IS 302 - Quiz (Chapter 9)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

a. interior

A company is free to select whatever ________ dynamic routing protocol it wishes. a. interior b. exterior c. both A and B d. neither A nor B

c. a domain registrar

A company receives its domain name from ________. a. IETF b. its ISP c. a domain registrar d. its parents

c. fffe

A step in creating an IEEE EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. a. the interface ID b. the subnet ID c. fffe d. 0000

a. the configuration information will be up-to-date

An advantage of using DHCP to configure clients is that ________. a. the configuration information will be up-to-date b. the configuration will be done securely c. both A and B d. neither A nor B

a. top-level domain

".com" is a ________. a. top-level domain b. second-level domain c. root domain d. none of the above

b. top-level domain

".edu" is a ________. a. root domain b. top-level domain c. second-level domain d. none of the above

c. both A and B

A DHCP server provides a client with ________. a. the IP address of one or more DNS servers b. one or more IP addresses for it to use c. both A and B d. neither A nor B

d. 65,534

You have an 8-bit network part/8-bit subnet part. How many hosts can you have per subnet? a. 126 b. 254 c. 534 d. 65,534

a. NAT

________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. a. NAT b. DHCP c. DNS d. none of the above

d. ICMP

________ is used for supervisory messages at the internet layer. a. TCP b. DNS c. DHCP d. ICMP

a. domain registrars

Companies get second-level domains from ________. a. domain registrars b. the Internet Society c. the IETF d. the United States Government

b. second-level

Corporations wish to have ________ domain names. a. top-level b. second-level c. third-level d. none of the above

a. routing

Dynamic _____ protocols allow routers to transmit routing table information to one another. a. routing b. transport c. synchronization d. none of the above

c. routing

Dynamic ________ protocols allow routers to transmit routing table information to one another. a. transport b. synchronization c. routing d. none of the above

False

For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so. True or False

d. 13

How many DNS root servers are there? a. 1 b. 2 c. 10 d. 13

b. have a dual-stack

If a host is to be able to communicate via IPv4 and IPv6, it is said to ________. a. be bilingual b. have a dual-stack c. be IPv6-ready d. be IP-agile

b. 32 bits

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? a. 16 bits b. 32 bits c. 64 bits d. none of the above

b. authoritative DNS server

If your local DNS server does not know the host name of an IP address, it will get the address from a(n) ________. a. root DNS server b. authoritative DNS server c. proxy DNS server d. none of the above

d. 254

If your subnet part is 8 bits long, you can have ________ subnets. a. 64 b. 128 c. 256 d. 254

a. domain

In DNS, a group of resources under the control of an organization is called a ________. a. domain b. network c. scope d. subnet

d. domain

In DNS, a group of resources under the control of an organization is called a ________. a. network b. subnet c. scope d. domain

c. 8

In IP subnet planning, you need to have at least 130 subnets. How large (how many bits) should your subnet part be [what must your subnet part size be]? a. 6 b. 7 c. 8 d. none of the above

d. security associations

In IPsec, agreements about how security will be done are called ________. a. tranches b. security contracts c. service-level agreements d. security associations

d. firewall

In NAT, the ________ creates new external source IP addresses and port numbers. a. router b. destination host c. source host d. firewall

b. firewall

In NAT, the ________ creates new external source IP addresses and port numbers. a. router b. firewall c. source host d. destination host

c. Set

In SNMP, companies are often reluctant to use ________ commands because of security dangers. a. Request b. Get c. Set d. Trap

d. agent

In SNMP, the manager communicates directly with a(n) ________. a. access point b. object c. managed device d. agent

b. 64

In an IPv6 global unicast address, the interface ID is ________ bits long. a. 32 b. 64 c. 128 d. It varies.

b. only between the IPsec servers

In tunnel mode, IPsec provides protection ________. a. all the way between the two hosts b. only between the IPsec servers c. at a higher cost d. none of the above

b. Cloud computing platform

Microsoft Azure is a(n) _______. a. Text Analytics tool b. Cloud computing platform c. Data Entry program d. Ad-Blocker

b. second-level

Most corporations wish to have ________ domain names. a. top-level b. second-level c. third-level d. none of the above

c. both A and B

NAT ________. a. provides some security b. allows a firm to have more internal IP addresses c. both A and B d. neither A nor B

a. preventing sniffers from learning internal IP addresses

NAT enhances security by ________. a. preventing sniffers from learning internal IP addresses b. encryption c. both A and B d. neither A nor B

b. Eliminating the need for data centers

One aspect of Azure's cost-effectiveness includes: a. Requiring on-site server management b. Eliminating the need for data centers c. Creating cybersecurity team d. Separating security costs

b. supervisory

Ping is for ________ messages. a. error advisory b. supervisory c. both A and B

a. echo request

Pinging is to send ICMP ________ messages to the target host. a. echo request b. error advisement c. ping d. echo

c. both A and B

The domain name system ________. a. is a general naming system for the Internet b. is a way to find a host's IP addresses if your computer only knows the host's host name c. both A and B d. neither A nor B

c. both A and B

The domain name system ________. a. is a way to find a host's IP addresses if your computer only knows the host's host name b. is a general naming system for the Internet c. both A and B d. neither A nor B

a. root servers

The highest-level DNS servers are called ________. a. root servers b. top-level servers c. both A and B d. neither A nor B

c. interface ID

The part of an IPv6 global unicast address that designates the host is called the ________. a. host part b. routing prefix c. interface ID d. none of the above

a. network

The routing prefix in IPv6 is like the ________ part in an IPv4 address. a. network b. subnet c. host d. both A and B

b. a single IPv6 stack could not communicate with a single IPv4 stack

Today, it can be problematic to have only a single IPv6 stack because ________. a. a single IPv4 stack is out of date b. a single IPv6 stack could not communicate with a single IPv4 stack c. a dual stack has become a common solution d. all of the above

b. IPsec

Which has stronger security? a. SSL/TLS b. IPsec c. Both have about equal security.

a. transport mode

Which mode of IPsec may be more expensive if a company has a large number of computers? a. transport mode b. tunnel mode c. Both A and B are equally expensive.

a. 10.x.x.x

Which of the following is a private IP address range? a. 10.x.x.x b. 128.171.x.x c. both A and B d. neither A nor B

b. 10.x.x.x

Which of the following is a private IP address range? a. 128.171.x.x b. 10.x.x.x c. both A and B d. neither A nor B

c. 254

You have a 20-bit network part/4-bit subnet part. How many hosts can you have per subnet? a. 14 b. 16 c. 254 d. none of the above

d. 8

Your firm has an 8-bit network part. If you need at least 250 subnets, how large (how many bits) should your subnet part be [what must your subnet part size be]? a. 5 b. 6 c. 7 d. 8

b. NAT

________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. a. DNS b. NAT c. DHCP d. none of the above


Set pelajaran terkait

What is the supreme law of the land?

View Set

High risk antepartum and antepartum

View Set

The Bits and Bytes of Computer Networking

View Set

The Income Approach (LM 6 Part 2)

View Set

Auto Tech Fasteners and Thread Repair

View Set

Motor Learning Final Exam 5,6,7 ans 7,8,9,

View Set