Chapter 8, 9, 10 BUS 111 Final
The Internet is a ________.
WAN
In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet's IP address. What row will the router look at first when trying to find matching rows?
1
T1 leased lines run at a speed of about ________.
1 Mbps
Which of the following already runs to nearly all customer premises?
1-pair VG UTP
Many lines sold as T1 lines actually use ________.
1-pair voice-grade UTP
Which of the following is a private IP address range?
10.x.x.x
Which of the following IPv4 addresses would be used for Internet transmission?
128.171.x.x
Your firm has a 22-bit network part and a 6-bit subnet part. How many hosts can you have per subnet?
14
In the mask 255.255.255.0, how many 1s are there?
24
If your subnet part is 8 bits long, you can have ________ subnets.
254
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
254
Your subnet part is 8 bits long. How many hosts can you have per subnet?
254
Express the mask /24 in dotted decimal notation.
255.255.255.0
Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. The default row has a metric cost of 2. Which row will the router choose if both are matches?
2707
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16 and the reliability metric 10. Which row will the router choose if both are matches?
2707
Deciding what interface and to what device to send the packet back out is step ________ in the routing process.
3
A mask has ________ bits.
32
The total length of an IPv4 address is ________ bits.
32
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
32 bits
Decent data transmission for Web surfing began with ________ technology.
3G
The main version of Internet Protocol in use today is IP version ________.
4
Your firm has a 22-bit network part. What subnet part would you select to give at least 10 subnets?
4 bits
If your routing prefix is 16 bits, how long is your subnet ID?
48 bits
Which generation is now bringing speeds of about 10 Mbps?
4G
Most end-office switches are Class ________ switches.
5
In an IPv6 global unicast address, the interface ID is ________ bits long.
64
In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
8
The network part of an IPv4 address is ________ bits long.
8
Your firm has an 8-bit network part. If you need at least 200 subnets, what must your subnet part size be?
8
NAT ________. A) allows a firm to have more internal IP addresses B) reduces cost C) both A and B D) neither A nor B
A) allows a firm to have more internal IP addresses
The DNS ________ record is for the host name's ________ address A) A; IPv4 B) A; IPv6 C) AAAA; IPv4 D) none of the above
A; IPv4
The DNS ________ record is for the host name's ________ address A) AAAA; IPv4 B) AAAA; IPv6 C) both A and B D) neither A nor B
AAAA; IPv6
In ADSL, the residential customer needs a(n) ________.
ADSL modem
A company has a domain name. What else must it have before it can make a website available to the public? A) a DNS server to host its domain name B) the website itself C) both A and B D) neither A nor B
C) both A and B
NAT ________. A) allows a firm to have more internal IP addresses B) provides some security C) both A and B D) neither A nor B
C) both A and B
The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B D) neither A nor B
C) both A and B
Which of the following would be an SNMP object? A) number of rows in routing table B) system uptime (since last reboot) C) both A and B D) neither A nor B
C) both A and B
To use a leased line, the customer must have a(n) ________ at each site.
CSU/DSU
In IPv6, ESP protects the IP packet's_____.. A) entire length B) payload C) header D) none of the above
D) none of the above
________ is a general naming system for the Internet.
DNS
In Carrier Ethernet, which connects multiple distant sites into a single Ethernet network?
E-LAN service
In Carrier Ethernet, which service is a competitor for leased line service?
E-Line
Which of the following can route non-IP packets?
EIGRP
Which of the following is more widely used?
ESP
There is a row for each host address in a(n) ________.
Ethernet switching table
The IEEE calls a 64-bit interface addresses that it designed a(n) ________ address.
Extended Unique Identifier-64
When carriers use the terms "4G" and "5G," they use these terms in ways that comply with standards.
FALSE
For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so.
False
NAT is transparent to all applications.
False
Good security is an enabler if a company wishes to use SNMP ________ commands.
Get
The first stage of IPsec uses the ________ protocol.
IKE
The SA is negotiated in the ________.
IKE phase
Which has stronger security?
IPSec
In remote access VPNs, IPsec has an ________ at the corporate site.
IPsec gateway
SA protections are applied in the ________.
IPsec protection
A company has more control over its ________ technology.
LAN
A network that runs on the customer premises is a ________.
LAN
Which of the following usually offers higher speeds?
LANs
If no other row matches, the router will select the ________ row as its best match.
Last
Which of the following is the most expensive to use?
MPLS
Which spends less processing time on each packet arriving at a router?
MPLS
________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.
NAT
A packet arrives at a router with destination IP address 62.17.3.2. Row 47 has the destination value 62.17.4.0. Is Row 47 a match?
No
Which of the following would be an SNMP object? A) number of rows in routing table B) a managed switch C) both A and B D) neither A nor B
Number of rows in routing table
________ is an interior dynamic routing protocol.
OSPF
A customer's leased line to its ISP connects to the ISP's ________.
POP
The highest-level DNS servers are called ________.
Root servers
Which is less expensive to implement?
SSL/TLS
In SNMP, companies are often reluctant to use ________ commands because of security dangers.
Set
Many T1 lines are ________.
Symmetric DSL lines
If you need speeds of 1.2 Mbps between two corporate sites in the United States, you would need a ________ leased line.
T1
If you need speeds of 16 Mbps between two corporate sites in the United States, you would need a ________ leased line.
T3
In MPLS, the label-switched routers in the middle do not look at a packet's IP address.
TRUE
How do WAN carriers typically get their trunk lines?
They lease them from telephone companies.
Options for major cryptographic methods are sometimes unacceptably weak and must be prohibited.
True
Which of the following has more diversity in technologies?
WANs
In the IPv4 address 1.2.3.4, what is the network part?
We cannot say.
A packet arrives at a router with destination IP address 128.171.3.2. Row 47 has the destination value 128.171.0.0. Is Row 47 a match?
Yes
For ADSL service, which of the following typically must be added to the telephone system?
a DSLAM
For 100,000 addresses, which will have fewer rows?
a routing table
If a cellsite uses Channel 237, which other cellsites can reuse the channel?
adjacent cellsites
Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00.
ae00:00ff:feff:ff0
In SNMP, the manager communicates directly with a(n) ________.
agent
In a subnet mask, the 1s correspond to the ________.
all of the above
Which of the following is used in ESP? A) ESP header B) ESP trailer C) Integrity check value D) all of the above
all of the above
IPsec protects ________ layer content.
application
SAs in two directions ________.
are sometimes different
In a large company, you want ________.
as small a routing prefix as you can have
DSL residential service provides ________.
asymmetric speed
WAN optimization devices are deployed ________.
at the ends of leased lines
What security concern do ICMP echo request messages and echo response messages bring?
attackers can learn that the other host's IP address is in use
If your local DNS server does not know the host name of an IP address, it will get the address from a(n) ________.
authoritative DNS server
Firms generally pay the added cost of MPLS for connecting their sites ________.
because it can do traffic engineering
In MPLS, the router interface to send the packet back out will be decided ________.
before the first data packet is sent
A DHCP server provides a client with ________. A) one or more IP addresses for it to use B) the IP address of one or more DNS servers C) both A and B D) neither A nor B
both A and B
In the final step, the router sends the packet ________.
both A and B
Which of the following can sometimes be accelerated by changing their operation?
both A and B (Application protocols & Network protocols)
How does carrier Ethernet differ from traditional Ethernet?
both A and B (It is offered by carriers instead of being installed and managed by the company using it. And it is for MAN and WAN services.)
Why is Carrier Ethernet popular?
both A and B (It uses a familiar technology. & It is usually easy to upgrade speed rapidly.)
Why is Carrier Ethernet popular?
both A and B (It uses familiar technology. And It has attractive prices.)
Which of the following affects what cellular throughput an individual user will receive?
both A and B (being in a moving car & being far from the cellsite)
Which of the following is moving toward FTTH?
both A and B (cable modem service companies & ADSL service companies)
Fiber to the home service is normally offered by ________.
both A and B (cable television companies & telephone companies)
Which of the following reduces traffic?
both A and B (compression & traffic shaping)
An MTSO ________.
both A and B (controls cellsites in a cellular system & links mobile users to wired telephone customers)
5G will bring ________.
both A and B (higher speeds than 4G & energy-efficient low speeds)
Compared to the Internet, Layer 2 and Layer 3 carrier WAN services usually ________.
both A and B (offer QoS guarantees & require less management labor in the customer organization)
Traffic shaping reduces traffic by ________.
both A and B (preventing certain undesirable traffic from entering the network & limiting the amount of certain undesirable traffic entering the network)
In ADSL, the customer should have ________.
both A and B (splitters, an ADSL modem)
Which of the following is a common use for carrier WANs?
both A and B (to connect corporate sites, to connect a corporate site to the Internet)
DSL offers ________.
both A and B (voice transmission & data transmission)
SLAs define ________.
both cryptographic methods and cryptographic options
IPsec is used for ________ VPNs.
both remote-access and site-to-site
Which of the following DSL services tends to be symmetric in speed?
business
For cable modem service, customers need ________.
cable modems
Which reduces traffic more when sending long files?
caching
Which of the following receive rights of way for transmission beyond sites?
carriers
In cellular technology, a ________ is a small geographical area.
cell
In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________.
cellsite
For their transmission medium, cable television companies primarily use ________.
coaxial cable
The first step in the routing process involves ________.
comparing the packet's destination IP address to all rows
hich of the following does the carrier NOT own?
customer premises equipment
Two-way amplifiers are needed for cable ________ service.
data
In transport mode, ESP fields surround an IPv4 packet's ________.
data field
The next-hop router listed in the last row is the ________ router.
default
If the next-hop router field in the best-match row says "local", the router should address the packet to the ________.
destination host
In MPLS, if two packets arrive in order going to the same IP address, MPLS will ________.
do a simple table lookup for the second packet
In DNS, a group of resources under the control of an organization is called a ________.
domain
Companies get second-level domains from ________.
domain registrars
Pinging is to send ICMP ________ messages to the target host.
echo request
LAN speeds are faster than WAN speeds because of ________.
economic reasons
MAN speeds are faster than WAN speeds because of ________.
economic reasons
LANs are ________.
either A or B (single networks, local internets)
WANs include ________.
either A or B (single networks, the Internet)
In tunnel mode, ESP fields surround an IPv4 packet's ________.
entire length
ICMP is used for ________.
error messages
Leased lines offer ________ service.
fast
Compared to ADSL service, cable modem traditionally has been ________.
faster and more expensive
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.
fffe
In NAT, the ________ creates new external source IP addresses and port numbers.
firewall
In MPLS, the ________ adds the label to the packet.
first label-switching router
In cellular technology, G stands for ________.
generation
Which is a type of top-level domain?
generic TLD
If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________.
go through all three steps for each
The promise of FTTH is ________.
higher speed
Which is NOT one of the three parts of a public IPv6 unicast address?
host part
The part of an IPv6 global unicast address that designates the host is called the ________.
interface ID
Router ports are called ________.
interfaces
Router sockets for wire and optical fiber cords are called ________.
interfaces
A company is free to select whatever ________ dynamic routing protocol it wishes.
interior
A company is free to select its ________.
interior dynamic routing protocol
MPLS routers base their decisions on a packet's ________.
label number
Which lines run from one customer premise to another?
leased lines
A WAN is the network that ________.
links different sites together
The Internet is organized in a ________.
mesh
The PSTN core is organized as a ________.
modified hierarchy
For a particular domain name, a DNS server will have ________.
multiple records
The almost-universal exterior dynamic routing protocol is ________. A) EIGRP B) OSPF C) both A and B D) neither A nor B
neither A nor B
In coaxial cable, the two conductors ________.
neither A nor B (run side-by-side, are twisted around each other)
The routing prefix in IPv6 is like the ________ part in an IPv4 address.
network
In a network mask, the 1s correspond to the ________.
network part
A border router connects different IP ________.
networks
If any row other than the default row matches an IPv4 address, the router will ________.
never choose the default row
Express the mask /18 in dotted decimal notation.
none of the above
If your subnet part is 7 bits long, how many subnets can you have?
none of the above
In the mask /14, how many 1s are there?
none of the above
Compared to the Internet, carrier WANs ________.
offer higher-quality service
What transmission medium do ALL DSL services use?
one-pair voice-grade UTP
UDP is a standard for ________.
packet delivery
1) Ethernet standards are set at the ________.
physical layer
Traffic shaping reduces traffic by ________.
preventing or limiting undesirable traffic from entering the network
NAT enhances security by ________.
preventing sniffers from learning internal IP addresses
MPLS ________ the work that each router must do to deliver a packet during a traffic exchange.
reduces
Decision caching ________.
reduces routing costs
Compression reduces traffic by ________.
reducing redundancy in the data
In the Border Gateway Protocol, "gateway" means ________.
router
A(n) ________ must find the best-matching row in its ________ table by comparing multiple row matches.
router; routing
Dynamic ________ protocols allow routers to transmit routing table information to one another.
routing
In a routing table, a ________ represents a route for a group of IP addresses.
row
Corporations wish to have ________ domain names.
second-level
In IPsec, agreements about how security will be done are called ________.
security associations
The second step in the routing process involves ________.
selecting the best-match row
Cells are used in cellular telephony to provide ________.
service for more customers
You need to use EIGRP if ________.
some of your traffic is TCP/IP traffic
What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address?
subnet ID
Which of the following is one of the three parts of an IPv4 address?
subnet part
An internal router connects different IP ________.
subnets
DNS is a ________ protocol.
supervisory
Ping is for ________ messages.
supervisory
For cost reasons, you should ________ where you can, ________ where you must.
switch; route
Which of the following allows you to connect to the hosts of almost any corporation today?
the Internet
Asymmetric residential service is good for ________.
the World Wide Web
MPLS brings ________.
the ability to do traffic engineering
An advantage of using DHCP to configure clients is that ________.
the configuration information will be up-to-date
If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client?
the local DNS server
In a telephone system, the lines that connect customers to the nearest switch are called ________.
the local loop
If you see an IPv4 address, what do you know for certain?
the total length
".com" is a ________.
top-level domain
".edu" is a ________.
top-level domain
MPLS is ________ the source and destination hosts.
transparent to
TCP/IP standards are set at the ________.
transport layer
Which protects more of the original IP packet?
tunnel mode
In decision cashing, when 20 packets arrive to the same destination IP address, the router will ________.
use the decision it made for the first one
Why is Carrier Ethernet popular?
uses a familiar technology
Which of the following would be an SNMP interface object?
whether the interface is undergoing testing