net125 chapter 8 quiz, net125 chapter 9 quiz, net125 chapter 8 exam, net125 chapter 9 exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

1. DNS 2. VoIP Refer to curriculum topic: 9.2.4 Both DNS and VoIP use UDP to provide low overhead services within a network implementation.

Which three fields are used in a UDP segment header? (Choose three.)

1. Length 2. Source Port 3. Checksum Refer to curriculum topic: 9.1.2 A UDP header consists of only the Source Port, Destination Port, Length, and Checksum fields. Sequence Number, Acknowledgment Number, and Window Size are TCP header fields.

A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. (Not all options are used.)

1. client sends FIN 2. server sends ACK 3. server sends FIN 4. client sends ACK Refer to curriculum topic: 9.2.1 In order to terminate a TCP session, the client sends to the server a segment with the FIN flag set. The server acknowledges the client by sending a segment with the ACK flag set. The server sends a FIN to the client to terminate the server to client session. The client acknowledges the termination by sending a segment with the ACK flag set.

What are three responsibilities of the transport layer? (Choose three.)

1. meeting the reliability requirements of applications, if any 2. multiplexing multiple communication streams from many users or applications on the same network 3. identifying the applications and services on the client and server that should handle transmitted data Refer to curriculum topic: 9.1.1 The transport layer has several responsibilities. Some of the primary responsibilities include the following: - Tracking the individual communication streams between applications on the source and destination - Segmenting data at the source and reassembling the data at the destination Identifying the proper application for each communication stream through the use of port numbers - Multiplexing the communications of multiple users or applications over a single network - Managing the reliability requirements of applications

Fill in the blank. The last host address on the 10.15.25.0/24 network is

10.15.25.254 Refer to curriculum topic: 7.1.2 The host portion of the last host address will contain all 1 bits with a 0 bit for the lowest order or rightmost bit. This address is always one less than the broadcast address. The range of addresses for the network 10.15.25.0/24 is 10.15.25.0 (network address) through 10.15.25.255 (broadcast address). So the last host address for this network is 10.15.25.254.

Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

10.18.10.208/28 & 10.18.10.224/28 Refer to curriculum topic: 8.1.5 Addresses 10.18.10.0 through 10.18.10.63 are taken for the leftmost network. Addresses 192 through 199 are used by the center network. Because 4 host bits are needed to accommodate 10 hosts, a /28 mask is needed. 10.18.10.200/28 is not a valid network number. Two subnets that can be used are 10.18.10.208/28 and 10.18.10.224/28.

The network portion of the address 172.16.30.5/16 is

172.16 Refer to curriculum topic: 7.1.2 A prefix of /16 means that 16 bits are used for the network part of the address. The network portion of the address is therefore 172.16.

Which number or set of numbers represents a socket?

192.168.1.1:80 Refer to curriculum topic: 9.1.2 A socket is defined by the combination of an IP address and a port number, and uniquely identifies a particular communication.

Three devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.) Device 1: IP address 192.168.10.77/28 on subnet 1 Device 2: IP address192.168.10.17/30 on subnet 2 Device 3: IP address 192.168.10.35/29 on subnet 3

192.168.10.64 --- 192.168.10.79 192.168.10.16 --- 192.168.10.19 192.168.10.32 --- 192.168.10.39 Refer to curriculum topic: 8.1.5 To calculate any of these addresses, write the device IP address in binary. Draw a line showing where the subnet mask 1s end. For example, with Device 1, the final octet (77) is 01001101. The line would be drawn between the 0100 and the 1101 because the subnet mask is /28. Change all the bits to the right of the line to 0s to determine the network number (01000000 or 64). Change all the bits to the right of the line to 1s to determine the broadcast address (01001111 or 79).

What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64?

2001:D12:AA04:B5::/64​ Refer to curriculum topic: 8.3.1 The /64 represents the network and subnet IPv6 fields which are the first four groups of hexadecimal digits. The first address within that range is the subnetwork address of 2001: D12:AA04:B5::/64.​

A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements?

255.255.255.224 Refer to curriculum topic: 8.1.4 For each new subnet to contain between 20 and 30 hosts, 5 host bits are required. When 5 host bits are being used, 27 network bits are remaining. A /27 prefix provides the subnet mask of 255.255.255.224.

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized subnets are created?

4 Refer to curriculum topic: 8.1.2 The normal mask for 192.168.10.0 is /24. A /26 mask indicates 2 bits have been borrowed for subnetting. With 2 bits, four subnets of equal size could be created.​

How many host addresses are available on the 192.168.10.128/26 network?

62 Refer to curriculum topic: 8.1.2 A /26 prefix gives 6 host bits, which provides a total of 64 addresses, because 26 = 64. Subtracting the network and broadcast addresses leaves 62 usable host addresses.

A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet into the interface ID portion of the address space, how many subnets can the administrator create from the /48 prefix?

65536 Refer to curriculum topic: 8.3.1 With a network prefix of 48, there will be 16 bits available for subnetting because the interface ID starts at bit 64. Sixteen bits will yield 65536 subnets.

251

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

10 segments

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

-192.168.1.64 /27 -192.168.1.96 /28

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

The device will continue receiving the streaming video, but there may be a momentary disruption.

A host device is receiving live streaming video. How does the device account for video data that is lost during transmission?

Multiplexing

A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

6

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?

Predictable static IP addresses for easier identification.

A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?

255.255.255.224

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:IP phones - 22 addressesPCs - 20 addresses neededPrinters - 2 addresses neededScanners - 2 addresses neededThe network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

/60

Consider the following range of addresses: What is the prefix-length for the range of addresses? 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: ... 2001:0DB8:BC15:00AF:0000::

the next byte that the destination expects to receive.

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?

three

How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?

1022

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

14

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

-> 192.168.1.48 -> 192.168.1.68 -> 192.168.1.121

Match the subnetwork to a host address that would be included within the subnetwork. (Not all options are used.) 192.168.1.32/27 -> 192.168.1.64/27 -> 192.168.1.96/27 ->

16

Refer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the site subsection to represent multiple geographical sites of the company, the sub-site section to represent multiple campuses at each site, and the subnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achieved per sub-site?

255.255.255.128

Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?

destination IP address -> 192.168.2.2 destination port number -> 80 source IP address -> 192.168.1.2 source port number -> 2578

Refer to the exhibit. Consider a datagram that originates on the PC and that is destined for the web server. Match the IP addresses and port numbers that are in that datagram to the description. (Not all options are used.)

10.16.10.64 /27

Refer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 25 hosts?

72

Refer to the exhibit. Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224 for all subnets, how many total host addresses are unused in the assigned subnets?

72

Refer to the exhibit. Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224, how many total host addresses are unused in the assigned subnets?

4

Refer to the exhibit. How many broadcast domains are there?

Network A = 192.168.0.0 /25 Network B = 192.168.0.128 /26 Network C = 192.168.0.192 /27 Network D = 192.168.0.224 /30

Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.) From right to left, network A has 100 hosts connected to the router on the right. The router on the right is connected via a serial link to the router on the left. The serial link represents network D with 2 hosts. The left router connects network B with 50 hosts and network C with 25 hosts.

IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33

Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?

Which transport layer feature is used to guarantee session establishment?

TCP 3-way handshake Refer to curriculum topic: 9.2.1 TCP uses the 3-way handshake. UDP does not use this feature. The 3-way handshake ensures there is connectivity between the source and destination devices before transmission occurs.

Three methods allow IPv6 and IPv4 to co-exist. Match each method with its description. (Not all options are used.)

The IPv4 packets and IPv6 packets coexist in the same network. Dual Stack The IPv6 packet is transported inside an IPv4 packet. Tunneling IPv6 packets are converted into IPv4 packets, and vice versa. Translation Refer to curriculum topic: 7.2.1 The term for the method that allows for the coexistence of the two types of packets on a single network is dual-stack. Tunneling allows for the IPv6 packet to be transported inside IPv4 packets. An IP packet can also be converted from version 6 to version 4 and vice versa. DHCP is a protocol that is used for allocating network parameters to hosts on an IP network.

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

The client randomly selects a source port number. Refer to curriculum topic: 9.2.3 Because a session does not have to be established for UDP, the client selects a random source port to begin a connection. The random port number selected is inserted into the source port field of the UDP header.

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination. Refer to curriculum topic: 9.2.2 If the source determines that the TCP segments are either not being acknowledged or are not acknowledged in a timely manner, then it can reduce the number of bytes it sends before receiving an acknowledgment. This does not involve changing the window size in the segment header. The source does not decrease the window size that is sent in the segment header. The window size in the segment header is adjusted by the destination host when it is receiving data faster than it can process it, not when network congestion is encountered.

What is an advantage of UDP over TCP?

UDP communication requires less overhead. Refer to curriculum topic: 9.1.2 TCP is a more reliable protocol and uses sequence numbers to realign packets that arrive out of order at the destination. Both UDP and TCP use port numbers to identify applications. UDP has less overhead than TCP because the UDP header has fewer bytes and UDP does not confirm the receipt of packets.

-Improves network performance -Easier to implement security policies

What are two reasons a network administrator might want to create subnets? (Choose two.)

The source will decrease the amount of data that it sends before it must receive acknowledgements from the destination.

What does TCP do if the sending source detects network congestion on the path to the destination?

It just sends the datagrams.

What does a client do when it has UDP datagrams to send?

The part of the FTP message that was lost is re-sent.

What happens if part of an FTP message is not delivered to the destination?

The TFTP application will retry the request if a reply is not received.

What happens if the first packet of a TFTP transfer is lost?

sequence numbers

What information is used by TCP to reassemble and reorder received segments?

UDP reassembles the received datagrams in the order they were received.

What is a characteristic of UDP?

There can be many ports open simultaneously on a server, one for each active server application.

What is a characteristic of a TCP server process?

The size of the broadcast domain is increased.

What is a result of connecting two or more switches together?

the combination of a source IP address and port number or a destination IP address and port number.

What is a socket?

0 to 1023

What is the complete range of TCP and UDP well-known ports?

2001:DB8:BC15:A

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?

Registered Ports

What kind of port must be requested from IANA in order to be used with a specific application?

destination and source port numbers.

What type of information is included in the transport header?

when an application can tolerate some loss of data during transmission.

When is UDP preferred to TCP?

the amount of data the destination can process at one time.

Which factor determines TCP window size?

ACK

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

255.255.255.224

Which subnet mask would be used if 5 host bits are available?

-SMTP -FTP -HTTP

Which three application layer protocols use TCP? (Choose three.)

-Destination devices receive traffic with minimal delay. -Received data is unacknowledged.

Which two characteristics are associated with UDP sessions? (Choose two.)

-ACK -SYN

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

-It eliminates most address configuration errors. -It reduces the burden on network support staff.

Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)

because HTTP requires reliable delivery.

Why does HTTP use TCP as the transport layer protocol?

What type of applications are best suited for using UDP?

applications that are sensitive to delay Refer to curriculum topic: 9.2.3 UDP is not a connection-oriented protocol and does not provide retransmission, sequencing, or flow control mechanisms. It provides basic transport layer functions with a much lower overhead than TCP. Lower overhead makes UDP suitable for applications which are sensitive to delay.

What does the IP address 192.168.1.15/29 represent?

broadcast address Refer to curriculum topic: 8.1.2 A broadcast address is the last address of any given network. This address cannot be assigned to a host, and it is used to communicate with all hosts on that network.

A college has five campuses. Each campus has IP phones installed. Each campus has an assigned IP address range. For example, one campus has IP addresses that start with 10.1.x.x. On another campus the address range is 10.2.x.x. The college has standardized that IP phones are assigned IP addresses that have the number 4X in the third octet. For example, at one campus the address ranges used with phones include 10.1.40.x, 10.1.41.x, 10.1.42.x, etc. Which two groupings were used to create this IP addressing scheme? (Choose two.)

geographic location & device type Refer to curriculum topic: 8.1.1 The IP address design being used is by geographic location (for example, one campus is 10.1, another campus 10.2, another campus 10.3). The other design criterion is that the next octet number designates IP phones, or a specific device type, with numbers starting with 4, but which can include other numbers. Other devices that might get a designation inside this octet could be printers, PCs, and access points.

What are two benefits of subnetting networks? (Choose two.)

reducing the size of broadcast domains & grouping devices to improve management and security Refer to curriculum topic: 8.1.1 When a single network is subnetted into multiple networks the following occurs: A new broadcast domain is created for every network that is created through subnetting. The amount of network traffic that crosses the entire network decreases. Devices can be grouped together to improve network management and security. More IP addresses are usable because each network will have a network address and broadcast address.

An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet?

subnetwork 192.168.1.64 subnet mask 255.255.255.192 Refer to curriculum topic: 8.1.4 The number of bits that are borrowed would be two, thus giving a total of 4 useable subnets: 192.168.1.0 192.168.1.64 192.168.1.128 192.168.1.192 Because 2 bits are borrowed, the new subnet mask would be /26 or 255.255.255.192

Refer to the exhibit. What does the value of the window size specify?

the amount of data that can be sent before an acknowledgment is required Refer to curriculum topic: 9.2.2 The window size specifies the amount of data that can be sent before an acknowledgment is received from the receiver. This value specifies the highest number of bytes, not the required number of bytes.

What is the purpose of using a source port number in a TCP communication?

to keep track of multiple conversations between devices Refer to curriculum topic: 9.1.2 The source port number in a segment header is used to keep track of multiple conversations between devices. It is also used to keep an open entry for the response from the server. The incorrect options are more related to flow control and guaranteed delivery.

What is the purpose of the TCP sliding window?

to request that a source decrease the rate at which it transmits data Refer to curriculum topic: 9.2.2 The TCP sliding window allows a destination device to inform a source to slow down the rate of transmission. To do this, the destination device reduces the value contained in the window size field of the segment. It is acknowledgment numbers that are used to specify retransmission from a specific point forward. It is sequence numbers that are used to ensure segments arrive in order. Finally, it is a FIN control bit that is used to end a communication session.

What OSI layer is responsible for establishing a temporary communication session between two applications and ensuring that transmitted data can be reassembled in proper sequence?

transport Refer to curriculum topic: 9.1.1 The transport layer of the OSI model has several responsibilities. One of the primary responsibilities is to segment data into blocks that can be reassembled in proper sequence at the destination device.


Ensembles d'études connexes

Astronomy Homework Questions (Ch. 6-14)

View Set

Unit 6: The Enlightenment and French Revolution

View Set

Geography CH 14: Northern Europe

View Set