internetworking tcp/ip

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The five steps of (1) obtaining logical addresses, (2) obtaining physical addresses, (3) establishing a connection between applications, (4) the transfer of information, and (5) the termination of the connection are necessary to accomplish what?

B) The transfer of information across a transmission control protocol/Internet protocol (TCP/IP) network.

What are the primary requirements to connect to a transmission control protocol/Internet protocol (TCP/IP) network?

B) Unique pairs of Network Layer and Transport Layer addresses and use of the TCP/IP protocol suite.

Why does Simple Network Management Protocol (SNMP) use unsolicited messages (traps) from the network elements to poll for appropriate information?

B) Using traps is consistent with the goal of simplicity and minimizing the amount of traffic generated by the network management function.

When a client connects to a web browser, the first action is typically media access control (MAC) address resolution. Under what circumstance may address resolution be bypassed?

B) When the client has recently made a request to the same server.

Which represents the prefix bits for the subnet mask 255.255.0.0?

C) /16.

What is the binary equivalent of decimal 136?

C) 10001000.

Which user datagram protocol (UDP) port address enables connection to a device running secure shell?

C) 22.

What is the correct destination of a user datagram protocol (UDP) port number for a DHCPDISCOVER message?

C) 67.

What type of server maintains an access log to assist with troubleshooting and tracking down malicious users?

C) A file transfer protocol (FTP) server.

Why are routers known as neighbors or peers?

C) Because they exchange routing information.

Host names and uniform resource locators (URL) are resolved to Internet protocol (IP) addresses by which of the following applications?

C) Domain Name System (DNS).

All computers running on the transmission control protocol/Internet protocol (TCP/IP) suite have which of the following in common?

C) Each computer is assigned its own Internet protocol (IP)

Which router protocol type shares routing information within the autonomous system (AS)?

C) Interior Gateway Protocol (IGP).

Which email protocol enables the messages to be viewed without first downloading them from the email server?

C) Internet Message Access Protocol version 4 (IMAP4).

Why is subnetting used?

C) It allows network administrators to break up a single network address into smaller network addresses.

Where does the Domain Name System (DNS) namespace begin?

C) Root domains.

Which device evaluates and acts upon a packet's Internet protocol (IP) address?

C) Router.

On which network type is a static route best used?

C) Stub routing.

What happens when the browser application finishes downloading the files necessary to display a web page?

C) The browser and server drop the connections, and the browser maintains the page and its elements in local memory.

What network information can be determined from a logical Internet protocol (IP) address?

C) The host portion and network portion.

n a net mask address, what identifies the network and host portions of the address?

C) The network portion of the net mask is set to all ones, and the host is set to all zeros.

Which statement best describes network address translation (NAT) masquerading?

C) Use the same name repeatedly.) It hides all internal addresses behind one external address.

In Simple Network Management Protocol (SNMP), when do passive management agents take action on their own initiative?

C) When certain well-defined error conditions occur they generate an unsolicited message called a trap.

d

d

Which network address represents a default route?

A) 0.0.0.0/0.

Which is the result of ANDing the Internet protocol (IP) address 23.176.224.18 with the subnet mask 255.224.0.0?

A) 23.160.0.0.

What provides user datagram protocol (UDP) with the ability to demultiplex data for an application?

A) A UDP destination port number.

You know the logical address of an associate's computer on the company's local network and you want to learn the media access control (MAC) address of your associate's computer. Which of the following tools would you use?

A) Address resolution protocol (ARP).

What are some issues that can arise when making a file available for transfer to other users?

A) Data type, file structure, and transmission mode.

Which of the following two ports are contained in the transmission control protocol (TCP) header?

A) Destination and source.

What does the Domain Name System (DNS) allow users to do?

A) Distinguish between two similar names.

What is a benefit of using static routes?

A) Ease of updating and maintaining the routing entries.

What are routers that belong to the same autonomous system (AS) called?

A) Interior neighbors.

Which of the troubleshooting utilities presented is frequently used as a starting point for transmission control protocol/Internet protocol (TCP/IP) network problem isolation to learn what network a device resides on?

A) Ipconfig.

Which transmission control protocol (TCP) header control bit represents that the message is initiating a connection?

A) SYN.

What is the primary difference between transmission control protocol (TCP) and user datagram protocol (UDP)?

A) TCP messages are much smaller in size than UDP messages are.

The physical address of a device is processed by which layer of the Open Systems Interconnection reference model (OSI/RM)?

A) The Data Link Laye

Which layer of the Open Systems Interconnection reference model (OSI/RM) would you suspect as being the problem when packets are arriving at the server but no information is being returned to the client?

A) The Transport Layer.

What happens to a datagram sent by a higher level protocol to a 127.x.y.z address?

A) The datagram loops back inside the host and never leaves the network interface card (NIC).

A store-and-forward email system will not deliver messages until:

A) The host requests the information.

What can cause routing loops in the flat router architecture?

A) The router receives data packets before it receives routing information, causing the router to generate additional address-request messages for routing information.

A router makes its packet forwarding decision based on what information?

A) The router's routing table.

When Dynamic Host Configuration Protocol (DHCP) carries vendor-specific options, what tells the client the vendor-specific format?

A) The transmission control protocol (TCP) port address.

Convert the binary Internet protocol (IP) address 01110011.11001000.00101100.00000010 to decimal:

B) 115.200.44.2.

At which point in the Dynamic Host Configuration Protocol (DHCP) lease period does the client first attempt to renew its lease?

B) At 50% of the original lease time.

The address 68.56.189.17 belongs to which Internet protocol (IP) class?

B) Class A.

Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram?

B) Fragment Offset.

When using multipath routing and multiple routes are available for a single destination address, how does the router make the route selection?

B) It selects the route with the highest precedence.

Which hypertext transfer protocol (HTTP) message request from the client allows it to obtain additional information regarding options and requirements without initiating any actions on the part of the server?

B) OPTIONS.

What does the packet-based multimedia communications systems, covered by the H.323, cover?

B) Realtime audio, video, and data communications over Internet protocol (IP) packet networks.

What type of delivery method uses an email server between the sender and the receiver of messages?

B) Store-and-forward.

Convert the Internet protocol (IP) address 172.68.10.2 from decimal to binary:

D) 10101100.01000100.00001010.00000010.

The maximum Domain Name System (DNS) domain name length is how many bytes?

D) 255.

Which is the Internet protocol (IP) header protocol number used to specify that the packet's contents were created with transmission control protocol (TCP)?

D) 6.

If we borrow 3 bits from a Class C network address, how many useable subnets have we created?

D) 8.

On the file transfer protocol (FTP) server, what manages client requests for file retrieval or transmission?

D) A daemon.

What isolates an Internet protocol (IP) address's network portion from its host portion?

D) A network mask.

What are the common file extensions used to transfer image data in file transfer protocol (FTP)?

D) Bitmap (.BMP), graphics interchange format (GIF), and joint photography experts group (.JPG or .JPEG).

The Network Layer must do what to a received frame first, in order to determine the route over which it will forward the datagram to the next network?

D) Decapsulate the packet.

Which utility should be run to verify that your Windows client is configured to use the correct Domain Name System (DNS) server?

D) Ipconfig.

When network address translation (NAT) uses IP (Internet protocol) address translation, it assigns external addresses to internal devices in which way?

D) It assigns the internal address to one of a pool of external addresses.

What is the best description of the Internet protocol (IP) address prefix?

D) It is the shorthand notation for the combined network and subnet mask.

The Open Systems Interconnection reference model (OSI/RM) Network Layer serves which primary purpose?

D) It uses Layer 3 addresses to create multiple routed networks

Which one of the following protocols allows email clients to download their messages from an email server?

D) Post Office Protocol version 3 (POP3).

Zones maintain domain name information in which record types?

D) Resource records.

Which protocol allows a diskless workstation to contact a server and obtain an Internet protocol (IP) address?

D) Reverse address resolution protocol (RARP).

What is the name of the protocol by which management information for a network element can be inspected or altered by a management station?

D) Simple Network Management Protocol (SNMP).

Hypertext transfer protocol (HTTP) is what type of protocol?

D) Stateless.

A repeater operates at which layer of the Open Systems Interconnection reference model (OSI/RM)?

D) The Physical Layer.

For Dynamic Host Configuration Protocol (DHCP), what are the hosts requesting and supplying configuration parameters called?

D) The client requests parameters and the server provides the parameters.

What component of the packet-based multimedia communications system, covered by the H.323 standard, is considered to be the "brain" of the network?

D) The gatekeeper.

Distance Vector Algorithms (DVA) operate in which manner?

D) They advertise their routing tables to directly connected neighbor routers.

Which version of the packet-based multimedia communications system, covered by the H.323 standard, was the first to standardize requirements for communications between a PC-based telephone and a telephone on the switched circuit network (SCN) of the public telephone system?

D) Version 2.

a

a

B

b

c

c


संबंधित स्टडी सेट्स

IB Biology HL: DNA and Biotechnology Objectives

View Set

Sets and Venn Diagram vocabulary

View Set

Med Surg 1 Ch 60 Neuro Functions

View Set

Astronomy Final: Homework and Tests

View Set

Chapter 5 Adaptations to Anaerobic Training Programs

View Set