TEST 02 NET II

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Upon receipt of the Other Configuration flag in a Router Advertisement message, which of the following best represents how the host should respond? 1. when set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain non-address configuration information. 2. when set to 1, hosts may not use an address configuration protocol such as DHCPv6 to obtain non-address configuration information. 3. when set to 1, hosts must autoconfigure their own address configuration information 4. When set to 1, hosts may not use an address configuration protocol such as DHCPv6 to obtain address configuration information. 5. When set to 1, hosts must use an address configuration protocol such as DHCPv6 to obtain address configuration information.

1. when set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain non-address configuration information.

A(n) _____ routing protocol shares information about how far away all networks are to the destination.

Distance Vector

Before an IP datagram is transmitted onto the cable, the data link ___________ puts the leading frame onto the datagram.

Driver

Border gateway protocol is the original point-to-point protocol for encapsulating TCP/IP traffic over a WAN link and is still used for connecting to some ISPs today (mostly for access to older UNIX hosts). T or F

False

Data for Echo Request messages may consist of one or more octets of arbitrary data. T or F

False

Path MTU discovery is only available for IPv6. T or F

False

Routed protocols are Layer 1 protocols that are used to get packets through an internetwork. T or F

False

The Code field provides error detection for the ICMP header only. T or F

False

The ICMP Echo Request guarantees packet delivery. T or F

False

The ICMP redirection process serves only IP routers, not IP hosts. T or F

False

The value 0 in the IP header protocol field denotes that an ICMP header follows the IP header. T or F

False

Upon start-up, Neighbor Discovery collects information about nodes configure their IPv6 addresses to communicate on the network. T or F

False

When a packet is fragmented, all fragments are given different TTL values. T or F

False

ta for Echo Request messages may consist of one or more octets of arbitrary data. T or F

False

RIP and OSPF are examples of ________ gateway protocols

Interior

__________ switches are devices that can perform switching based on the MAC address and, when necessary, examine the Network layer header to make routing decisions.

Layer 3

_________ IP is defined by the IETF in RFCs 2003 through 2006 and RFC 3220.

Mobile

A node can send a(n) ____ Solicitation message to find (or verify) the link-layer address of a local node, to see if a node is still available, or to check that its own address is not already in use by another node.

Neighbor

IPv6 network nodes send ________Solicitation messages in order to request the link-layer address of a target node.

Neighbor

If a router becomes unavailable to a node, that node will invoke the ________ process.

Neighbor unreachability detection

Two of the most well-known utilities, Ping and Traceroute, rely on ICMP to perform connectivity tests and _________discovery

Path

____ is a general-purpose protocol that provides WAN data link encapsulation services similar to those available for LAN encapsulations.

Point to Point Protocol

_________ is a technique for assigning costs to routes designed to prevent routing loops.

Poison reverse

__________ is a method that allows and IP host to use a simplified subnetting design.

Proxy ARP

ICMP ________ permits a gateway (router) on a non-optimal route between sender and receiver to redirect traffic to a more optimal path.

Redirect

A(n) ________ is a compilation of information about all the networks that the router can reach.

Routing table

The ___________ command-line utility uses route tracing to identify a path from the sender to the target host.

Traceroute

ARP is used only to find the hardware address of local IP hosts. T or F

True

ARP is used to obtain the hardware address of the destination IP hosts.

True

An IP host probe is performed by sending a ping packet (ICMP Echo Request packet) to each host within a range and noting the responses. T or F

True

Configuring hosts to be weak or strong can be performed on both IPv4 and IPv6 network nodes. T or F

True

ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum. T or F

True

ICMP reports errors only about IP datagrams. Errors about error messages are not reported. T or F

True

ICMP reports errors only about processing of non-ICMP IP datagrams. T or F

True

ICMP's job is to provide a variety of information about IP routing behavior, reachability, routes between specific pairs of hosts, delivery errors, and so forth. T or F

True

IP addresses are used to identify individual IP hosts on a TCP/IP internetwork. T or F

True

If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet. T or F

True

It's up to the IP host that receives incoming ICMP messages to act on the content of those messages. T or F

True

Neighbor Discovery has five functional processes. T or F

True

Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance). T or F

True

Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists. T or F

True

The principal difference between these two versions of ICMP protocol is the integration of different messaging types under the ICMPv6 protocol. T or F

True

one of the most difficult types of networks to implement and manages is one in which the users are always moving around. T or F

True

Which of the following path discovery command-line parameters turns off reverse DNS lookups? a. -d b. -a c. -w d. -n e. -h

a. -d

Which of the following command-line parameters for the ping command governs the Time to Live value? a. -i b. -l c. -w d. -f e. -n

a. -i

Which of the following RFCs describes ICMP? a. 792 b. 1812 c. None of these choices d. 1191 e. 950

a. 792

In a RIPv2 packet, the ________ field contains a plain text password. a. Authentication b. Authentication Type c. Route Tag d. Origin e. Address Family Identifier

a. Authentication

Of the following, which routing table types can an IPv6 routing table store? a. Directly attached routes b. Host routes c. Remote routes d. Default route e. next-hop route

a. Directly attached routes b. Host routes c. Remote routes d. Default route

Which of the following statements best defines the intent of the PMTU process? a. instructs the sender on what MTU to use to avoid further fragmentation en route b. determines the largest possible MTU in the path between sender and receiver c. determines the smallest possible MTU in the path between sender and receiver d. justifies the inclusion of the Don't Fragment flag in ICMP messages e. determines whether or not each router along the route supports fragmentation

a. Instructs the sender on what MTU to use to avoid further fragmentation en route

The __________ utility is a command-line that uses ICMP Echo packets to test router and link latency, as well as packet loss. a. PATHPING b. ROUTE c. TRACEROUTE d. NTP e. NETSTAT

a. PATHPING

________ is used to obtain an IP address for an associated data link address. a. RARP b. Proxy ARP c. Network Control d. Link Control Protocol e. Internet protocol Control Protocol

a. RARP

Which of the following are basic rules of operations for nodes (routers and hosts) concerning Redirect messages? a. Routers do not update their routing tables if they receive Redirect messages. Hosts do not send Redirect messages. b. Routers and hosts update their routing tables if they receive redirect messages. hosts do not send redirect messages c. Routers update their routing tables if they receive Redirect messages. Hosts do not send Redirect messages. d. Routers do not update their routing tables if they receive Redirect messages. Hosts can send Redirect messages. e. Routers update their routing tables if they receive Redirect messages. Hosts can send Redirect messages.

a. Routers do not update their routing tables if they receive Redirect messages. Hosts do not send Redirect messages.

For which of the following link types must PPP provide addressing as part of its WAN encapsulation services? (choose all that apply) a. X.25 connection b. analog telephone link c. ATM connection d. Frame relay e. T-carrir link

a. X.25 connection c. ATM connection d. Frame relay

A host or router can send the _____ error message to indicate that the protocol defined in the IP header cannot be processed. a. code 2: protocol unreachable b. code 3: port Unreachable c. code 7: port Destination Host Unknown d. code 5: source Route Failed e. code 4: Fragmentation Needed and Don't Fragment Was Set

a. code 2: protocol unreachable

A router sends the __________ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet. a. code 5: Source Route Failed b. code 2: protocol Unreachable c. code 4: Fragmentation Needed and Don't Fragment Was Set d. code 3: Port Unreachable e. code 7: Destination Host Unknown

a. code 5: Source Route Failed

When used over an asynchronous connection like an analog telephone link, PPP supports which of the following WAN encapsulation services? a. delimitation b. Ethernet c. protocol identification d. addressing e. bit-level integrity check

a. delimitation c. protocol identification e. bit-level integrity check

What allows the IS-IS routing protocol to operate on IPv6 networks? a. the addition of two new type-length-values (TLVs) as extensions b. the ability to tunnel IPv4 packets c. the use of LSP packets d. the neighborship process extended from the original IPv4 implementation e. the addition of the ability to route intradomain traffic for the connections network service.

a. the addition of two new type-length-values (TLVs) as extensions

The default TTL in windows server 2008, Windows Vista, and Windows 7 is _______ a. 64 b. 128 c. 72 d. None of these choices e. 112

b. 128

According to the host sending algorithm, which two conditions must be met in order for a host to send a packet to a destination node's link-layer address? a. Link-layer entry is in the neighbor cache b. Destination address is in the prefix list c. link-layer entry is in the router cache d. link-layer entry is in the destination cache e. destination address is in the destination cache

b. Destination address is in the prefix list c. link-layer entry is in the router cache d. link-layer entry is in the destination cache e. destination address is in the destination cache

Hackers can use _________ as part of a reconnaissance process to learn about active network addresses and active processes. a. All of these choices b. ICMP c. auto recovery d. availability e. presence

b. ICMP

By default, IPv6 nodes will send a _________ multicast request for configuration parameters immediately upon start-up. a. Router Advertisement b. Router Solicitation c. DHCPv6 Discovery d. Neighbor Advertisement e. Neighbor Solicitation

b. Router Solicitation

Which of the following choices permit a node to consider a neighbor to be reachable? (choose all that apply) a. unsolicited Neighbor Advertisements are received within the REACHABLE_TIME variable b. Upper-layer protocol indicates backward progress within the REACHABLE_TIME variable. c. unsolicited router solicitations are received within the REACHABLE_TIME variable d. Solicited Neighbor Advertisements are received within the REACHABLE_TIME variable. e. Upper-layer protocol indicates forward progress within the REACHABLE_TIME variable.

b. Upper-layer protocol indicates backward progress within the REACHABLE_TIME variable. d. Solicited Neighbor Advertisements are received within the REACHABLE_TIME variable. e. Upper-layer protocol indicates forward progress within the REACHABLE_TIME variable.

On a network that is low on available bandwidth, the ____ process causes more traffic on the wire. a. data encapsulation b. fragmentation retransmission c. All of these choices d. error-detection e. circuit switching

b. fragmentation retransmission

Is required to get the packet from one IP host to another IP host on a single network. a. All of these choices b. hardware address c. gateway d. data link e. delimiter

b. hardware address

What is the name of the concept that indicates that a path exists between two TCP/IP hosts on an internetwork? a. PMTU b. reachability c. route tracing d. path discovery e. internetworking

b. reachability

Upon receipt of the L flag in the Prefix Options of the Router Advertisement message, which choice best represents how the host should respond? a. when set to 0, the host should use the prefix received for on-link address determination b. when set to 1, the host should use the prefix received for on-link address determination c. when set to 1, the host should use the prefix received for off-link address determination d. when set to 0, the host should use the prefix received for off-link address determination e. None of these choices

b. when set to 1, the host should use the prefix received for on-link address determination

Which of the following ICMP Type numbers relate to Router Advertisement and Router Solicitation messages? a. 12 b. 8 c. 10 d. 11 e. 9

c. 10 e. 9

_______ can summarize routing information before sending link-state packets to other networks a. Autonomous systems b. Backbone areas c. Area border routers d. All of these choices e. Distance vectors

c. Area border routers

The ICMP packet field ________ provides error detection for the ICMP header only. a. Redirect b. Type c. None of these choices d. Code e. Host

c. None of these choices

_______ help keep local routing optimized in the face of change conditions and also reflect status as various destinations come on and off-link. a. Route Advertisement b. Neighbor Advertisement c. Redirects d. Route Advertisement and Route Solicitation e. Route Solicitation

c. Redirects

At the command prompt on a windows 7 computer, what command is used to show the routing table for the IPv6 interface? a. netsh interface IPv6 show routes b. netstat -p ipv6 c. netsh interface ipv6 show route d. netsh interface ipv6 show all routes e. netsh interface ipv6 show routing table

c. netsh interface ipv6 show route

Which of the following Windows command-line utilities is the primary tool for performing connectivity or reachability tests? a. All of these choices b. tracert c. ping d. pathping e. ipconfig

c. ping

ICMP packets contain only three required fields after the IP header: Type, Code, and ____________.

checksum

Which value in bytes is the default MTU for IPv6 packets? a. 512 b. 1024 c. 1480 d. 1280 e. 576

d. 1280

Although RFC ____ dictates that IP routers"must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing," many do not. a. 1900 b. 1918 c. 1972 d. 1812 e. 1955

d. 1812

Which of the following ICMP Type numbers identify Echo and Echo Reply messages? a. 1 b. 30 c. 3 d. 8 e. 0

d. 8 e. 0

IPv6 Neighbor Solicitation protocol can be compared to IPv4 ______. a. Redirect b. Router Advertisement c. Router Solicitation d. ARP Request e. None of these choices

d. ARP Request

Which of the following definitions best describes a network that is in a converged state? a. All routers use static routing tables b. All routers use link-state routing protocols c. Routers are waiting for table updates to finish propagating d. All routers know current available networks and their associated costs e. All routers use distance vector routing protocols

d. All routers know current available networks and their associated costs

Which of the following ICMP message types relates to reachability analysis? a. Time Exceeded b. Redirect c. Destination Unreachable d. Echo/Echo Reply e. Source Quench

d. Echo/Echo Reply

A host invoking the duplicate address detection process sends what type of message? a. router advertisement b. Neighbor Advertisement c. None of these choices d. Neighbor Solicitation e. Broadcast Query

d. Neighbor Solicitation

IPv6 Duplicate Address Detection protocol can be compared with IPv4 _______. a. Router Solicitation b. ARP Request c. Router Advertisement d. None of these choices e. Redirect

d. None of these choices

____ simply prevents a router from advertising a network on the same interface from which it learned that network. a. Spanning Tree protocol b. Link state routing c. Source routing d. Split horizon e. On-demand routing

d. Split horizon

What is the first step that an IP host performs when it receives an Ethernet II frame? a. check the hardware address to see if it should be read further b. Determines if the destination is on the same of a different subnet c. examine the payload to determine the actual destination address d. check the validity of the FCS value e. strip off the FCS field and hand the packet to the Data link layer

d. check the validity of the FCS value

An IPV6 node uses NDP to discover the link-layer address of the next-hop router by sending a Router Solicitation message as what kind of network message? a. None of these choices b. unicast c. broadcast d. multicast e. anycast

d. multicast

Which of the following Windows command-line utilities is the primary tool for performing connectivity or reachability tests? a. ipconfig b. pahping c. all of these choices d. ping e. tracert

d. ping

What is an update for the IPv6 routing protocol RIPng that did not exist in the IPv4 RIP implementation? a. use of distance-vector b. None of these choices c. use of a 15 hop radius d. use of multicast for sending updates e. use of poison reverse

d. use of multicast for sending updates

__________ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network. a. broadcast b. RIP c. path MTU d. OSPF e. ICMP

e. ICMP

The message type __________ documents when routing or delivery errors prevent IP datagrams from reaching their destinations. a. ICMP Echo/Echo Reply and ICMP Time Exceeded b. ICMP Time Exceeded c. ICMP Echo/Echo Reply d. ICMP Source Quench e. ICMP Destination Unreachable

e. ICMP Destination Unreachable

All IPv4 packets have a predefined lifetime indicated in each packet's _________ field. a. Type of Service b. protocol Identifier c. Precedence d. Options e. None of these choices

e. None of these choices

Which of the following routing protocols is a link-state protocol? a. IGRIP b. Dijkstra c. BGP d. RIP e. None of these choices

e. None of these choices

hich of the following ICMP message types relates to congestion control? a. Redirect b. Echo/Echo Reply c. Destination Unreachable d. Time Exceeded e. None of these choices

e. None of these choices

_________ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation. a. TRACEROUTE b. ROUTE c. PATHPING d. Firewalking e. PMTU Discovery

e. PMTU Discovery

Routers use ________ to select a routing path where there are multiple paths available. a. shortest prefix matching b. None of these chices c. source routing d. precedence e. Types of service

e. Types of service

ND makes use of multicast addresses such as the "_________" address with link-local scope (FF02::1). a. all subnets b. all routers c. all proxies d. all domains e. all nodes

e. all nodes

What type of scan occurs when a series of ping requests for a range of IP addresses is performed? a. firewalking b. port scan c. protocol scan d. network mapping e. host probe (scan)

e. host probe (scan)

When looking for a destination address for a datagram ultimately bound for a remote network, an IP host must check which structure to obtain the necessary information? a. ARP cache b. a source route request c. All of these choices d. proxy ARP to get the hardware address for the destination machine e. routing tables

e. routing tables

What gives BGP the ability to run on IPv6 networks? a. The elimination of fragmentation of reassembly b. the addition of IPv6 address support for the Next Hop attribute c. the addition of anycast d. the addition of MPLS e. the addition of multiprotocol extensions

e. the addition of multiprotocol extensions

With router advertising, the default Lifetime value for route entries is 10 minutes.

false

_________ describes the concept of walking a firewall ACL or ruleset to determine what it filters and how.

firewalking

At the Data Link layer, protocol data units are called __________.

frames


संबंधित स्टडी सेट्स

AHT 3 - Shock - ATI, Lewis, Evolve. MOD 1- Exam 1

View Set

Lab 3: Goldmann Application Tonometry

View Set

Middle Eastern History and Culture Test #1

View Set

Cultural and Spiritual Considerations Practice Questions

View Set

Finance Chapter 6 Smartbook Questions

View Set