Networking with TCP/IP Midterm 1
What is NAT called on a windows system?
Internet Connection Sharing (ICS)
IPv6 does not support traditional MTU, rather IPv6 uses a trail-an-error mechanism called:
Path MTU Discovery (PMTUD)
What are the two major firewalls commonly used:
Proxy Firewalls Packet-Filtering Firewalls
Which term below refers to a single device transmitting a message to all other devices on the subnet?
Broadcast
Select the major functions that NDP provides (select all that apply)
Duplicate Address Detection (DAD) Router Discovery Address Resolution Neighbor Discovery Stateless Autoconfiguration DNS Server Discovery
What three type of address assignment does DHCP allow? (check all that apply)
Dynamic Static Automatic
Using the ping command, ICMP utilizes the following message types:(check all that apply?)
Echo Reply Echo Request
Which IPv6 Multicast Address Space below is for all nodes on the local network segment.
FF02::1
Which IPv6 Multicast Address below is for all OSPFv3 ALLSPF Routers.
FF02::5
Which IPv6 Multicast Address Space below is for all EIGRP routers
FF02::a
What protocol below is used in mobile IPv6
FMP
Packet filtering firewall acts as internet routers and ________ some traffic.
Filter (drop)
A DHCP server leases an address to a client for a ______ period of time.
Finite
Which IPv4 Multicast Address space below is for all systems on this subnet.
224.0.0.1
NDP defines five ICMPv6 message types
Neighbor Advertisement Router Advertisement Redirect Router Solicitation Neighbor Solicitation
SLAAC utilizes which protocol to learn the IPv6 Prefix (netmask).
Neighbor Discover Protocol
Which IPv6 ICMP protocol and a feature of ND is used to detect when reachability between two systems on the same link has become lost?
Neighbor Unreachability Detection (NUD)
What technology is used to translate an internal private address to a public IP address on the internet.
Network Address Translation (NAT)
____________ technology provides transparent IP-live access to the internet for a host that has a private, non-routable IP Address. ex.... 10.0.0.6
Network Address Translation (NAT)
Although several variants of NAT exist, the __________ form is the most popular because it translates protocol port numbers as well as IP Addresses
Network Address and Port Translation (NAPT)
ICMP, Internet Control Message Protocol provides status information about IP Packets . When an CIMP error message passed through NAT, the addresses in the ________ need to be rewritten by NAT, so that the end client understands the ISMP error message
Offending Datagram
What other method besides DHCP is used; for example connections such as DSL.
PPP over Ethernet (PPPoE)
Routers are prohibited from fragmenting an IPv6 Datagram. The source sending the datagram must perform a path MTU discovery. Which IPv6 ICMP message is used for this?
Packet Too Big
Because internet routers each use local information when forwarding datagams, error can develop which can product routing loops. To prevent these loops, each IP datagram contains a hop limit, when this hop limit is reached, the router discards the datagram and send the following ICMP message:
Time Exceeded
The ____________ field sets an upper limit on the number of routers through which a datagram can pass.
Time-to-Live
___________ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation
UDP
______________ protocol describes data sent over the network as packets, while _______ protocol describes data sent over the network as datagrams.
TCP, UDP
IP software in each machine along a path from source to destination decrements the TTL or HOP Count. What happens when the field reaches zero?
The datagram is discarded
Moving a host to a new network requires one of two possible changes: (click all that apply)
The host's address must change Datagram forwarding must change
When configuring firewalls on a router, the network administrator configures one or more:
Access Control List (ACL)
Proxy firewalls are not really internet routers, but are essentially hosts running one or more _________ that relay of certain types between one connection/association and another application layer
Application-Layer Gateways (ALGs)
What makes MIPv6 work in a relatively simple way, and with CNs that are not Mobile-IP aware?
Bidirectional Tunneling
Internet Protocol is a fundamental Internet Server consisting of a packet delivery system, which consists of UDP, a service is defined as: (check all that apply)
Connectionless Packet Delivery Unreliable Best Effort
What protocol can be used to automatically assign IP addresses and other parameters to a host or router?
DHCP
If the DHCP server sits on another link (lan) as compared to the client, a router can be configured as a _________ to forward request across networks.
DHCP Relay Agent
NDP operates at Layer 3 by using ICMPv6 messages. Select the major functions that NDP provides (Select-all-that-apply)
DNS Server Discovery Stateless Autoconfiguration Duplicate Address Detection (DAD) Router Discovery Neighbor Discovery Address Resolution
DHCP permits a cpomputer to obtain all the information needed to communicate on a given network including: (check all that apply)
Default Router IPv4 Address Subnet Mask
Whenever an error prevents a router from forwarding or delivering a datagram, the router sends this type of ICMP message back to the source:?
Destination Unreachable
IP supports a number of options that may be selected on a per-datagram basis. Select all of the options below.
Source Routing Traceroute Security and Handling Labels Timestamp
An alternative method of DHCP for IPv6 is:
Stateless Address Auto-Configuration (SLAAC)
Internet Protocol defines two major protocols. What are two major protocols:
TCP UDP
___________ provides for retransmission and helps to avoid congestion, whereas _________ does not.
TCP, UDP
What are the three standard fields that ICMP messages begin with?
Checksum Field Code Field Type Field
DCHP protocol is defined as:
Dynamic Host Configuration Protocol
IPv6 uses Neighbor Solicitation and Neighbor Advertisements messages to determine if an IPv6 address is already in use. What process is this called?
Duplicate Address Detection (DAD)
Ethernet limits data transfers to how many octets of data?
1500
How many levels of encapsulation are requirement when an ICMP message travels in an IP datagram?
2 Layers
A typical IPv4 header contains ______ bytes (no option).
20
Which IPv4 Multicast Address Space below is restricted to one network
224.0.0.1 - 224.0..255
Which IPv4 Multicast Address Space below is for all OSPFIGP Routers?
224.0.0.5
Which IPv4 Multicast Address Space below is global across the internet.
224.0.1.0 - 238.255.255.255
The IPv6 Fragment header contains a _______ Identification field, similar to IPv4, but twice as large.
32-bit
A typical IPv6 header contains _______ bytes (no options.)
40
The values for the IPv6 Next Header field may indicate extensions or header for other protocols. Select all of the IPv6 extension header mechanisms below.
Fragment Mobility (MIPv6) Encapsulation Security Payload (ESP) ICMPv6
The process of dividing a datagram is known as ________.
Fragmentation
What are two most common forms of proxy firewalls?
HTTP Proxy Firewalls SOCKS Firewalls
The _________ field is calculated over the IPv4 header only, not the payload.
Header Checksum
A method that attempts to allow two or more systems, each behind NAT, to communicate directly using pinholes is called:
Hole Punching
The ping command utilizes the following protocol?
ICMP
Which protocol allows routers to send error or control messages back to the source of a datagram that caused a problem?
ICMP
Which specific protocols below support Multicast traffic for IPv4
IGMP
Which specific protocols below support Multicast traffic?
IGMP MLD
What is NAT called on Linux Systems?
IP Masquerading
IP Multicasting is available for both:
IPv4 IPv6
A typical IP header contains the source and destination for: (check all that apply)
IPv4 Addresses IPv6 Addresses
The _____ field helps identify each datagram sent by an IPv4 host.
Identification
What generic facility has been developed to help UDP-based application hosted behind a NAT establish connectivity?
Interactive Connectivity Establishment (ICE)
A routing or forwarding table contains the following below. (check all that apply)
Interface Next-Hop Mask Destination
What is the Mechanism is considered a required part of IP:
Internet Control Message Protocol
IGMP is considered to be a service that is integrated with the IP Layer and stands for:
Internet Group Management Protocol
IPv6 utilizes Neighbor Discovery Protocol (NDP) operating at the following layers: (select all that apply)
Layer 3 Layer 2
Which specific protocols below supports Multicast traffic for IPv6?
MLD
What do we refer to the size limit on a network ethernet.(check all that apply)
Maximum Transmission Unit Maximum Transfer Unit
___________ is based on the idea that a host has a "home" network but may visit other networks from time to time.
Mobile IP
A host that might move is called a ______, and the host with which it is communication are called _________.
Mobile Node Correspondent Nodes
Some hardware technologies support a second form of multi-point delivery called hardware ____________.
Multicast
Which term below refers to a single device transmitting a message to a specific group of devices on the subnet?
Multicast
A ___________ is a term to denote the set of computers that are listening to a particular multicast address.
Multicast group
A NAT Translation Table stores:(Check all that apply)
NAT Port Internet IP & Port External IP & Port Payload Type
The _________ field in the IPv4 header contains a number indicating the type of data found in the payload portion of the datagram.
Protocol
To be effective, a firewall that uses datagram (packet) filtering should restrict access to all: (check all that apply)
Protocols Protocol Ports IP Sources IP Destinations
NDP defines five ICMPv6 message types:
Redirect Neighbor Advertisement Neighbor Solicitation Router Advertisement Router Solicitation
When a router detects a host using a nonoptimal first hop, the router sends the host the following ICMP message:
Redirect Message
One of the primary workshorses for UNSAF and NAT traversal is called:
STUN
Which protocol below is a relatively simple client/server protocol that is able to ascertain the external IP address and port numbers being used on a NAT in most circumstances?
STUN
Which protocol is a special set of enhancements aimed at providing additional security for IPv6 ICMP ND messages?
Secure Neighbor Discovery (SEND)
In IPv6 fragmentation of a datagram is performed by:
The original source
When a datagram causes an error, ICMP can only report the error condition back to:
The original source of the datagram
What do we mean by unreliable when considering IP Service, UDP as an example:
The packet delivery is not guaranteed
The optimal time for a DHCP lease depends on:
The particular network and the needs of a particular host
If a datagram is fragmented, where is the fragmented reassembled?
The ultimate destination reassembles fragments (the destination host)
What protocol provides a way for two or more systems to communicate even if they are located behind relatively uncooperative NATS?
Traversal Using Relays around NAT (TURN)
Which protocols does STUN Utilize below? (check all that apply)
UDP TCP TCP w/TLS
Which term below refers to sending a frame from host to host.
Unicast
What does UDP mean:
User Datagram Protocol
ICMP messages provide communication between:
an ICMP module on one machine and an ICMP module on another
Secure Neighbor Discovery uses an entirely different UPv6 address called a:
cryptographically generated address (CGA)
One of the popular systems for building firewalls is included with modern versions of Linux and is called:
iptables
IGMP works with multicast and has two phases:
local multicast routers periodically poll hosts on the local network to determine whether any hosts still remain members of each group. when a host joins a multicast group, the host sends an IGMP message to the groups multicast declaring its membership.