MIS 3317 Chapter 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

26) Which of the following IPv4 addresses would be used for Internet transmission? A) 10.x.x.x B) 128.171.x.x C) both A and B D) neither A nor B

B) 128.171.x.x

12) If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits B) 32 bits C) 64 bits D) none of the above

B) 32 bits

32) ________ is a general naming system for the Internet. A) NAT B) DNS C) DHCP D) Dotted decimal notation

B) DNS

80) Which has stronger security? A) SSL/TLS B) IPsec C) Both have about equal security.

B) IPsec

21) In NAT, the ________ creates new external source IP addresses and port numbers. A) router B) firewall C) source host D) destination host

B) firewall

36) Which is a type of top-level domain? A) generic TLD B) specific TLD C) both A and B D) neither A nor B

B) specific TLD

11) What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address? A) global routing prefix B) subnet ID C) interface ID D) none of the above

B) subnet ID

61) Ping is for ________ messages. A) error advisory B) supervisory C) both A and B

B) supervisory

34) ".com" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above

B) top-level domain

35) ".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above

B) top-level domain

66) Which protects more of the original IP packet? A) transport mode B) tunnel mode C) Both provide the same protection to the IP packet.

B) tunnel mode

8) Your firm has a 22-bit network part and a 6-bit subnet part. How many hosts can you have per subnet? A) 6 B) 8 C) 14 D) none of the above

C) 14

40) A company has a domain name. What else must it have before it can make a website available to the public? A) a DNS server to host its domain name B) the website itself C) both A and B D) neither A nor B

C) both A and B

1) If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) 254

D) 254

5) Your firm has an 8-bit network part. If you need at least 200 subnets, what must your subnet part size be? A) 5 B) 6 C) 7 D) 8

D) 8

27) For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so.

FALSE

28) NAT is transparent to all applications.

FALSE

79) Options for major cryptographic methods are sometimes unacceptably weak and must be prohibited.

TRUE

60) ICMP is used for ________. A) error messages B) configuration messages C) routing messages D) none of the above

A) error messages

25) Which of the following is a private IP address range? A) 10.x.x.x B) 128.171.x.x C) both A and B D) neither A nor B

A) 10.x.x.x

42) The DNS ________ record is for the host name's ________ address A) A; IPv4 B) A; IPv6 C) AAAA; IPv4 D) none of the above

A) A; IPv4

65) Which of the following is more widely used? A) ESP B) AH C) Both are about equally widely used

A) ESP

17) The IEEE calls a 64-bit interface addresses that it designed a(n) ________ address. A) Extended Unique Identifier-64 B) Interface ID C) MAC address D) IP address

A) Extended Unique Identifier-64

51) Good security is an enabler if a company wishes to use SNMP ________ commands. A) Get B) Set C) Trap D) Reset

A) Get

76) The SA is negotiated in the ________. A) IKE phase B) IPsec protection phase C) AES phase D) none of the above

A) IKE phase

53) ________ is an interior dynamic routing protocol. A) OSPF B) BGP C) both A and B D) neither A nor B

A) OSPF

81) Which is less expensive to implement? A) SSL/TLS B) IPsec C) Both cost about the same to implement.

A) SSL/TLS

23) NAT ________. A) allows a firm to have more internal IP addresses B) reduces cost C) both A and B D) neither A nor B

A) allows a firm to have more internal IP addresses

62) Pinging is to send ICMP ________ messages to the target host. A) echo request B) error advisement C) ping D) echo

A) echo request

71) In tunnel mode, ESP fields surround an IPv4 packet's ________. A) entire length B) header C) data field D) none of the above

A) entire length

54) A company is free to select whatever ________ dynamic routing protocol it wishes. A) interior B) exterior C) both A and B D) neither A nor B

A) interior

57) A company is free to select its ________. A) interior dynamic routing protocol B) exterior dynamic routing protocol C) both A and B D) neither A nor B

A) interior dynamic routing protocol

10) The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) both A and B

A) network

47) Which of the following would be an SNMP object? A) number of rows in routing table B) a managed switch C) both A and B D) neither A nor B

A) number of rows in routing table

24) NAT enhances security by ________. A) preventing sniffers from learning internal IP addresses B) encryption C) both A and B D) neither A nor B

A) preventing sniffers from learning internal IP addresses

38) The highest-level DNS servers are called ________. A) root servers B) top-level domain servers C) both A and B D) neither A nor B

A) root servers

52) Dynamic ________ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) none of the above

A) routing

45) An advantage of using DHCP to configure clients is that ________. A) the configuration information will be up-to-date B) the configuration will be done securely C) both A and B D) neither A nor B

A) the configuration information will be up-to-date

43) The DNS ________ record is for the host name's ________ address A) AAAA; IPv4 B) AAAA; IPv6 C) both A and B D) neither A nor B

B) AAAA; IPv6

55) Which of the following can route non-IP packets? A) OSPF B) EIGRP C) both A and B D) neither A nor B

B) EIGRP

68) In remote access VPNs, IPsec has an ________ at the corporate site. A) IPsec firewall B) IPsec gateway C) IPsec proxy server D) IPsec endpoint

B) IPsec gateway

77) SA protections are applied in the ________. A) IKE phase B) IPsec protection C) AES D) none of the above

B) IPsec protection

20) ________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) none of the above

B) NAT

50) In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) Trap D) Request

B) Set

46) In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) object D) access point

B) agent

64) IPsec protects ________ layer content. A) data link B) application C) both A and B D) neither A nor B

B) application

3) Your subnet part is 8 bits long. How many hosts can you have per subnet? A) 8 B) 14 C) 254 D) none of the above

C) 254

6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 15 B) 16 C) 254 D) none of the above

C) 254

7) Your firm has a 22-bit network part. What subnet part would you select to give at least 10 subnets? A) 2 bits B) 3 bits C) 4 bits D) none of the above

C) 4 bits

14) If your routing prefix is 16 bits, how long is your subnet ID? A) 16 bits B) 32 bits C) 48 bits D) not possible to caculate

C) 48 bits

16) In an IPv6 global unicast address, the interface ID is ________ bits long. A) 8 B) 16 C) 64 D) Its size varies.

C) 64

4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8

C) 8

75) The first stage of IPsec uses the ________ protocol. A) SSL/TLS B) AES C) IKE D) SHA

C) IKE

78) SAs in two directions ________. A) are always the same B) are always different C) are sometimes different

C) are sometimes different

13) In a large company, you want ________. A) as big a routing prefix as you can have B) a medium-size routing prefix C) as small a routing prefix as you can have D) The size of the routing prefix is of no importance.

C) as small a routing prefix as you can have

29) If your local DNS server does not know the host name of an IP address, it will get the address from a(n) ________. A) root DNS server B) proxy DNS server C) authoritative DNS server D) none of the above

C) authoritative DNS server

22) NAT ________. A) allows a firm to have more internal IP addresses B) provides some security C) both A and B D) neither A nor B

C) both A and B

31) The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B D) neither A nor B

C) both A and B

44) A DHCP server provides a client with ________. A) one or more IP addresses for it to use B) the IP address of one or more DNS servers C) both A and B D) neither A nor B

C) both A and B

48) Which of the following would be an SNMP object? A) number of rows in routing table B) system uptime (since last reboot) C) both A and B D) neither A nor B

C) both A and B

67) IPsec is used for ________ VPNs. A) remote-access B) site-to-site C) both A and B D) neither A nor B

C) both A and B

73) SLAs define ________. A) cryptographic methods B) cryptographic options C) both A and B D) neither A nor B

C) both A and B

70) In transport mode, ESP fields surround an IPv4 packet's ________. A) entire length B) header C) data field D) none of the above

C) data field

18) A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000

C) fffe

9) Which is NOT one of the three parts of a public IPv6 unicast address? A) subnet ID B) routing prefix C) host part D) All of the above are parts in a public IPv6 unicast address.

C) host part

59) In the Border Gateway Protocol, "gateway" means ________. A) firewall B) switch C) router D) none of the above

C) router

19) Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00. A) aa00:ff:feff:ff0 B) ae00:ff:feff:ff0 C) aa00:00ff:feff:ff0 D) ae00:00ff:feff:ff0

D) ae00:00ff:feff:ff0

69) Which of the following is used in ESP? A) ESP header B) ESP trailer C) Integrity check value D) all of the above

D) all of the above

33) In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain

D) domain

58) The almost-universal exterior dynamic routing protocol is ________. A) EIGRP B) OSPF C) both A and B D) neither A nor B

D) neither A nor B

2) If your subnet part is 7 bits long, how many subnets can you have? A) 128 B) 256 C) 512 D) none of the above

D) none of the above

72) In IPv6, ESP protects the IP packet's_____. A) entire length B) payload C) header D) none of the above

D) none of the above

74) In IPsec, agreements about how security will be done are called ________. A) tranches B) security contracts C) service-level agreements D) security associations

D) security associations

30) If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client? A) the local DNS server B) the remote DNS server C) either A or B D) No IP address will be returned to the client.

A) the local DNS server

63) What security concern do ICMP echo request messages and echo response messages bring? A) attackers can disable the other host B) attackers can learn that the other host's IP address is in use C) attackers can change the other host's IP address D) all of the above.

B) attackers can learn that the other host's IP address is in use

39) Companies get second-level domains from ________. A) the IETF B) domain registrars C) the Internet Society D) the United States Government

B) domain registrars

15) The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) none of the above

B) interface ID

41) For a particular domain name, a DNS server will have ________. A) a single record B) multiple records C) two records—one for IPv4 and one for IPv6. D) all of the above

B) multiple records

37) Corporations wish to have ________ domain names. A) top-level B) second-level C) third-level D) none of the above

B) second-level

56) You need to use EIGRP if ________. A) you have TCP/IP traffic exclusively B) some of your traffic is TCP/IP traffic C) both A and B

B) some of your traffic is TCP/IP traffic

49) Which of the following would be an SNMP interface object? A) number of rows in routing table B) whether the interface is undergoing testing C) both A and B D) neither A nor B

B) whether the interface is undergoing testing


Ensembles d'études connexes

SLS Module 9: Academic Integrity and Ethics

View Set

Psych Exam 4 Study Guide Multiple Choice

View Set

Chapter 13 Palliative and End of life

View Set

Father of Our Country George Washington

View Set

APUSH Progressive Era & Guilded Age Exam

View Set

7-1 and 7-2 Audit your understanding

View Set