Networking II Chapter 1-3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

When a host uses a service that employs a multicast address, it registers itself to "listen" on that address, as well as on its own unique host address (and the broadcast address).

True

To be valid, any domain name must correspond to at least one of which of the following? A: loopback address B: unique numeric IP address C: firewall D: IP gateway

Unique numeric IP address

In IPv6, which address contains all zeros and can be represented as two colon characters (::) in normal notation? A: anycast B: broadcast C: multicast D: unspecified

Unspecified

Which layer enables reliable transmission of data through the Physical layer at the sending end, and checks such reliability upon reception at the receiving end?

Data Link layer

What are applied to the packets that are captured into the trace buffer so you can see the packets in a readable format?

Decodes

Previously, IPv6 specified that interface identifiers followed which format, which specifies a unique 64-bit interface identifier for each interface? A: RFC 4941 B: EUI-64 C: EULA-64 D: IEEE 802.64v6

EUI-64

For each network reference model layer, the software handles packages of data, which are called packet defined units.

False

Providing a narrower address space is the primary design goal for IPv6.

False

The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.

False

The entire IPv6 address space is now occupied.

False

Which of the following technologies is used to permit computers to translate numeric IP addresses to MAC layer addresses? A: ARP B: RARP C: Reverse proxying D: Subnet masking

ARP

What technique may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server? A: IP renumbering B: Supernetting C: Address masquerading D: Subnetting

Address masquerading

Match each item with a statement below

Alarm - Notification of events or errors on the network Anycast packet - An IPv6 multicast method that permits multiple recipients to be designated for a single message Checkpoint - A point in time at which all system state and information is captured and saved Data link layer - Manages point-to-point transmission across the networking medium, from one computer to another on a single logical or physical cable segment Frame - Data Link layer PDU Packet - The PDU associated with the Network layer Runt - Undersized packet Datagram - PDU at the tCP/IP Network Access Layer Host - Device that operate on the Internet

What do most analyzers have that indicate unusual network events or errors?

Alarms

Which layer defines an interface that applications can use to request network services, rather than referring directly to applications themselves?

Application Layer

The reference model described in ISO Standard 7498 breaks network communication into seven layers. List each layer from top to bottom.

Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer

The Session layer includes mechanisms to maintain reliable ongoing conversations, called ____.

Checkpoints

Which class of IP addresses are used for multicast communications, in which a single address may be associated with more than one network host machine? Class A Class B Class C Class D

Class D

What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses? A: Route aggregation B: Address masquerading C: NAT D: Classless Inter-Domain Routing

Classless Inter-Domain Routing

Which of the following allows IPv4 addresses from Class A, B, or C to be combined and treated as a larger address space, or subdivided arbitrarily, as needed? A: Supernetting B: Classless Inter-Domain Routing C: Subnet masking D: Address masquerading

Classless Inter-Domain Routing

Which technique is known as the simplest form of subnet masking in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments? A: constant-length subnet masking B: firewall C: dot squad D: anycast

Constant-length subnet masking

Which layer of the OSI model works with frames?

Data Link

Which of the following is a TCP/IP model Network Access layer protocol?

HDLC

Provide a brief description of the following protocols: High-level Data Link Control (HDLC) protocol and frame relay.

High-level Data Link Control (HDLC) protocol: Based on IBM's original SNA Data Link Control (SDLC) protocol. HDLC uses data frames to manage network links and data transmission.Frame relay: A telecommunications service designed to support intermittent data transmission between local area networks and wide area network end points. Frame relay uses data frames to manage network links and data transmission.

Briefly describe three options for analyzing switched networks.

Hubbing out: By placing a hub between a device of interest (such as a server) and the switch, and connecting the analyzer to the hub, you can view all traffic to and from the server.Port redirection: Many switches can be configured to redirect (actually, to copy) the packets traveling through one port to another port. By placing your analyzer on the destination port, you can listen in on all the conversations that cross the network through the port of interest.Remote Monitoring (RMON): Uses Simple Network Management Protocol (SNMP) to collect traffic data at a remote switch and send the data to a management device.

When a computer on one subnet wishes to communicate with a computer on another subnet, traffic must be forwarded from the sender to which of the following devices? A: broadcast server B: IP gateway C: firewall D: proxy server

IP gateway

Briefly discuss two elements that TCP/IP services depend on to operate.

In UNIX terminology, a special "listener process," called a daemon, operates on a server to handle incoming user requests for specific services. On Windows Server 2008, a process called INETINFO.EXE appears in the Task Manager's Processes tab whenever the Web server, IIS, or FTP server is running.Each TCP/IP service has an associated port address that uses a 16-bit number to identify a specific process or service. Addresses in the range from 0 to 1024 are often called well-known port addresses and associate a specific port address with a specific service.

Which organization is responsible for creating and managing RFCs, in which the rules and formats for all related protocols and services are described?

Internet Engineering Task Force

What is the purpose of the following protocols: Internet Protocol, Internet Control Message Protocol, and Address Resolution Protocol.

Internet Protocol (IP): Routes packets from sender to receiver.Internet Control Message Protocol (ICMP): Handles information about IP-based routing and network behavior, especially as they relate to "traffic conditions" and errors.Address Resolution Protocol (ARP): Address Resolution Protocol (ARP) converts between numeric IP network addresses and Media Access Control (MAC) addresses on a specific cable segment (always used for the final step of packet delivery).Routing:This defines the mechanism that forwards packets from sender to receiver, in which numerous intermediate relays may be involved in achieving delivery from sender to receiver.

Briefly describe the three primary tasks that the Internet layer handles for TCP/IP.

MTU fragmentation:When a route carries data from one type of network to another, the largest chunk of data that the network can carry, an MTU, can vary. When data moves from a medium that supports a larger MTU to a medium that supports a smaller MTU, that data must be reduced to smaller pieces to match the smaller of the two MTUs involved.Addressing:This defines the mechanism whereby all network interfaces on a TCP/IP network must be associated with specific, unique bit patterns that identify each interface individually, and also identify the network (or even network locale) to which that interface belongs.Routing:This defines the mechanism that forwards packets from sender to receiver, in which numerous intermediate relays may be involved in achieving delivery from sender to receiver.

The physical numeric address functions at a sublayer of the Data Link layer in the OSI network reference model, called the ____________________.

Media Access Control layer

The primary function of the ____ layer is to provide a globally unique address to every host on the Internet and paths to and from hosts.

Network

In which layer are notions of network location addressed and the intricacies of directing a PDU from sender to receiver handled?

Network layer

What are TCP/IP application processes such as FTP and SMTP sometimes called?

Network services

What is the difference between the Open Shortest Path First protocol and the Border Gateway Protocol?

Open Shortest Path First (OSPF): Defines a widely used, link-state routing protocol for local or interior routing regions within local internetworks.Border Gateway Protocol (BGP): Defines a widely used routing protocol that connects to common Internet backbones, or other routing domains within the Internet where multiple parties jointly share responsibility for managing traffic.

The most important TCP/IP Network Access layer protocol is

PPP

The ____ layer also coordinates the sending and receiving of signals across the networking medium, and determines what kinds of cables, connectors, and network interfaces must be used to access a specific area on a network.

Physical

Which OSI model layer handles the conversion of outgoing data from bits that computers use in the signals that networks use?

Physical

Which layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications?

Physical

What type of address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers? A: symbolic address B: logical numeric address C: reverse proxy address D: physical numeric address

Physical numeric address

What does TCP/IP use to identify Application-layer protocols?

Port numbers

Which element of a protocol analyzer is required to capture unicast packets sent to other devices?

Promiscuous mode

List five basic elements found on most protocol analyzers

Promiscuous mode card and driver Packet filters Trace buffer Decodes Alarms Statistics

Which process taps into the network communications system and captures packets that cross the network?

Protocol analysis

Which of the following is a task handled at the Network layer?

Recognizes and uses multiple routes

____________________ informs the network interface card to pass packets sent to that address to the IP stack so their contents can be read, and tells the IP gateway to forward such traffic onto the physical network, where the listening network interface resides. Question 15 options:

Registration

Multicast addresses in IPv6 use which of the following to define the portion of the Internet to which the multicast group pertains? A: scope identifier B: interface identifier C: loopback identifier D: aggregatable global unicast address

Scope Identifier

____ involves cutting up a big message into a numbered sequence of chunks, called segments, in which each chunk represents the maximum data payload that the network media can carry between sender and receiver.

Segmentation

In which layer are ongoing communications between a sender and a receiver set up, maintained, and then terminated, or torn down, as needed?

Session layer

What does RMON use to collect traffic data at a remote switch and send the data to a management device?

Simple Network Management Protocol

Which of the following is a TCP/IP model Transport layer protocol?

TCP

What is the purpose of the Internet Architecture Board?

The Internet Architecture Board (IAB), a.k.a. Internet Activities Board, is the arm of the ISOC that is the parent organization for the standards-making and research groups that handle current and future Internet technologies, protocols, and research. As such, the IAB's most important task is to provide oversight for the architecture for all Internet protocols and procedures, and to supply editorial oversight over the documents known as Requests for Comments (RFCs), wherein Internet Standards are stated, and so forth.

What is the purpose of the Internet Engineering Task Force (IETF)?

The Internet Engineering Task Force (IETF) is the group responsible for drafting, testing, proposing, and maintaining official Internet Standards, in the form of RFCs, through the agencies of multiple working groups under its purview. The IETF and the IAB use a process accurately described as "rough consensus" to create Internet Standards. This means that all participants in the standards-making process, a type of peer review process, must more or less agree before a standard can be proposed, drafted, or approved. Sometimes that consensus can be pretty rough indeed! For more information about the IETF, visit www.ietf.org.

Which part of a PDU is most likely to provide data integrity checks for the data portion of the PDU?

Trailer

A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.

True

As a frame moves from interface to interface, the IP source and destination address information is preserved.

True

The original ARPANET was a packet-switched network.

True

Which term is used to describe the data frame crossing a router? A: firewall B: hop C: loopback D: dot squad

hop

A special bit pattern that "blocks off " the network portion of an IPv4 address with an all-ones pattern is known as which of the following? A: reverse proxy B: summary address C: broadcast address D: subnet mask

subnet mask

The activity of stealing (borrowing) bits from the host portion to further subdivide the network portion of an address is called ____________________.

subnetting


संबंधित स्टडी सेट्स

Electromagnetic Induction and Waves Module 30: Electromagnetic Waves and Light Dynamic Study Module

View Set

Exam I (Lectures 6-10: Amino Acids and Proteins)

View Set

ATI Rectum and Genitourinary Post Test

View Set

The Art of Public Speaking - Chapter 17

View Set

Cloud Practitioner Exam Right Answers Pt. 1

View Set

ap world history period 4 questions and answers

View Set