address that may be used only within a firm. there are three designated ranges.

security association

an agreement between two parties on the security methods and parameters they will use in their subsequent interactions

object

an aspect of a managed device about which data is kept

root

at the top of the DNS hierarchy consisting of all domain names

internet service provider

carrier that provides internet access and transmission

Which of the following receive rights of way for transmission beyond sites?

carriers

Two-way amplifiers are needed for cable ________ service.

data

If no other row matches, the router will select the ________ row as its best match.

default

traffic engineering

designing and managing traffic on a network

cellsite

equipment at a site near the middle of each cell, containing a transceiver and supervising each cellphone's operation

lower-level domains

further qualified domains. ex. shidler.hawaii.edu

e-line service

gives an ethernet connection between two sites, effectively connecting them into a single ethernet network

e-LAN service

gives ethernet connections between multiple sites, effectively connection them into a single ethernet network

If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________.

go through all three steps for each

For human reading, IPv6 addresses are written in ________ notation.

hexadecimal

hop limit fields

in IPv6, the field that limits the number of hops an IPv6 packet may make among routers.

sequence number fields

in TCP, a header field that tells a TCP segment's order among the multiple TCP segments sent by one side.

acknowledgment number fields

in TCP, a header field that tells what TCP segment is being acknowledged in a segment.

default row

in general, a "default" is something you get if you do not have a more specific choice; the row of a routing table that will be selected automatically if no other row matches. its value is 0.0.0.0.

Router ports are called ______.

interfaces

traffic shaping

limiting access to a network based on type of traffic

ADSL modem

modem used in asynchronous digital subscriber line service. terminantes the carrier's connection

WAN optimization devices

network device that optimizes wide area network traffic through compression and other methods. desirable because WAN traffic is more expensive than LAN traffic per bit transmitted.

A border router connects different IP ________ and an internal router connects different IP ________.

networks, subnets

fiber to the home

optical fiber brought by carriers to individual homes and businesses

label switched path

path that all packets to a particular address will take across and MLPS label-switched network

compression

reducing the number of bits needed to be transmitted when the traffic has redundancy that can be removed

For cost reasons, you should ________ where you can, ________ where you must.

switch; route

channel reuse

the ability to use each channel multiple times in different cells in the network

head end

the cable television operator's central distribution point

network core

the central part of a network

time to live (TTL) field

the field added to a packet and given a value by the source host, usually between 64 and 128. each router along the way decrements the TTL field by one. a router decrementing the TTL to zero will discard the packet; this prevents misaddressed packets from circulating endlessly among packet switches in search of their nonexistent destinations

class 5 switches

the switch at the lowest level switching hierarchy. subscribers connect to these switches

second-level domains

the third level of a DNS hierarchy that specifies the organization

host to host VPN

virtual private network that creates cryptographically protected connections between an individual host and a corporate site.

site to site VPN

virtual private network that secures all communication between two sites

carrier WANs

wide area networking services offered by a carrier

In the mask 255.255.255.0, how many 1s are there?

24

How does carrier Ethernet differ from traditional Ethernet?

A. It is offered by carriers instead of being installed and managed by the company using it. B. It is for MAN and WAN services.

Why is Carrier Ethernet popular?

A. It uses familiar technology. B. It has attractive prices.

A company has a domain name. What else must it have before it can make a website available to the public?

A. a DNS server to host its domain name B. the website itself

WAN optimization devices are deployed ________.

A. at the ends of leased lines

Which of the following affects what cellular throughput an individual user will receive?

A. being in a moving car B. being far from the cellsite

An MTSO ________.

A. controls cellsites in a cellular system B. links mobile users to wired telephone customers

Compared to ADSL service, cable modem traditionally has been ________.

A. faster and more expensive

A WAN is the network that ________.

A. links different sites together

Compared to the Internet, carrier WANs ________.

A. offer higher-quality service

Traffic shaping reduces traffic by ________.

A. preventing certain undesirable traffic from entering the network B. limiting the amount of certain undesirable traffic entering the network

IPsec is used for ________ VPNs.

A. remote-access B. site-to-site

In ADSL, the customer should have ________.

A. splitters B. an ADSL modem

An advantage of using DHCP to configure clients is that ________.

A. the configuration information will be up-to-date

DSL offers ________.

A. voice transmission B. data transmission

NAT ______________. A. allows a firm to have more internal IP addresses B. provides some security C. both A and B D. neither A nor B

C. both A and B

The domain name system ________. A. is a way to find a host's IP addresses if your computer only knows the host's host name B. is a general naming system for the Internet C. both A and B D. neither A nor B

C. both A and B

For their transmission medium, cable television companies primarily use ________.

C. coaxial cable

Which is NOT one of the three parts of a public IPv6 unicast address? A. subnet ID B. routing prefix C. host part D. All of the above are parts in a public IPv6 unicast address.

C. host part

The PSTN core is organized as a ________.

C. modified hierarchy

What transmission medium do ALL DSL services use?

C. one-pair voice-grade UTP

echo request

ICMP message that asks a host to send back an echo reply message. this lets the sender know that the other device is reachable and also gives the round-trip latency to that device

SA protections are applied in the ________.

IPsec protection

________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.

NAT

DSL access multiplexer

a device at the end office of a telephone company that sends voice signals over the ordinary PTSN and sends data over a data network such as an ATM network

domain

a group of resources (routers, single networks, and hosts) under the control of an organization

leased lines

a high-speed, point to point, always on connection

decision cache

a list a router keeps of recent routing decisions for specific IP addresses so that it does not have to go through the entire routing decision again if another packet to that IP address arrives. this is nonstandard and somewhat risky.

wide area network

a network that links different sites together

local area network

a network within a customer's premises

metric

a number describing the desirability of a route represented by a certain row in a routing table

flag fields

a one-bit field

sniffer program

a program that intercepts traffic to read it in order to find information useful to an attacker

border router

a router that sits at the edge of a site to connect the site to the outside world through leased lines, PSDNs, and VPNs. its main job is to connect different networks.

next-hop router

a router to which another router forwards a packet in order to get the packet a step closer to reaching its destination host

domain name system

a server that provides IP addresses for users who know only a target host's host name. DNS servers also provide a hierarchical system for naming domains.

subnet

a small network that is a subdivision of a large organization's network

management information base

a specification that defines what objects can exist on each type of managed device and also specifies characteristics of each object; the actual database stored on a manager in SNMP. there are separate MIBs for different types of managed devices; both a schema and a database.

IPv4 mask

a string of 32 bits, beginning with a series of 1s and follows by a series of 0s; used by routers to assign routes to all packets going to a particular network or subnet on a network.

IPsec gateway

border device at a site that converts internal traffic data into protected traffic data that travels over an untrusted system such as the Internet

domain registrars

companies that allow individuals and organizations to purchase the right to use a particular second-level domain name on the Internet

The first step in the routing process involves ________.

comparing the packet's destination IP address to all rows

OSPF dynamic routing protocol

complex, but highly scalable interior routing protocol

ICMP error advisement

contains type and code values indicating what the problem is. not error correction. only sent to help the sending process or its human user diagnose problems.

network address translation

converting an IP address into another IP address, usually at a border firewall; disguises a host's true IP address from sniffers. Allows more internal addresses to be used than an ISP supplies a firm with external addresses

coaxial cable

copper transmission medium in which there is a central wire and a coaxial metal tube as the second connector

CSU/DSU

device on a customer premises that terminates a carrier's transmission line. carrier service unit/data service unit

routers

devices that forwards packets within an internet. routers connect two or more single networks (subnets).

asymmetric

different in two directions

ICMP control messages

directs a device to change how it operates. echo request and echo reply messages.

load balancing

dividing traffic across routers in order not to overload any single route

customer premises equipment

equipment owned by the customer, including PBXs, internal vertical and horizontal wiring, and telephone handsets

carrier ethernet

ethernet service provided in a MAN or WAN by a carrier to user organizations.

In IPv6 addresses, ________ are separated by ________.

fields; colons

One-bit fields are called ________ fields and if it is not set, this means its value is ______.

flag, 0

label number

number in the label header that aids label-switching routers in packet sending

tunnel mode

one of IPsec's two modes of operation, in which the IPsec connection extends only between IPsec gateways at the two sites. tunnel mode provides no protection within sites, but it offers transparent security.

transport mode

one of IPsec's two modes of operation, in which the two computers that are communicating implement IPsec. transport mode give strong end-to-end security between the computers, but it requires IPsec configuration and a digital certificate on all machines

internal router

only connects different subnets within a network; a router that connects different LANs within a site.

IPsec

protects communication using encapsulating security protocol and authentication header.

internet control message protocol

protocol created by the IETF to oversee supervisory messages at the internet layer

simple network management protocol

protocol that allows a general way to collect rich data from various managed devices in a network

dynamic routing protocol

protocol that allows router to exchange routing table information

dynamic host configuration protocol

protocol used by DHCP servers, which provide each user PC with a temporary IP address to use each time he or she connects to the Internet

interior dynamic routing protocols

protocol used within a firm's internet

digital subscriber line

provides digital data signaling over the residential customer's existing single-pair UTP voice-grade copper access line

interfaces

router ports that must be designed for the network to which it connects

label switching router

router that implements MPLS label switching

Dynamic ________ protocols allow routers to transmit routing table information to one another.

routing

In a routing table, a ________ represents a route for a group of IP addresses.

row

synchronous DSL

same speed in both directions. normally used in business

The second step in the routing process involves ________.

selecting the best-match row

cells

small, geographical region served by a cellsite

caching

storing very temporary information for retrieval. in routing, storing routing decisions for particular IP addresses that were recently handled instead of going through the entire routing process again.

local loop

the line used by a customer to reach the PTSN's central transport core

access links

the line used by the customer to reach the PTSN's central transport core

border gateway protocol

the most common exterior routing protocol on the internet. gateway = router

end office switches

the nearest switch to the telephone company to the customer premises

default router

the next-hop router that a router will forward a packet to if the routing table does not have a row that governs the packet's IP address except for the default row.

top-level domains

the second level of a DNS hierarchy, which organizes the domain by organization type or by country.

asymmetrical digital subscriber line

the type of DSL designed to go into residential homes, offers high downstream speeds, but limited upstream speed

public switched telephone network

the worldwide telephone network

".com" is a ________.

top-level domain

multiprotocol label switching

traffic management tool used by many ISPs

TCP/IP standards are set at the ________.

transport layer


Ensembles d'études connexes

Chapter 7: Socioemotional Development in Infancy

View Set

business management chapter 13-2

View Set

GEOG 251: Urban Renewal & Community Development

View Set

Physical Science Test 3 Quiz and Test Answers

View Set