ISM4220 Final
Name the storage location for network hardware addresses
ARP table
Who funded the first network?
ARPA/Government
The first network is known as
ARPANET
What text standard is used in most plain text protocols?
ASCII
What CSP does netflix use for transcoding?
AWS
_________ VPN working on layer 3 of the network
All IPAC
In the IPv6 header what is the traffic class used for?
All the above
A codec is needed to connect what to digital?
Analog
What is the advantage of virtualization?
Flexibility and agility
SDN use a single set of rules for creating the configurations of the infrastructure. What are those rules stores for?
Forwarding table
What happened to application messages that are large?
Fragmentation
What happens to a network message as it passes from layer 5 to 4?
Fragmentation and encapsulation
Phishing is the practice of sending what to users?
Fraudulent emails
As a network administrator what would you use the subnet portion of your IP address for
Group hosts in a meaningful way
Mobile telephone switching offices are used to manage connectivity and ________
Handoffs
Which is more secure tunnel mode or transport mode?
Transport
Why is TCP so much more complex than UDP
error correction
In the IP header, where is the version located
first field
A network message moves to the next layer what information is it encapsulated with?
header details
Connection between business locations, sections, or offices that need consistent quality connections are ideal for
leased lines
What is used to differentiate two messages sent to a host for 2 different servers
ports
_________ what is stored in forwarding tables of a SDN
rules, configurations
All IETF standards are based on
running code
IaaS providers offer which: servers or software?
servers
How long is an IPv6 address?`
128 bits
What is the largest number a octet in an IP can be?
255
In a TCP session, the opening is 3 or 4 way?
3
What value in the "Next header value" field indicated the end of headers?
59, no next header
With an IPv4 address that has a 16 bit network segment, what size subnet would you need to allow 500 hosts per subnet but not many more?
7 bits
Dedicated leased lines are ideal for what type of connection?
A and B
What statement describes the host segment of an IPv6 address?
A and B
In closing a TCP session, what is the last packet exchanged?
ACK
What packets in a TCP session do not get acknowledged
ACK
What network security is used to send traffic outside the network
Border network
What is special about ARP address?
Both B and C
What is the highest address used in each subnet?
Broadcast
Which type of residential WAN service has a shared capacity for neighborhoods?
Cable modem
How does netflix reduce network utilization during content delivery?
Cache servers at ISPs
What is used to keep copies of correct popular files on a local network segment?
Caching
SDNs help to reduce what kind of costs?
Capital and operating expenditures
Use of an e-line connection between two locations is an example of what kind of technology being implemented?
Carrier ethernet
Original challenges of ARPANET
Connecting the user, host addresses, and no standards
What has to exist in the routing table to only need routes that should be treated special?
Default row
DNS servers map IP addresses to what?
Domain names
What is the lowest address in each subnet used for?
Dynamic host, DHCP
What technology makes it so the carrier network structure is viewed as a single network of trunks and switches?
E-Line
What is the ACK packet used for
Error correction
Malware is any software with _____ intentions
Evil
Why is phishing so hard to defend against?
Exploits people not technology
This organization is responsible for IP assignments
IANA
Who creates internet standards?
IETF
When accessing a host behind a NAT appliance, what is changed in the headers?
IP
Which VPN type and configuration has no host configuration needed?
IPSEC Tunnel
Hardware that has a dual stack IP chip is capable of using
IPv4 and IPv6
What type of address is 128 bits in length?
IPv6
______ and EUI-48 addresses are written using hexadecimal number system
IPv6
What is the result of a host not having a dns record type AAAA
IPv7 will not be able to resolve host name
How can IPv4 address be abbreviated?
It cant
Which network layer handles getting messages from one network to another?
Layer 3 - internet
Which is the only layer that has the capabilities to handle error correction?
Layer 4 Transport
In the data link layer, what addressing is used?
MAC or EUI-48
What technology uses a header label to make routing decisions?
MLPS
What can be used to ensure there is only one match at each hop in the router?
MPLS
What protocol was developed to help router efficiency
MPLS
Cell towers connect to _______ for handling cells and inter tower handoffs
Mobile telephone switching offices
What makes spear phishing so much more dangerous?
More convincing due to its narrow target
The term for multiple network conversations on a single transmission line?
Multiplexing
Name the technology used to convert external sockets allowing multiple hosts behind a single global address
NAT
Does all malware have a payload
No
Does the packet change during the network transmission?
No
Was the target breach a direct attack?
No
What effect does IPSEC have on firewall inspections
None
When using WPA2 what messages are not encrypted
None of them, all are encrypted
What standard of line type is used in the US to transmit data faster than 44 Mbps
North American Digital Hierarchy - t3
Network standards govern 3 aspects of network messages
Order, semantics, syntax
Primary difference between a worm and a virus is
direct propagation or propagation method
Which layers are required to send/deliver a network message?
Physical, DLL, Internet
5 layers
Physical, data link, internet, transport, application
When a TCP fragmentation comes to an abrupt close, what kind of packet was sent
RST
Name of network equipment needed to send network messages outside of local network?
Router
What is the biggest risk of moving to the cloud?
disruption of service
Which network device uses IP subnet comparisons to decide which interface to send traffic to
Routers
IPSEC and SSL/TLS are both VPNs, which is used at transport layer?
SSL/TLS
________ VPN works on layer 4 of a network
SSL/TLS
Office 365 is an example of what type of service?
SaaS
ICMP packets can expose the host address during NAT what threat does this cause
Security
What is used to put out of order fragmented messages back together?
Sequence numbers
The internet is a collection of what?
Single networks
The combination of IP addresses and port is known as what
Socket
What set of APIs are used for the controller to interface with networking hardware
Southbound
Which is known as reliable protocol? TCP or UDP
TCP
Why is the first field of all IP packets the version ID
To know how to read the header properly
Which protocol is used if speed is more important than accuracy?
UDP
In what version of SNMP were individual usernames and passwords introduced
Version 3
When your network needs to extend beyond one location what type of services may need to be added to link them to LAN
WAN, MAN, e-LAN
A network tool can show the contents of frames and packets
Wireshark
What does an ACK packet mean
acknowledgement of reception of message
Normal packets are sent just to a host while ARC requests are:
broadcast to all hosts
What is the difference in virtualization and clustering?
clustering is multiple systems acting as one, virtualization is 1 system acting as many
The result of network standards. There is _______ between equipment manufacturers
competition